uting program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0xe2}) 10:28:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:15 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc337600363940ffb4aed12f0600000000004000000000000000cff47d0100e49caed75d492b415bcee00a06dc3a29612baf81dcfc00568952c44d7405f2a352b2dead26dda86a2f47f8b8c50c906010", 0x58}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 10:28:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:15 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:15 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=0x0, @ANYBLOB="2c747970653d760d07e12c756d61736b3d30"]) 10:28:17 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x800000, 0x7, 0x0, 0x0, 0x0, 0x23}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/vlan/vlan1\x00') r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') sendfile(r1, r2, 0x0, 0x1) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) 10:28:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) alarm(0x0) 10:28:17 executing program 4: 10:28:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)={0x0, 0x1, 0x0}) 10:28:17 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:17 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc337600363940ffb4aed12f0600000000004000000000000000cff47d0100e49caed75d492b415bcee00a06dc3a29612baf81dcfc00568952c44d7405f2a352b2dead26dda86a2f47f8b8c50c906010c31649e12f7441c8e6abd302008c03", 0x67}], 0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 10:28:17 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000100)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@gid={'gid'}}]}) 10:28:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:17 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}, {{&(0x7f00000006c0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000740)=""/99, 0x63}, {&(0x7f0000000c40)=""/20, 0x14}, {&(0x7f0000003d00)=""/4092, 0xffc}, {&(0x7f00000007c0)=""/46, 0x2e}, {&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/37, 0x25}, {&(0x7f0000000980)=""/195, 0xc3}, {&(0x7f0000000a80)=""/255, 0xff}], 0x9, &(0x7f00000029c0)=""/189, 0xbd}, 0x2}, {{&(0x7f0000002a80)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002d80)=[{0x0}, {&(0x7f0000002b80)=""/48, 0x30}, {&(0x7f0000002bc0)=""/197, 0xc5}, {&(0x7f0000002cc0)=""/62, 0x3e}, {&(0x7f0000002d00)=""/42, 0x2a}, {&(0x7f0000002d40)=""/61, 0x3d}], 0x6}, 0x8}], 0x3, 0x10020, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x4, 0x0, 0x8ba, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0xe}, 0x0, 0xc, 0x0, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x60) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xfffffffffffffffc, 0x0, 0x0, 0x2739, 0xfffffffffffffffe, 0x0, 0x8000}, {0x0, 0x0, 0xffffffffffffffff}, 0x1, 0x0, 0x80000000000001}, {{@in=@broadcast, 0xffffffff, 0x6c}, 0x0, @in=@empty, 0x100000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x2}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) r6 = socket$inet6(0xa, 0x0, 0x2) connect$inet6(r6, 0x0, 0x0) 10:28:17 executing program 2: 10:28:17 executing program 1: 10:28:17 executing program 2: 10:28:17 executing program 1: 10:28:17 executing program 0: 10:28:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:17 executing program 2: 10:28:18 executing program 2: 10:28:18 executing program 1: 10:28:18 executing program 4: 10:28:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:18 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:18 executing program 0: 10:28:18 executing program 2: 10:28:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:18 executing program 1: 10:28:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000040, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80002, 0x0) r4 = socket(0x11, 0x3, 0x0) bind(r4, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r6 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000000)={'lo\x00', r5}) 10:28:18 executing program 2: 10:28:18 executing program 1: 10:28:18 executing program 2: 10:28:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:18 executing program 1: 10:28:18 executing program 2: 10:28:19 executing program 2: 10:28:19 executing program 0: 10:28:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:19 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:19 executing program 1: 10:28:19 executing program 1: 10:28:19 executing program 2: 10:28:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:19 executing program 4: 10:28:19 executing program 0: 10:28:19 executing program 2: 10:28:19 executing program 1: 10:28:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:19 executing program 4: 10:28:19 executing program 1: 10:28:19 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:19 executing program 2: 10:28:19 executing program 4: 10:28:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:19 executing program 1: 10:28:19 executing program 0: 10:28:20 executing program 1: 10:28:20 executing program 4: 10:28:20 executing program 2: 10:28:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:20 executing program 4: 10:28:20 executing program 1: 10:28:20 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:20 executing program 2: 10:28:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:20 executing program 4: 10:28:20 executing program 1: 10:28:20 executing program 0: 10:28:20 executing program 2: 10:28:20 executing program 4: 10:28:20 executing program 1: 10:28:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:21 executing program 2: 10:28:21 executing program 4: 10:28:21 executing program 2: 10:28:21 executing program 1: 10:28:21 executing program 4: 10:28:21 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:21 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a3"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:21 executing program 0: 10:28:21 executing program 4: 10:28:21 executing program 2: 10:28:21 executing program 1: 10:28:21 executing program 4: 10:28:21 executing program 2: 10:28:21 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:21 executing program 4: 10:28:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 10:28:22 executing program 1: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x28, 0x2, 0x6, 0x0, 0xf00, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0xfffffffffffffe2b, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000004060102000001000000000000000b000500010007"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 10:28:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1254.903936] audit: type=1804 audit(5882754502.130:378): pid=29216 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir454240870/syzkaller.qkw9fV/1414/cgroup.controllers" dev="sda1" ino=16317 res=1 10:28:22 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a3"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:22 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:22 executing program 1 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1255.561125] FAULT_INJECTION: forcing a failure. [ 1255.561125] name failslab, interval 1, probability 0, space 0, times 0 10:28:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1255.613870] CPU: 1 PID: 29226 Comm: syz-executor.1 Not tainted 4.14.177-syzkaller #0 [ 1255.621803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.631162] Call Trace: [ 1255.633771] dump_stack+0x13e/0x194 [ 1255.637411] should_fail.cold+0x10a/0x14b [ 1255.641569] should_failslab+0xd6/0x130 [ 1255.645548] kmem_cache_alloc_node+0x288/0x7a0 [ 1255.650137] ? netlink_broadcast+0x40/0x40 [ 1255.654376] ? lock_acquire+0x170/0x3f0 [ 1255.658358] __alloc_skb+0x9a/0x4c0 [ 1255.661990] ? skb_trim+0x160/0x160 [ 1255.665619] ? netlink_autobind.isra.0+0xa9/0x290 [ 1255.670467] ? netlink_autobind.isra.0+0x1c5/0x290 [ 1255.675438] netlink_sendmsg+0x7de/0xbe0 [ 1255.679515] ? netlink_unicast+0x620/0x620 [ 1255.683751] ? SYSC_sendto+0x2b0/0x2b0 [ 1255.687643] ? security_socket_sendmsg+0x83/0xb0 [ 1255.692401] ? netlink_unicast+0x620/0x620 [ 1255.696638] sock_sendmsg+0xc5/0x100 [ 1255.700366] ___sys_sendmsg+0x70a/0x840 [ 1255.704402] ? copy_msghdr_from_user+0x380/0x380 [ 1255.709167] ? SOFTIRQ_verbose+0x10/0x10 [ 1255.714190] ? lock_downgrade+0x6e0/0x6e0 [ 1255.718350] ? find_held_lock+0x2d/0x110 [ 1255.722426] ? lock_downgrade+0x6e0/0x6e0 [ 1255.726580] ? __fget+0x228/0x360 [ 1255.730043] ? __fget_light+0x199/0x1f0 [ 1255.734030] ? sockfd_lookup_light+0xb2/0x160 [ 1255.738532] __sys_sendmsg+0xa3/0x120 [ 1255.742338] ? SyS_shutdown+0x160/0x160 [ 1255.747273] ? wait_for_completion+0x390/0x390 [ 1255.751868] ? SyS_read+0x210/0x210 [ 1255.755497] ? SyS_clock_settime+0x1a0/0x1a0 [ 1255.759910] SyS_sendmsg+0x27/0x40 [ 1255.763454] ? __sys_sendmsg+0x120/0x120 [ 1255.767523] do_syscall_64+0x1d5/0x640 [ 1255.771420] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1255.777651] RIP: 0033:0x45c829 [ 1255.780840] RSP: 002b:00007f2d7a351c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1255.788552] RAX: ffffffffffffffda RBX: 00000000004fc280 RCX: 000000000045c829 [ 1255.795827] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1255.803110] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:28:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:23 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1255.810384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1255.818094] R13: 00000000000008df R14: 00000000004cb81e R15: 00007f2d7a3526d4 10:28:23 executing program 1 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1255.886003] FAULT_INJECTION: forcing a failure. [ 1255.886003] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.907407] CPU: 1 PID: 29244 Comm: syz-executor.2 Not tainted 4.14.177-syzkaller #0 [ 1255.915321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1255.924693] Call Trace: [ 1255.927314] dump_stack+0x13e/0x194 [ 1255.930956] should_fail.cold+0x10a/0x14b [ 1255.935111] should_failslab+0xd6/0x130 [ 1255.939097] kmem_cache_alloc_node+0x288/0x7a0 [ 1255.943688] ? netlink_broadcast+0x40/0x40 [ 1255.947930] ? lock_acquire+0x170/0x3f0 [ 1255.951907] __alloc_skb+0x9a/0x4c0 [ 1255.955534] ? skb_trim+0x160/0x160 [ 1255.959161] ? netlink_autobind.isra.0+0xa9/0x290 [ 1255.964005] ? netlink_autobind.isra.0+0x1c5/0x290 [ 1255.968945] netlink_sendmsg+0x7de/0xbe0 [ 1255.973014] ? netlink_unicast+0x620/0x620 [ 1255.977252] ? SYSC_sendto+0x2b0/0x2b0 [ 1255.981174] ? security_socket_sendmsg+0x83/0xb0 [ 1255.985932] ? netlink_unicast+0x620/0x620 [ 1255.990169] sock_sendmsg+0xc5/0x100 [ 1255.993892] ___sys_sendmsg+0x70a/0x840 [ 1255.997771] FAULT_INJECTION: forcing a failure. [ 1255.997771] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.997871] ? copy_msghdr_from_user+0x380/0x380 [ 1256.013808] ? SOFTIRQ_verbose+0x10/0x10 [ 1256.017884] ? lock_downgrade+0x6e0/0x6e0 [ 1256.022048] ? find_held_lock+0x2d/0x110 [ 1256.026128] ? lock_downgrade+0x6e0/0x6e0 [ 1256.030278] ? __fget+0x228/0x360 [ 1256.033733] ? __fget_light+0x199/0x1f0 [ 1256.037715] ? sockfd_lookup_light+0xb2/0x160 [ 1256.042212] __sys_sendmsg+0xa3/0x120 [ 1256.046011] ? SyS_shutdown+0x160/0x160 [ 1256.049992] ? wait_for_completion+0x390/0x390 [ 1256.054576] ? SyS_read+0x210/0x210 [ 1256.058190] ? SyS_clock_settime+0x1a0/0x1a0 [ 1256.062592] SyS_sendmsg+0x27/0x40 [ 1256.066121] ? __sys_sendmsg+0x120/0x120 [ 1256.070167] do_syscall_64+0x1d5/0x640 [ 1256.074064] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1256.079250] RIP: 0033:0x45c829 [ 1256.082429] RSP: 002b:00007fe16f03ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1256.090133] RAX: ffffffffffffffda RBX: 00000000004fd400 RCX: 000000000045c829 [ 1256.097388] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 1256.104642] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1256.111899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1256.119159] R13: 0000000000000925 R14: 00000000004cbc1b R15: 00007fe16f03b6d4 [ 1256.126427] CPU: 0 PID: 29248 Comm: syz-executor.1 Not tainted 4.14.177-syzkaller #0 [ 1256.134321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.143681] Call Trace: [ 1256.146273] dump_stack+0x13e/0x194 [ 1256.149912] should_fail.cold+0x10a/0x14b [ 1256.154070] should_failslab+0xd6/0x130 [ 1256.158047] kmem_cache_alloc_node_trace+0x292/0x7b0 [ 1256.163168] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1256.168625] ? __alloc_skb+0x9a/0x4c0 [ 1256.172418] __kmalloc_node_track_caller+0x38/0x70 [ 1256.177441] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1256.182343] __alloc_skb+0xca/0x4c0 [ 1256.185955] ? skb_trim+0x160/0x160 [ 1256.189590] ? netlink_autobind.isra.0+0xa9/0x290 [ 1256.194882] ? netlink_autobind.isra.0+0x1c5/0x290 [ 1256.199806] netlink_sendmsg+0x7de/0xbe0 [ 1256.203850] ? netlink_unicast+0x620/0x620 [ 1256.208064] ? SYSC_sendto+0x2b0/0x2b0 [ 1256.211933] ? security_socket_sendmsg+0x83/0xb0 [ 1256.216689] ? netlink_unicast+0x620/0x620 [ 1256.220903] sock_sendmsg+0xc5/0x100 [ 1256.224611] ___sys_sendmsg+0x70a/0x840 [ 1256.228584] ? copy_msghdr_from_user+0x380/0x380 [ 1256.233337] ? SOFTIRQ_verbose+0x10/0x10 [ 1256.237383] ? lock_downgrade+0x6e0/0x6e0 [ 1256.241526] ? find_held_lock+0x2d/0x110 [ 1256.245573] ? lock_downgrade+0x6e0/0x6e0 [ 1256.249705] ? __fget+0x228/0x360 [ 1256.253142] ? __fget_light+0x199/0x1f0 [ 1256.257095] ? sockfd_lookup_light+0xb2/0x160 [ 1256.261582] __sys_sendmsg+0xa3/0x120 [ 1256.265376] ? SyS_shutdown+0x160/0x160 [ 1256.269349] ? wait_for_completion+0x390/0x390 [ 1256.273931] ? SyS_read+0x210/0x210 [ 1256.277541] ? SyS_clock_settime+0x1a0/0x1a0 [ 1256.281949] SyS_sendmsg+0x27/0x40 [ 1256.285469] ? __sys_sendmsg+0x120/0x120 [ 1256.289511] do_syscall_64+0x1d5/0x640 [ 1256.293397] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1256.298592] RIP: 0033:0x45c829 [ 1256.301762] RSP: 002b:00007f2d7a330c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1256.309467] RAX: ffffffffffffffda RBX: 00000000004fc280 RCX: 000000000045c829 [ 1256.316723] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1256.323979] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1256.331231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1256.338496] R13: 00000000000008df R14: 00000000004cb81e R15: 00007f2d7a3316d4 10:28:23 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a3"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:23 executing program 0 (fault-call:2 fault-nth:0): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:23 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:23 executing program 1 (fault-call:4 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1256.480715] FAULT_INJECTION: forcing a failure. [ 1256.480715] name failslab, interval 1, probability 0, space 0, times 0 [ 1256.494686] CPU: 1 PID: 29258 Comm: syz-executor.1 Not tainted 4.14.177-syzkaller #0 [ 1256.502596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.512912] Call Trace: [ 1256.515509] dump_stack+0x13e/0x194 [ 1256.519156] should_fail.cold+0x10a/0x14b [ 1256.523326] should_failslab+0xd6/0x130 [ 1256.527312] kmem_cache_alloc_node+0x288/0x7a0 [ 1256.531908] ? wait_for_completion+0x390/0x390 [ 1256.536502] __alloc_skb+0x9a/0x4c0 [ 1256.540137] ? skb_trim+0x160/0x160 [ 1256.543780] netlink_ack+0x20b/0x980 [ 1256.547501] ? netlink_sendmsg+0xbe0/0xbe0 [ 1256.551743] netlink_rcv_skb+0x2ba/0x370 [ 1256.555810] ? nfnetlink_bind+0x240/0x240 [ 1256.559961] ? netlink_ack+0x980/0x980 [ 1256.563861] ? ns_capable_common+0x127/0x150 [ 1256.568282] nfnetlink_rcv+0x1ab/0x1650 [ 1256.572268] ? check_preemption_disabled+0x35/0x240 10:28:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1256.577314] ? perf_trace_lock+0x109/0x4b0 [ 1256.582252] ? save_trace+0x290/0x290 [ 1256.586054] ? save_trace+0x290/0x290 [ 1256.589865] ? SOFTIRQ_verbose+0x10/0x10 [ 1256.593935] ? nfnl_err_del+0x150/0x150 [ 1256.597916] ? find_held_lock+0x2d/0x110 [ 1256.601990] ? netlink_deliver_tap+0x90/0x860 [ 1256.606518] ? rcu_is_watching+0x11/0xb0 [ 1256.610586] ? lock_downgrade+0x6e0/0x6e0 [ 1256.614749] netlink_unicast+0x437/0x620 [ 1256.618819] ? netlink_attachskb+0x600/0x600 [ 1256.623243] netlink_sendmsg+0x733/0xbe0 [ 1256.627319] ? netlink_unicast+0x620/0x620 10:28:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1256.631555] ? SYSC_sendto+0x2b0/0x2b0 [ 1256.635450] ? security_socket_sendmsg+0x83/0xb0 [ 1256.640212] ? netlink_unicast+0x620/0x620 [ 1256.644453] sock_sendmsg+0xc5/0x100 [ 1256.648176] ___sys_sendmsg+0x70a/0x840 [ 1256.652166] ? copy_msghdr_from_user+0x380/0x380 [ 1256.656933] ? SOFTIRQ_verbose+0x10/0x10 [ 1256.661035] ? lock_downgrade+0x6e0/0x6e0 [ 1256.665228] ? find_held_lock+0x2d/0x110 [ 1256.668733] FAULT_INJECTION: forcing a failure. [ 1256.668733] name failslab, interval 1, probability 0, space 0, times 0 [ 1256.669401] ? lock_downgrade+0x6e0/0x6e0 [ 1256.669419] ? __fget+0x228/0x360 [ 1256.669433] ? __fget_light+0x199/0x1f0 [ 1256.669445] ? sockfd_lookup_light+0xb2/0x160 [ 1256.669457] __sys_sendmsg+0xa3/0x120 [ 1256.669467] ? SyS_shutdown+0x160/0x160 [ 1256.669484] ? wait_for_completion+0x390/0x390 [ 1256.709006] ? SyS_read+0x210/0x210 [ 1256.712631] ? SyS_clock_settime+0x1a0/0x1a0 [ 1256.717030] SyS_sendmsg+0x27/0x40 [ 1256.720574] ? __sys_sendmsg+0x120/0x120 [ 1256.724731] do_syscall_64+0x1d5/0x640 10:28:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1256.728622] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1256.733811] RIP: 0033:0x45c829 [ 1256.737001] RSP: 002b:00007f2d7a351c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1256.744714] RAX: ffffffffffffffda RBX: 00000000004fc280 RCX: 000000000045c829 [ 1256.752773] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1256.760051] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1256.767325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1256.774600] R13: 00000000000008df R14: 00000000004cb81e R15: 00007f2d7a3526d4 10:28:24 executing program 2: setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000500)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x80000001, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="8ca793db3d78e5b6c1d0ed24a1ca0f359996f9545d3623d9bd99bae6f5364f955d8dffadb1f7a4c7967c5334de2ac5a33e898b6c9808747215b57426f5dcea55e8506b8b", 0x44, 0x9}, {&(0x7f0000000400)="48602637b053169a6bf12450419035bac32bade64a14f5d1a5271bb0bc17419563d4ad293e1b3938ebe363f94d913857c83c99f485f8e0308ab6ba3e71c52c34d00985dd55dd5560bd7bf51ac6c194cd87a256ce9110f51e35666b2fd840fbabb076c1cb1bc1244c4cf1f5298fd2ab76325cc4f0ee408a869da10f7d3aff504228a495c883efc9fdc044916f5437", 0x8e, 0x80000000}], 0x2a0b400, &(0x7f0000000640)={[{@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}], [{@fowner_gt={'fowner>', r3}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x23}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_role={'obj_role'}}]}) r4 = geteuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e489af81690d90890a0c4dd9f64f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07", @ANYRESHEX, @ANYRESDEC, @ANYBLOB="2c27726f757036a7aeaab788765f69643d08e8af42572ee4c690cc24e3b7c33e23333d48010400000000000043c859cf76e963547629164f261bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d8d89799b8c8bb6f931c7204ecfb72223e584921270bfdb079355a193a86e814fe95d28f2adfbc481ba57ad9a3feba948c712dae4d9f1f72e530fc6a06db8f8899f59c6230acab0d99b42d1199eff2c124039e96b272e61a86a06f415efd08cafa9e2f06c7320b0f8ffffffffffffff42fef3d2ed979a947cdc7fe3b5e474c6", @ANYRESDEC=r5, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2ca3d526c246b71b73723d7b6261630000000072616e736d7574753d2f6465762f6b766d002c00ae3ad4bce20971cc0567d813ecfd861a6120e4dab49e2f919dd8aa9aef019450a3b04f977ee65f01000000f061bf91999b942e04792d53cc636019e31925132a5ccab623b1cb6347369444bc39a00634820a70faa90697774515ddbfe72bcd34488b253bee7101ca59d6fb269f597cf6eeb09a10c4c41e85f2ba912153b8"]) setgid(r5) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, r4, r5}, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000500)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x80000001, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="8ca793db3d78e5b6c1d0ed24a1ca0f359996f9545d3623d9bd99bae6f5364f955d8dffadb1f7a4c7967c5334de2ac5a33e898b6c9808747215b57426f5dcea55e8506b8b", 0x44, 0x9}, {&(0x7f0000000400)="48602637b053169a6bf12450419035bac32bade64a14f5d1a5271bb0bc17419563d4ad293e1b3938ebe363f94d913857c83c99f485f8e0308ab6ba3e71c52c34d00985dd55dd5560bd7bf51ac6c194cd87a256ce9110f51e35666b2fd840fbabb076c1cb1bc1244c4cf1f5298fd2ab76325cc4f0ee408a869da10f7d3aff504228a495c883efc9fdc044916f5437", 0x8e, 0x80000000}], 0x2a0b400, &(0x7f0000000640)={[{@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}], [{@fowner_gt={'fowner>', r9}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x23}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_role={'obj_role'}}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000740)={0x2a8, 0xffffffffffffffda, 0x6, [{{0x4, 0x2, 0x20, 0x8, 0x6, 0x9c, {0x5, 0x1d1800000, 0x20, 0x1000, 0x6, 0x9, 0x200, 0x4, 0x2, 0x6, 0xbb, 0x0, 0x0, 0x16d3f242, 0x101}}, {0x6, 0x200, 0x11, 0x8, ',securityuseruser'}}, {{0x2, 0x0, 0xffffffffffffffe0, 0x3ff, 0x3, 0x0, {0x2, 0x7, 0x10001, 0x1, 0x1, 0x10001, 0x83d, 0x7, 0x7fff, 0x5, 0x10000, 0x0, 0x0, 0x1, 0x6}}, {0x3, 0x7, 0xc, 0x0, 'em0(vboxnet0'}}, {{0x6, 0x0, 0x80000001, 0x101, 0x9, 0x36cb, {0x6, 0x4, 0xffffffffffffff80, 0x9, 0x0, 0x1ff, 0x8, 0x5, 0x0, 0x100, 0xc78, r3, r5, 0x3, 0x4}}, {0x3, 0x6, 0x6, 0x9, 'ppp0\\\''}}, {{0x1, 0x1, 0x5d8, 0xfdc, 0x1000, 0x2, {0x4, 0xfffffffffffffffb, 0x6, 0x4, 0xff, 0x80, 0x8, 0xac97, 0x3f, 0x5, 0x4a6c, r9, r10, 0x2, 0x9}}, {0x5, 0x4c38, 0x1, 0x101, '('}}]}, 0x2a8) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r11, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1256.876886] CPU: 0 PID: 29269 Comm: syz-executor.0 Not tainted 4.14.177-syzkaller #0 [ 1256.884845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1256.894380] Call Trace: [ 1256.896967] dump_stack+0x13e/0x194 [ 1256.900592] should_fail.cold+0x10a/0x14b [ 1256.904747] should_failslab+0xd6/0x130 [ 1256.908727] __kmalloc+0x2e9/0x7c0 [ 1256.912275] ? SOFTIRQ_verbose+0x10/0x10 [ 1256.916326] ? rw_copy_check_uvector+0x1d4/0x290 [ 1256.921087] rw_copy_check_uvector+0x1d4/0x290 [ 1256.925665] ? check_preemption_disabled+0x35/0x240 [ 1256.930672] import_iovec+0x94/0x360 [ 1256.934385] ? dup_iter+0x240/0x240 [ 1256.938008] ? perf_trace_lock+0x109/0x4b0 [ 1256.942242] vfs_readv+0xb3/0x130 [ 1256.945695] ? compat_rw_copy_check_uvector+0x320/0x320 [ 1256.951054] ? find_held_lock+0x2d/0x110 [ 1256.955103] ? __fget+0x201/0x360 [ 1256.958547] ? lock_downgrade+0x6e0/0x6e0 [ 1256.962682] ? __fget+0x228/0x360 [ 1256.966126] do_preadv+0x161/0x200 [ 1256.969652] ? do_readv+0x2c0/0x2c0 [ 1256.973266] ? SyS_clock_settime+0x1a0/0x1a0 [ 1256.977930] ? do_syscall_64+0x4c/0x640 [ 1256.981903] ? SyS_writev+0x30/0x30 [ 1256.985517] do_syscall_64+0x1d5/0x640 [ 1256.989390] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1256.994561] RIP: 0033:0x45c829 [ 1256.997732] RSP: 002b:00007f42ae98ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1257.005439] RAX: ffffffffffffffda RBX: 00000000004fa1c0 RCX: 000000000045c829 [ 1257.013711] RDX: 0000000000000315 RSI: 00000000200017c0 RDI: 0000000000000003 [ 1257.020967] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1257.028336] R10: 0000000000800000 R11: 0000000000000246 R12: 0000000000000004 [ 1257.035595] R13: 000000000000085c R14: 00000000004cb1c7 R15: 00007f42ae98f6d4 10:28:24 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adb"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:24 executing program 1 (fault-call:4 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:24 executing program 0 (fault-call:2 fault-nth:1): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x131000, 0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000040)=0x100) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], 0x1}}, 0x94) 10:28:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1257.685899] FAULT_INJECTION: forcing a failure. [ 1257.685899] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.706953] CPU: 1 PID: 29295 Comm: syz-executor.1 Not tainted 4.14.177-syzkaller #0 [ 1257.714968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1257.724350] Call Trace: [ 1257.726950] dump_stack+0x13e/0x194 [ 1257.730627] should_fail.cold+0x10a/0x14b 10:28:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1257.734787] should_failslab+0xd6/0x130 [ 1257.738858] kmem_cache_alloc_node_trace+0x292/0x7b0 [ 1257.743970] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1257.749426] ? __alloc_skb+0x9a/0x4c0 [ 1257.753235] __kmalloc_node_track_caller+0x38/0x70 [ 1257.758174] __kmalloc_reserve.isra.0+0x35/0xd0 [ 1257.762860] __alloc_skb+0xca/0x4c0 [ 1257.766495] ? skb_trim+0x160/0x160 [ 1257.770136] netlink_ack+0x20b/0x980 [ 1257.774121] ? netlink_sendmsg+0xbe0/0xbe0 [ 1257.778370] netlink_rcv_skb+0x2ba/0x370 [ 1257.782440] ? nfnetlink_bind+0x240/0x240 10:28:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1257.786592] ? netlink_ack+0x980/0x980 [ 1257.790488] ? ns_capable_common+0x127/0x150 [ 1257.794909] nfnetlink_rcv+0x1ab/0x1650 [ 1257.798898] ? check_preemption_disabled+0x35/0x240 [ 1257.803923] ? perf_trace_lock+0x109/0x4b0 [ 1257.808251] ? save_trace+0x290/0x290 [ 1257.812061] ? save_trace+0x290/0x290 [ 1257.815871] ? SOFTIRQ_verbose+0x10/0x10 [ 1257.819935] ? nfnl_err_del+0x150/0x150 [ 1257.823912] ? find_held_lock+0x2d/0x110 [ 1257.827976] ? netlink_deliver_tap+0x90/0x860 [ 1257.832485] ? rcu_is_watching+0x11/0xb0 10:28:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1257.836639] ? lock_downgrade+0x6e0/0x6e0 [ 1257.840803] netlink_unicast+0x437/0x620 [ 1257.844871] ? netlink_attachskb+0x600/0x600 [ 1257.849292] netlink_sendmsg+0x733/0xbe0 [ 1257.853375] ? netlink_unicast+0x620/0x620 [ 1257.857789] ? SYSC_sendto+0x2b0/0x2b0 [ 1257.861691] ? security_socket_sendmsg+0x83/0xb0 [ 1257.866455] ? netlink_unicast+0x620/0x620 [ 1257.870696] sock_sendmsg+0xc5/0x100 [ 1257.874418] ___sys_sendmsg+0x70a/0x840 [ 1257.878400] ? copy_msghdr_from_user+0x380/0x380 [ 1257.883169] ? SOFTIRQ_verbose+0x10/0x10 [ 1257.887235] ? lock_downgrade+0x6e0/0x6e0 [ 1257.891395] ? find_held_lock+0x2d/0x110 [ 1257.895470] ? lock_downgrade+0x6e0/0x6e0 [ 1257.899635] ? __fget+0x228/0x360 [ 1257.903097] ? __fget_light+0x199/0x1f0 [ 1257.907085] ? sockfd_lookup_light+0xb2/0x160 [ 1257.911590] __sys_sendmsg+0xa3/0x120 [ 1257.915398] ? SyS_shutdown+0x160/0x160 [ 1257.919376] ? wait_for_completion+0x390/0x390 [ 1257.924008] ? SyS_read+0x210/0x210 [ 1257.927645] ? SyS_clock_settime+0x1a0/0x1a0 [ 1257.928183] FAULT_INJECTION: forcing a failure. [ 1257.928183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1257.932059] SyS_sendmsg+0x27/0x40 [ 1257.947394] ? __sys_sendmsg+0x120/0x120 [ 1257.951445] do_syscall_64+0x1d5/0x640 [ 1257.955330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1257.960523] RIP: 0033:0x45c829 [ 1257.963693] RSP: 002b:00007f2d7a351c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1257.971384] RAX: ffffffffffffffda RBX: 00000000004fc280 RCX: 000000000045c829 [ 1257.978633] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000006 [ 1257.985882] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1257.993141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1258.000389] R13: 00000000000008df R14: 00000000004cb81e R15: 00007f2d7a3526d4 [ 1258.007657] CPU: 0 PID: 29316 Comm: syz-executor.0 Not tainted 4.14.177-syzkaller #0 [ 1258.015535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1258.024887] Call Trace: [ 1258.027477] dump_stack+0x13e/0x194 [ 1258.031113] should_fail.cold+0x10a/0x14b [ 1258.035266] __alloc_pages_nodemask+0x1bf/0x700 [ 1258.039939] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1258.044960] ? find_held_lock+0x2d/0x110 [ 1258.050788] cache_grow_begin+0x7b/0x410 [ 1258.054845] __kmalloc+0x6dd/0x7c0 [ 1258.058396] ? rw_copy_check_uvector+0x1d4/0x290 [ 1258.063221] rw_copy_check_uvector+0x1d4/0x290 [ 1258.067833] ? check_preemption_disabled+0x35/0x240 [ 1258.072845] import_iovec+0x94/0x360 [ 1258.076599] ? dup_iter+0x240/0x240 [ 1258.080209] ? perf_trace_lock+0x109/0x4b0 [ 1258.084432] vfs_readv+0xb3/0x130 [ 1258.087865] ? compat_rw_copy_check_uvector+0x320/0x320 [ 1258.093216] ? find_held_lock+0x2d/0x110 [ 1258.097268] ? __fget+0x201/0x360 [ 1258.100805] ? lock_downgrade+0x6e0/0x6e0 [ 1258.104941] ? __fget+0x228/0x360 [ 1258.108378] do_preadv+0x161/0x200 [ 1258.111905] ? do_readv+0x2c0/0x2c0 [ 1258.115612] ? SyS_clock_settime+0x1a0/0x1a0 [ 1258.120022] ? do_syscall_64+0x4c/0x640 [ 1258.123978] ? SyS_writev+0x30/0x30 [ 1258.127658] do_syscall_64+0x1d5/0x640 [ 1258.131557] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1258.136746] RIP: 0033:0x45c829 [ 1258.139925] RSP: 002b:00007f42ae98ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1258.147613] RAX: ffffffffffffffda RBX: 00000000004fa1c0 RCX: 000000000045c829 [ 1258.154871] RDX: 0000000000000315 RSI: 00000000200017c0 RDI: 0000000000000003 [ 1258.162135] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1258.169388] R10: 0000000000800000 R11: 0000000000000246 R12: 0000000000000004 [ 1258.176644] R13: 000000000000085c R14: 00000000004cb1c7 R15: 00007f42ae98f6d4 10:28:25 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adb"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 1 (fault-call:4 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 0 (fault-call:2 fault-nth:2): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)=0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000980)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000740)={0x204, 0x14, 0x3, 0x3, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x7}, [@nested={0xd1, 0xc, 0x0, 0x1, [@generic="132e3f2366c33ecf7d17f2861ad435c3f767e94b513f7bcd2c301ebd1353079a15c704cb85e77cde7018c589da8145188f7b72297cae81bcd9e6a2b9e3cb99aa107d4ce3ffcdc723089b2ebee6a2599f23de6a639796ff733a316652d75dae7925bfd4f7e21af47e27ee18bcaa77dd374d1f80ff86b09ae9f11778423d93feb34457f0531403003261d8ad2c1654844bc6ba3e", @typed={0x8, 0x82, 0x0, 0x0, @uid=r2}, @typed={0xc, 0x78, 0x0, 0x0, @u64=0xffffffff}, @generic="d127ece306a30642871fbd928f2bfee409c2a20b7760cf32ed6ed88182c9183304ac84aee9db"]}, @generic="9301f3772f041196ef3125ba7e8db711d0c96c2dae64588778c407a2e8f575c07d3e8c69a1f025e4148fd4eb58c04ff16eacb29431e7c1e71e17330a060c65637dd9401742bc177487ec2efa66f5813ff39f16dad09fe56137e4c9fdae489a5d0f3c44e173ed5a3b8a8035d259983f85d2b98ec9d937c2629d48a04407a9d79392a1c12eaab4ac0fe24ae3fe02a8353f068460264fe5c84ae04aca973e569540c69d873cb65640be734bb90395c5a02afc0635601795f11995bf58bea6bbd15d622d6004", @nested={0x8, 0x57, 0x0, 0x1, [@typed={0x4, 0x3f}]}, @nested={0x18, 0x66, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64=0x800}, @typed={0x8, 0x39, 0x0, 0x0, @ipv4=@remote}]}, @typed={0x36, 0x27, 0x0, 0x0, @str='\'\\proc\\-(wlan0N&loselfposix_acl_accessproc$md5sum\x00'}]}, 0x204}, 0x1, 0x0, 0x0, 0x800}, 0x6686d0f7bd7d322f) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140), 0x13}, 0x4001) 10:28:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x0, 0xd) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adb"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x522f58c7ff5ac33d}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000100)={0x28, r3, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, [], 0x1}}]}, 0x28}}, 0x44000) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount$9p_xen(&(0x7f0000000580)='syz\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x2000400, &(0x7f0000000640)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@fsname={'fsname', 0x3d, 'proc@'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000440)=""/156) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0xe0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, &(0x7f0000000080), {[{{@ip={@remote, @multicast1, 0xffffff00, 0xff, 'lo\x00', 'netdevsim0\x00', {0xff}, {}, 0x88}, 0x0, 0xc0, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x6}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x1, 0x18}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@remote, @remote, 0xffffffff, 0x0, 'veth0_virt_wifi\x00', 'veth1_vlan\x00', {0xff}, {}, 0x89, 0x2}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x400, 0xb9, 0x8, 'syz0\x00', 'syz0\x00', {0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) ioctl$BLKGETSIZE64(r7, 0x80081272, &(0x7f00000006c0)) 10:28:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/128, 0x80}, {&(0x7f0000000100)=""/20, 0x16}], 0x10000000000001f1, 0x800000) 10:28:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1624], 0x1}}, 0x0) 10:28:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5fb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149e699e0dc04c6f1553f1d"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000740)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x2, 0x6, 0x3, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 10:28:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:26 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1259.565131] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING 10:28:27 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:27 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x1, 0x1, 0x7}}, 0x14) getsockname$netrom(r0, &(0x7f0000000280)={{0x3, @rose}, [@default, @bcast, @default, @default, @bcast, @netrom, @null, @null]}, &(0x7f0000000340)=0x48) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000200)={0x6, 0x2, 0xab52, 0x2, 'syz1\x00', 0x9}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040), 0x0, 0x0) bind(r1, &(0x7f0000000100)=@hci={0x1f, 0x4, 0x4}, 0x80) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimensat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {r4, r5/1000+60000}}, 0x100) r6 = socket$nl_rdma(0x10, 0x3, 0x14) preadv(r6, &(0x7f00000017c0), 0x0, 0x1) 10:28:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) rt_sigtimedwait(&(0x7f0000000080)={[0x3f]}, &(0x7f00000000c0), &(0x7f0000000180)={0x77359400}, 0x8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0/../file0\x00') r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./bus\x00', r1, &(0x7f0000000080)='./file2\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000040)=0x5) 10:28:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1260.448523] selinux_nlmsg_perm: 148 callbacks suppressed [ 1260.448532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pig=29409 comm=syz-executor.1 10:28:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1261.199452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pig=29424 comm=syz-executor.1 10:28:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x140f, 0xb00, 0x70bd2c, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x40801}, 0x0) preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) 10:28:28 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r2}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r2, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @rand_addr=0x64010102}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e23, 0x3, @ipv4={[], [], @rand_addr=0x64010102}, 0x9ad}}, 0x8001, 0x6}, &(0x7f0000000100)=0x90) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000080)=0x5, 0x4) 10:28:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/snd/timer\x00', 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) waitid$P_PIDFD(0x3, r1, 0x0, 0x2, &(0x7f0000000000)) 10:28:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000200012800b00010067656e65766500001000028006000500030000000400060008000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="caac9dddbc277f7d75126e39e84c7c8f45fb0ce67fe0c697985857360b9da9c17fce6a18ef62472db644"], 0x50}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00', 0x4, r3}) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r4, &(0x7f00000017c0), 0x315, 0x800000) 10:28:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0xa00000, 0xffffffff, 0x7fffffff, r3, 0x0, &(0x7f0000000040)={0x9909dd, 0x6, [], @string=&(0x7f0000000000)=0x20}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r5}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r5, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000140)={0x9, 0x8208, 0x6, 0x8, r5}, &(0x7f0000000180)=0x10) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r6, &(0x7f00000017c0), 0x315, 0x800000) 10:28:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, 0x6, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x4040881) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)='+eth0\x00') 10:28:29 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0xc) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:29 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:28:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) 10:28:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000100)={0x3b300000, 0x0, [], {0x0, @reserved}}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2d696f202d637075202d6d656d6f7279202b70696473202b5bac5eb47221f1d872646d61209616cb9461e814dac8f87f928056a5ad0210a4b02a1f358db75284426fb6647e512d5ecec4692e06014e380cee4211847e23869eed3de18ccfaf052bb14f16cbdac34576d5f6d9276485ff646a14afecac3b6579f2a9d9b5d841c4596d8722901cd40a6c31bf62994b4dd4ac37c7fd12271df72325684e9ca9786cdfffcc7992183869b22e55c178b85329bbe56860a14c4e4b54f1a259aa334d1e2ccace192376bd7868fe1675b9f50d3aaa3e2e5cb2b58362f5490a76a2bfeab86d3eba2c2082a3220d15"], 0x25) 10:28:30 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'keyringem1\x00'}, &(0x7f0000000180)=""/178, 0xb2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x15) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x0, 'veth0_to_hsr\x00', {0x2}, 0x1f}) 10:28:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000040)) write$binfmt_aout(r1, &(0x7f0000000380)={{0x108, 0x1, 0x2, 0x93, 0x182, 0x80, 0x1f2, 0x900}, "723a542a6f63152c0362dcd78d92a90d5ee225671c1d276864727785940c102b0acdbf5dac8c30a67ba8a74e0b9231b3ce88b0b0d0740c2645e92d59527c0d57f7074882d49dc8d6f0de6c4cd361cd8f2a8e60f36b6050812d5be38204bb5bc65020dff42f7a074a00032f4cfc89a747b5af8a86b58ce47aa4c97d725071ba1d58984160f2cb47a4e261f11f3f40aeefc2fb729e18bdfe439ea403a06e8c049c248677ee5056bd9c0df00cdae4361f3569595c1c1c1d165a5f94188111e890eb1a215053c0ba142f4d9e53c9db044249a7d5c72a21ac6651", [[], [], [], [], [], [], []]}, 0x7f8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x800, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000500)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x80000001, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="8ca793db3d78e5b6c1d0ed24a1ca0f359996f9545d3623d9bd99bae6f5364f955d8dffadb1f7a4c7967c5334de2ac5a33e898b6c9808747215b57426f5dcea55e8506b8b", 0x44, 0x9}, {&(0x7f0000000400)="48602637b053169a6bf12450419035bac32bade64a14f5d1a5271bb0bc17419563d4ad293e1b3938ebe363f94d913857c83c99f485f8e0308ab6ba3e71c52c34d00985dd55dd5560bd7bf51ac6c194cd87a256ce9110f51e35666b2fd840fbabb076c1cb1bc1244c4cf1f5298fd2ab76325cc4f0ee408a869da10f7d3aff504228a495c883efc9fdc044916f5437", 0x8e, 0x80000000}], 0x2a0b400, &(0x7f0000000640)={[{@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}], [{@fowner_gt={'fowner>', r6}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x23}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_role={'obj_role'}}]}) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x401, 0x6, &(0x7f0000001ec0)=[{&(0x7f0000000b80)="f0bf93864bd3524fef1bce93c3397109c9c15cc1a97db441fb8ab219cfb8351655cfbdaafb25fea8a0a198de3a4cdc1ef083642aaa930d93ebd8abee0f521d5ac0b2cb45d962f372dd8cbbaa6c97a2c90067c5dc16ab0f42578ee30a523fdd79a602111806182abf1ad791dcd97f15ee4102c4a6921c4080adfbe49c1203fec9c9546c4fbfd88889a9e71040d07523c265cd2e7bccbbb3dccf7b839f5967bb976ec2e945a1a903a58de6978dc22e1394c62edf7f63564de7a1b91492bd150a0d29b2e7f00780d53a3eb3fee8032ad20d5c77e962fca9c6a206c1f00afd01df643f13f300f751dba2243005d14c72792daa59e96bb2f562", 0xf7, 0x80}, {&(0x7f0000000c80)="49a135098cbae261a888cab23342f6127145dd53913bf92be36b", 0x1a, 0xab}, {&(0x7f0000000cc0)="671e89793acd03f9f4a8378e87f41b8609f0c19f88952073b06b225c1838e57498b24c8c68e73e7739e316388a98c01b93bb9e259e98f419d6fed011800575a7a9c245f32b26861f44dc72ef86b8353e934ff338fbc4f602d8a7999f439c0f689bffd38b23aff73fd169b4b9becca6fa3d4e55c24d5f0fdf60dc93658d360f3db70e01e676f874f49cb24da11fc1f0a05342", 0x92, 0x438b678a}, {&(0x7f0000000d80)="031afd2fc7b10e18a10b11dec4d193ee71d61f85a2f57aede520a677bf6c02a22b535c0278f66f6a636d4cd16a6f83aa993761bbca92f8d16eded07009a9a626456fbb9c303cf0c6111ae757d20e31b88e7f0f5c6f3ca82923eead133e4f0fd521912f4d0af20d938340b745213615d4a40cf85eb73ac3cddf5f5ec91dbcf01d37aaa33098b7bb074a6d1265b16038224036c271a83f1ae8ce6dae71e3210e29492c4667660dee15ba67", 0xaa, 0xfffffffffffffffe}, {&(0x7f0000000e40)="3750277686efb5d89feefc1188445675e039b84e9cd89d5cd43c2484b790c6003a132e0d6777fb5ae54e23870e797097ecd4a042c8a0d91bba4bf87f5c65f5fceb53631d433d04db7e47dc8fc64722d308a76b6d918bf3f957a88abc9427acc7c18f", 0x62, 0x8}, {&(0x7f0000000ec0)="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", 0x1000, 0x3}], 0x80000, &(0x7f0000001f80)={[{@cruft='cruft'}, {@nojoliet='nojoliet'}, {@overriderock='overriderockperm'}], [{@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r6}}, {@uid_lt={'uid<', 0xee00}}]}) r7 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000080)) socket$inet(0x10, 0x3, 0xc) r9 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmsg(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="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", 0x114}], 0x1}, 0xc0) 10:28:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x6, 0x80000001, 0x2, 0x100}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000280)=""/4096) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) 10:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r4, 0x40084149, &(0x7f00000000c0)=0x10000) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000080)=0x6) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:31 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x100000001) 10:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYRES32=r1, @ANYRESHEX=r5], 0x4}}, 0x0) 10:28:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = accept$netrom(r0, 0x0, &(0x7f0000000000)) ftruncate(r1, 0x1000) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) membarrier(0x1, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000d80)=ANY=[]}}, 0x0) 10:28:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x38000, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f00000001c0)={0x40, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) nanosleep(&(0x7f0000000240)={r1, r2+60000000}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 10:28:32 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup(r7) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = dup(r2) ioctl$MON_IOCG_STATS(r8, 0x80089203, &(0x7f0000000000)) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) r3 = semget$private(0x0, 0x3, 0x80) semctl$GETNCNT(r3, 0x3, 0xe, &(0x7f0000000080)=""/91) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9a0000, 0x1, 0x4, r4, 0x0, &(0x7f0000000100)={0xa20929, 0x4, [], @value64=0x200}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8983, &(0x7f00000001c0)={0x8, 'sit0\x00', {'geneve1\x00'}, 0x20}) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000280)={0xa00000, 0x9dd, 0xc4b3, r7, 0x0, &(0x7f0000000200)={0x990902, 0x7, [], @ptr=0x5}}) mmap$usbmon(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x1000000, 0x11, r8, 0x2) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x3000, &(0x7f0000000080), 0x0, r1, 0x3}) 10:28:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f0000000500)}, {&(0x7f0000000100)="0d24ecaddfd8223c691d34a04eabb085e4bcb853e6d66b8ba82b47e5659a3d5ffdc864cded65be234f51364b3a56caac0750dc5c2e94ea71188757f6dd39c4c490b5d7449ad3d007097611ecb0bc1b5c5d26d3370c37170e12d339dd65bd0487", 0xfc9e}, {&(0x7f0000000040)}], 0x3, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000000)={0x0, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') socket$inet6_udplite(0xa, 0x2, 0x88) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) 10:28:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5fb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149e699e0dc04c6f1553f1d"], 0xc4}}, 0x0) capget(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x7fff, 0x8, 0x2, 0xa, 0x81, 0x1000}) 10:28:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:33 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x412200, 0x0) write$binfmt_misc(r0, &(0x7f0000000880)={'syz1', "5ca2327afc6d555b5724d56246978454c2be81eba8862a14ac2a9315d1c4d6688e51b90a9bb56542b494ae4f6a20b58694756759af3178dd44294e663d79526b7dd4eeba137ea833bb6fb0bcc6f02d344234e2c4c7035a0d5361ef45032372074fdb613660e14fc2517ee264598a98f6b4df44346f4d68bb3cf866dc6f66e0a9dc8ccc34c74a10121deda091a09b0c6a0ba693c50eeafdb9770255a04c5a83be3fc841c6fec23dd781a7bc1fa2f6d78d89a1f7914d3dd6e2344be000d0fb81668f96c122639c0f9a6faf22506a2f231ea7b9b6de0a0cbfe6b1b2a55184214ce0"}, 0xe4) write$tun(r1, &(0x7f0000000740)={@val={0x0, 0x6005}, @val={0x0, 0x80, 0x6, 0x7, 0x1, 0x5}, @ipv4=@generic={{0x18, 0x4, 0x1, 0x6, 0x11e, 0x66, 0x0, 0x1, 0x73, 0x0, @rand_addr=0x64010100, @private=0xa010100, {[@noop, @lsrr={0x83, 0x17, 0x7a, [@remote, @remote, @multicast1, @empty, @loopback]}, @generic={0x89, 0xc, "a3ba5fea8c9a74806cd5"}, @timestamp={0x44, 0x28, 0x50, 0x0, 0xe, [0xfffffe6b, 0xe51, 0x6f, 0x7, 0x0, 0x80000000, 0x66, 0x8fe, 0x8]}]}}, "e0e6852dc745e68e88a4e3ed8565a6d43ae6f81735906dad8fa9506366b3dd80241fd12a53ccc745704307f2c783f54abdcefba70467585857f8fe0153d22253fb47b7a0d95a3c85c744b13b884e80c2db698efeec8a5ea5f897e05ad7b6e3624681b63b4d7e324e416882bf916259efe1a63ac218bc5df958625ed60451488c83e4d040e3b1e79bc37d5e49181771d65365c4fb6d970805374a9fe606b9be5feba760f3a8e2fb69353045df69b9e9cf3df917df370ad7c0cc98ad0de389"}}, 0x12c) 10:28:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000100)=0x8000, 0x4) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:28:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x7, 0x2, "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", 0xff, 0x5, 0x20, 0xea, 0x7, 0x2, 0x2, 0x1}, r5}}, 0x120) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x80000000, 0x1ae1c024, 0x7a9, 0x2}, 0x10) r6 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0307000000020000000004000000180001801400020076657468305f766972745f7769666900"], 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=@newlink={0x68, 0x10, 0x8, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE6={0x14, 0x7, @remote}, @IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r9}, @IFLA_CARRIER={0x5, 0x21, 0x20}]}, 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00', r9}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000e40)={0x3cc, r6, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x144, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf0, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_STRSET_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xf8, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xc}]}, {0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}}, 0x14) 10:28:37 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/86) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000000)={0x1, "df8b4a990e7a6579998df058d387488e48799a69c3552913bf9fff77233de8a5", 0x4, 0x8, 0x8, 0x8, 0x1, 0x1, 0x10000, 0x74}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/cgroups\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f0000000200)) 10:28:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[]}}, 0x400c881) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r6}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r6, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000008c0)={r6, 0x10001}, &(0x7f0000000900)=0x8) ioctl$FBIOGET_CON2FBMAP(r4, 0x460f, &(0x7f0000000840)={0x1f}) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400040, 0x0) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') ioctl$SNDCTL_DSP_GETBLKSIZE(r3, 0xc0045004, &(0x7f0000000880)) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="02002bbd7000ffdbdf2501000000050006008100000014000100ff020000000000000000000000000001080003000080000005000500050000002c8c6662a639c5052e42e40ee55f41af760d199d929ecff9fd273dc72831346460d1617ec18c5a48f73079d6cac95c01d5edd7063225661999f10cc382c69db3871ba5226e80cc72a4dab78b92603c1541a03614e21ded9454ac07eeb0bcbdb330a29df0aca8d431f251da78f3902aefd4c080876c09f04e86c838d4abc6fcd3f9a991"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x4881) 10:28:38 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r2}) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040), 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) preadv(r6, &(0x7f00000025c0)=[{&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/78, 0x4e}, {&(0x7f0000000340)=""/215, 0xd7}, {&(0x7f0000000280)=""/124, 0x7c}, {&(0x7f0000000440)=""/106, 0x6a}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/81, 0x51}, {&(0x7f0000001540)=""/30, 0x1e}, {&(0x7f0000001580)=""/4, 0x4}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0xa, 0x3) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r1}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r1, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000740)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x3, 0x6, 0x7ff, 0x1, 0x40, 0x9, 0x9}, &(0x7f0000000080)=0x9c) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SIOCPNDELRESOURCE(r3, 0x89ef, &(0x7f0000000040)=0x3) 10:28:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:40 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5fb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149e699e0dc04c6f1553f1d"], 0xc4}}, 0x0) 10:28:40 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x21}], 0x1, 0x40000020, 0x0) pipe(&(0x7f0000000100)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000) 10:28:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) syz_mount_image$btrfs(&(0x7f0000000740)='btrfs\x00', &(0x7f0000000780)='./file0\x00', 0xea0b, 0x2, &(0x7f0000000900)=[{&(0x7f00000007c0)="ab1d3cf4ca064671e33a74cc5bbb042838e7d96dc7214874bbe95b8b659633a1cea5433739e9bc5d8bd8eda097136f176c7e70486954b5934706c44eaee8529650d08a39c2ca0eb69c2dded456", 0x4d, 0x10001}, {&(0x7f0000000840)="b938ca97e25170be323d192f0c160e2e2b98cbd3b3b52bc324fe799ec74ee2a035cc64ec8dfc47a3a801ca3795d60d8cb19fc62ddcf989346993e08ffd4bdce7798b4edecb4fd96a0c9ec28f89a702980f609ebdf0446b1243c963a8953bc75bf648bebabd731c83da239cd829906276f0bd0ec6d16441b1d60e28300308f6e7f8e4747d2276a9137bb4e99ae7a6bf2ee069e1f5a43be0afbbb61ff2cc5d095af80b3167093897c5d387e94d5a90394781527012", 0xb4, 0xffffffff}], 0x60, &(0x7f0000000940)={[{@noflushoncommit='noflushoncommit'}, {@fragment_metadata='fragment=metadata'}, {@nospace_cache='nospace_cache'}, {@nodatasum='nodatasum'}, {@space_cache='space_cache'}, {@ssd_spread='ssd_spread'}], [{@obj_user={'obj_user'}}]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000009c0)={0x6, 0x4, 0x4, 0x9b4, 0x8}) 10:28:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:41 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 10:28:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x1}, {{&(0x7f0000000180)=@in={0x2, 0x0, @private}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/188, 0xbc}, {&(0x7f0000000340)=""/246, 0xf6}, {&(0x7f0000000440)=""/126, 0x7e}, {&(0x7f00000004c0)=""/140, 0x8c}, {&(0x7f00000002c0)=""/11, 0xb}], 0x5, &(0x7f0000000600)=""/27, 0x1b}, 0x8}], 0x2, 0x4003, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000000)={0x7, {0x9, 0x3, 0xfffffc01, 0xd26}, {0x8, 0x1, 0x7, 0x20}, {0x3ff, 0x5}}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) bind$isdn_base(r3, &(0x7f0000000100)={0x22, 0x49, 0x5, 0x1, 0x9}, 0x6) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000040)) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:43 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a3"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:43 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07be", @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) preadv(r0, &(0x7f00000017c0), 0x0, 0x800000) r1 = socket$inet6(0xa, 0x3, 0x7) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000000)={0x6, 'wg0\x00', {0xde}, 0x8}) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x1411, 0x200, 0x70bd2a, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x5}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x3b}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x30}, 0x1, 0x0, 0x0, 0x40001}, 0x8005) 10:28:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:44 executing program 2: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:44 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x3}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000100)={r4, r6}) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)}, 0x4000881) 10:28:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1276.959695] FAULT_INJECTION: forcing a failure. [ 1276.959695] name failslab, interval 1, probability 0, space 0, times 0 [ 1276.988462] CPU: 1 PID: 30054 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1276.996374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.005728] Call Trace: [ 1277.008415] dump_stack+0x13e/0x194 [ 1277.012057] should_fail.cold+0x10a/0x14b [ 1277.016212] should_failslab+0xd6/0x130 [ 1277.020195] __kmalloc+0x2e9/0x7c0 [ 1277.023739] ? sock_kmalloc+0x75/0xc0 [ 1277.027546] sock_kmalloc+0x75/0xc0 [ 1277.031175] af_alg_alloc_areq+0x1d/0x1d0 [ 1277.035323] skcipher_recvmsg+0x72f/0xcb0 [ 1277.039483] ? skcipher_release+0x40/0x40 [ 1277.043634] ? security_socket_recvmsg+0x8b/0xc0 [ 1277.048390] ? skcipher_release+0x40/0x40 [ 1277.052539] sock_recvmsg+0xc0/0x100 [ 1277.056256] sock_read_iter+0x252/0x360 10:28:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r3, 0x100, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x3}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1277.060236] ? sock_recvmsg+0x100/0x100 [ 1277.064227] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1277.068988] ? iov_iter_init+0xa6/0x1c0 [ 1277.072969] __vfs_read+0x44b/0x610 [ 1277.076604] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1277.081194] ? selinux_file_permission+0x7a/0x440 [ 1277.086046] ? rw_verify_area+0xe1/0x2a0 [ 1277.090111] vfs_read+0x131/0x330 [ 1277.093561] SyS_read+0xf2/0x210 [ 1277.096925] ? kernel_write+0x110/0x110 [ 1277.100908] ? SyS_clock_settime+0x1a0/0x1a0 [ 1277.105316] ? do_syscall_64+0x4c/0x640 10:28:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1277.109285] ? kernel_write+0x110/0x110 [ 1277.113260] do_syscall_64+0x1d5/0x640 [ 1277.117156] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1277.122347] RIP: 0033:0x45c829 [ 1277.125531] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1277.133242] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1277.140522] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1277.147791] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:28:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1277.155059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1277.162327] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:44 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:44 executing program 4 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1277.284602] FAULT_INJECTION: forcing a failure. [ 1277.284602] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1277.297469] CPU: 1 PID: 30069 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1277.305451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.314809] Call Trace: [ 1277.317402] dump_stack+0x13e/0x194 [ 1277.321042] should_fail.cold+0x10a/0x14b [ 1277.325241] __alloc_pages_nodemask+0x1bf/0x700 [ 1277.329913] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1277.334936] ? check_preemption_disabled+0x35/0x240 [ 1277.339964] alloc_pages_vma+0xc2/0x4a0 [ 1277.343956] wp_page_copy+0xa22/0x1300 [ 1277.347855] ? follow_pfn+0x200/0x200 [ 1277.351660] do_wp_page+0x244/0x11d0 [ 1277.355371] ? lock_acquire+0x170/0x3f0 [ 1277.359348] ? finish_mkwrite_fault+0x640/0x640 [ 1277.364025] __handle_mm_fault+0x1c0e/0x3280 [ 1277.368438] ? copy_page_range+0x1d70/0x1d70 [ 1277.372848] ? find_held_lock+0x2d/0x110 [ 1277.376918] handle_mm_fault+0x288/0x7a0 [ 1277.380983] __get_user_pages+0x44d/0x11e0 [ 1277.385220] ? follow_page_mask+0x1580/0x1580 [ 1277.389726] get_user_pages_unlocked+0x1df/0x2e0 [ 1277.394507] ? get_user_pages_locked+0x3d0/0x3d0 [ 1277.399263] ? mark_held_locks+0xa6/0xf0 [ 1277.403324] ? get_user_pages_fast+0x16b/0x2b0 [ 1277.407911] get_user_pages_fast+0x20f/0x2b0 [ 1277.412319] ? check_preemption_disabled+0x35/0x240 [ 1277.417335] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1277.422091] ? perf_trace_lock+0x109/0x4b0 [ 1277.426327] iov_iter_get_pages+0x203/0xc80 [ 1277.430650] ? save_trace+0x290/0x290 [ 1277.434449] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1277.439406] af_alg_make_sg+0x82/0x3f0 [ 1277.443298] ? af_alg_data_wakeup+0x80/0x80 [ 1277.447621] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1277.452633] ? __kmalloc+0x36e/0x7c0 [ 1277.456354] af_alg_get_rsgl+0x1cf/0x510 [ 1277.460423] skcipher_recvmsg+0x766/0xcb0 [ 1277.464698] ? skcipher_release+0x40/0x40 [ 1277.468849] ? security_socket_recvmsg+0x8b/0xc0 [ 1277.473605] ? skcipher_release+0x40/0x40 [ 1277.477766] sock_recvmsg+0xc0/0x100 [ 1277.481481] sock_read_iter+0x252/0x360 [ 1277.485453] ? sock_recvmsg+0x100/0x100 [ 1277.489438] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1277.494193] ? iov_iter_init+0xa6/0x1c0 [ 1277.498169] __vfs_read+0x44b/0x610 [ 1277.501799] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1277.506388] ? selinux_file_permission+0x7a/0x440 [ 1277.511237] ? rw_verify_area+0xe1/0x2a0 [ 1277.515300] vfs_read+0x131/0x330 [ 1277.518755] SyS_read+0xf2/0x210 [ 1277.522121] ? kernel_write+0x110/0x110 [ 1277.526095] ? SyS_clock_settime+0x1a0/0x1a0 [ 1277.530504] ? do_syscall_64+0x4c/0x640 [ 1277.534505] ? kernel_write+0x110/0x110 [ 1277.538484] do_syscall_64+0x1d5/0x640 [ 1277.542378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1277.547565] RIP: 0033:0x45c829 [ 1277.550750] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1277.558458] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1277.565731] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1277.572997] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1277.580265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1277.587537] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0xffff, 0x1, 0x5, 0x6e, 0x10000, 0xbcd1, 0x6}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') syz_open_pts(r0, 0x440000) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 10:28:45 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:45 executing program 4 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x28, &(0x7f0000000180)={@remote, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f00000001c0)={'geneve1\x00', 0x400}) write(r4, &(0x7f0000000340), 0x41395527) accept4(r4, &(0x7f0000000080)=@ethernet={0x0, @dev}, &(0x7f0000000100)=0x80, 0x0) 10:28:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffe17, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[], 0x2}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x24000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000140)) 10:28:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1278.547178] FAULT_INJECTION: forcing a failure. [ 1278.547178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1278.577111] CPU: 1 PID: 30095 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1278.585045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.594407] Call Trace: [ 1278.597008] dump_stack+0x13e/0x194 [ 1278.600650] should_fail.cold+0x10a/0x14b [ 1278.604809] __alloc_pages_nodemask+0x1bf/0x700 [ 1278.609485] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1278.614514] ? check_preemption_disabled+0x35/0x240 [ 1278.619544] alloc_pages_vma+0xc2/0x4a0 [ 1278.623527] wp_page_copy+0xa22/0x1300 [ 1278.627424] ? follow_pfn+0x200/0x200 [ 1278.631236] do_wp_page+0x244/0x11d0 [ 1278.634953] ? lock_acquire+0x170/0x3f0 [ 1278.638929] ? finish_mkwrite_fault+0x640/0x640 10:28:45 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1278.643618] __handle_mm_fault+0x1c0e/0x3280 [ 1278.648031] ? copy_page_range+0x1d70/0x1d70 [ 1278.652445] ? find_held_lock+0x2d/0x110 [ 1278.656522] handle_mm_fault+0x288/0x7a0 [ 1278.660591] __get_user_pages+0x44d/0x11e0 [ 1278.664841] ? follow_page_mask+0x1580/0x1580 [ 1278.669351] get_user_pages_unlocked+0x1df/0x2e0 [ 1278.674120] ? get_user_pages_locked+0x3d0/0x3d0 [ 1278.678881] ? mark_held_locks+0xa6/0xf0 [ 1278.682946] ? get_user_pages_fast+0x16b/0x2b0 [ 1278.687539] get_user_pages_fast+0x20f/0x2b0 [ 1278.691952] ? check_preemption_disabled+0x35/0x240 10:28:45 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1278.696972] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1278.701733] ? perf_trace_lock+0x109/0x4b0 [ 1278.705974] iov_iter_get_pages+0x203/0xc80 [ 1278.710297] ? save_trace+0x290/0x290 [ 1278.714101] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1278.719039] af_alg_make_sg+0x82/0x3f0 [ 1278.722937] ? af_alg_data_wakeup+0x80/0x80 [ 1278.727263] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1278.732278] ? __kmalloc+0x36e/0x7c0 [ 1278.735996] af_alg_get_rsgl+0x1cf/0x510 [ 1278.740060] skcipher_recvmsg+0x766/0xcb0 10:28:45 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1278.744213] ? skcipher_release+0x40/0x40 [ 1278.748364] ? security_socket_recvmsg+0x8b/0xc0 [ 1278.753118] ? skcipher_release+0x40/0x40 [ 1278.757266] sock_recvmsg+0xc0/0x100 [ 1278.760992] sock_read_iter+0x252/0x360 [ 1278.764959] ? sock_recvmsg+0x100/0x100 [ 1278.768944] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1278.773693] ? iov_iter_init+0xa6/0x1c0 [ 1278.777656] __vfs_read+0x44b/0x610 [ 1278.781281] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1278.785874] ? selinux_file_permission+0x7a/0x440 [ 1278.790721] ? rw_verify_area+0xe1/0x2a0 [ 1278.794777] vfs_read+0x131/0x330 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1278.798216] SyS_read+0xf2/0x210 [ 1278.801576] ? kernel_write+0x110/0x110 [ 1278.805558] ? SyS_clock_settime+0x1a0/0x1a0 [ 1278.809982] ? do_syscall_64+0x4c/0x640 [ 1278.813947] ? kernel_write+0x110/0x110 [ 1278.817925] do_syscall_64+0x1d5/0x640 [ 1278.821810] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1278.827007] RIP: 0033:0x45c829 [ 1278.830195] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1278.837898] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1278.845163] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1278.852437] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1278.859705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1278.866966] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:46 executing program 4 (fault-call:6 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x41}}, 0x100, 0x0, 0x0, 0x0, 0x8001, 0x0, 0xfffffffffffffb3a, 0x9, 0x200}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x400, 0x9, 0x4, 0x4, 0x6, {}, {0x4, 0x2, 0x6, 0x9, 0xf7, 0x8, "f907ff79"}, 0x7, 0x4, @userptr, 0x7fff, 0x0, r5}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r6, 0xc008551c, &(0x7f0000000100)={0xff, 0x20, [0x8, 0x2, 0x9412, 0x8000, 0xaa3, 0x3c19, 0x25e9, 0x0]}) 10:28:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x80010020, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$TIOCGPTPEER(r1, 0x5441, 0x100000000) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:46 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1279.585647] FAULT_INJECTION: forcing a failure. [ 1279.585647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1279.599148] CPU: 1 PID: 30142 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1279.607047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.616414] Call Trace: [ 1279.619048] dump_stack+0x13e/0x194 [ 1279.622690] should_fail.cold+0x10a/0x14b [ 1279.626846] __alloc_pages_nodemask+0x1bf/0x700 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1279.631503] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1279.636510] ? check_preemption_disabled+0x35/0x240 [ 1279.641538] alloc_pages_vma+0xc2/0x4a0 [ 1279.645517] wp_page_copy+0xa22/0x1300 [ 1279.649426] ? follow_pfn+0x200/0x200 [ 1279.653240] do_wp_page+0x244/0x11d0 [ 1279.656957] ? lock_acquire+0x170/0x3f0 [ 1279.660956] ? finish_mkwrite_fault+0x640/0x640 [ 1279.665626] __handle_mm_fault+0x1c0e/0x3280 [ 1279.670037] ? copy_page_range+0x1d70/0x1d70 [ 1279.674460] ? find_held_lock+0x2d/0x110 [ 1279.678543] handle_mm_fault+0x288/0x7a0 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1279.682613] __get_user_pages+0x44d/0x11e0 [ 1279.686854] ? follow_page_mask+0x1580/0x1580 [ 1279.691360] get_user_pages_unlocked+0x1df/0x2e0 [ 1279.696125] ? get_user_pages_locked+0x3d0/0x3d0 [ 1279.700880] ? mark_held_locks+0xa6/0xf0 [ 1279.704945] ? get_user_pages_fast+0x16b/0x2b0 [ 1279.709531] get_user_pages_fast+0x20f/0x2b0 [ 1279.713940] ? check_preemption_disabled+0x35/0x240 [ 1279.718960] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1279.723716] ? perf_trace_lock+0x109/0x4b0 [ 1279.727954] iov_iter_get_pages+0x203/0xc80 [ 1279.732278] ? save_trace+0x290/0x290 10:28:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1279.736080] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1279.741016] af_alg_make_sg+0x82/0x3f0 [ 1279.744913] ? af_alg_data_wakeup+0x80/0x80 [ 1279.749234] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1279.754248] ? __kmalloc+0x36e/0x7c0 [ 1279.758072] af_alg_get_rsgl+0x1cf/0x510 [ 1279.762325] skcipher_recvmsg+0x766/0xcb0 [ 1279.766481] ? skcipher_release+0x40/0x40 [ 1279.770636] ? security_socket_recvmsg+0x8b/0xc0 [ 1279.775566] ? skcipher_release+0x40/0x40 [ 1279.779714] sock_recvmsg+0xc0/0x100 10:28:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1279.783431] sock_read_iter+0x252/0x360 [ 1279.787438] ? sock_recvmsg+0x100/0x100 [ 1279.791421] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1279.796176] ? iov_iter_init+0xa6/0x1c0 [ 1279.800149] __vfs_read+0x44b/0x610 [ 1279.803782] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1279.808369] ? selinux_file_permission+0x7a/0x440 [ 1279.813215] ? rw_verify_area+0xe1/0x2a0 [ 1279.817277] vfs_read+0x131/0x330 [ 1279.820719] SyS_read+0xf2/0x210 [ 1279.824067] ? kernel_write+0x110/0x110 [ 1279.828019] ? SyS_clock_settime+0x1a0/0x1a0 [ 1279.832508] ? do_syscall_64+0x4c/0x640 [ 1279.836477] ? kernel_write+0x110/0x110 [ 1279.840455] do_syscall_64+0x1d5/0x640 [ 1279.844345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1279.849525] RIP: 0033:0x45c829 [ 1279.852702] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1279.860405] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1279.867669] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1279.874962] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1279.882268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1279.889954] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:47 executing program 4 (fault-call:6 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='mounts\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$SOUND_PCM_READ_BITS(r3, 0x80045005, &(0x7f0000000080)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="28797c8c00000000000071840b009a000022", @ANYRES16=r4, @ANYBLOB="010000000000000000001a00000007002100626200000c0022800800020000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x4044030}, 0x4000000) pipe(&(0x7f0000000940)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000740)={{{@in=@local, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000900)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000c00bd7000ffdbdf250100000008000312", @ANYRES32=r6, @ANYBLOB="62fd08c6cdd0df86ec7db8ab80a9894dc33bb507673f0be6cbff10818d208e5822416736"], 0x28}, 0x1, 0x0, 0x0, 0x8084}, 0x8040) [ 1280.419122] FAULT_INJECTION: forcing a failure. [ 1280.419122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1280.445877] CPU: 1 PID: 30174 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1280.453787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.463141] Call Trace: [ 1280.465735] dump_stack+0x13e/0x194 [ 1280.469376] should_fail.cold+0x10a/0x14b [ 1280.473532] __alloc_pages_nodemask+0x1bf/0x700 [ 1280.478198] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1280.483206] ? check_preemption_disabled+0x35/0x240 [ 1280.488233] alloc_pages_vma+0xc2/0x4a0 [ 1280.492211] wp_page_copy+0xa22/0x1300 [ 1280.496106] ? follow_pfn+0x200/0x200 [ 1280.499916] do_wp_page+0x244/0x11d0 [ 1280.503632] ? lock_acquire+0x170/0x3f0 [ 1280.507602] ? finish_mkwrite_fault+0x640/0x640 [ 1280.512277] __handle_mm_fault+0x1c0e/0x3280 [ 1280.516689] ? copy_page_range+0x1d70/0x1d70 [ 1280.521102] ? find_held_lock+0x2d/0x110 [ 1280.525177] handle_mm_fault+0x288/0x7a0 [ 1280.529271] __get_user_pages+0x44d/0x11e0 [ 1280.533543] ? follow_page_mask+0x1580/0x1580 [ 1280.538029] get_user_pages_unlocked+0x1df/0x2e0 [ 1280.542771] ? get_user_pages_locked+0x3d0/0x3d0 [ 1280.547503] ? mark_held_locks+0xa6/0xf0 [ 1280.551564] ? get_user_pages_fast+0x16b/0x2b0 [ 1280.556139] get_user_pages_fast+0x20f/0x2b0 [ 1280.560530] ? check_preemption_disabled+0x35/0x240 [ 1280.565524] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1280.570269] ? perf_trace_lock+0x109/0x4b0 [ 1280.574498] iov_iter_get_pages+0x203/0xc80 [ 1280.578802] ? save_trace+0x290/0x290 [ 1280.582583] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1280.589756] af_alg_make_sg+0x82/0x3f0 [ 1280.593625] ? af_alg_data_wakeup+0x80/0x80 [ 1280.597928] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1280.602928] ? __kmalloc+0x36e/0x7c0 [ 1280.606639] af_alg_get_rsgl+0x1cf/0x510 [ 1280.610683] skcipher_recvmsg+0x766/0xcb0 [ 1280.614825] ? skcipher_release+0x40/0x40 [ 1280.618956] ? security_socket_recvmsg+0x8b/0xc0 [ 1280.623690] ? skcipher_release+0x40/0x40 [ 1280.627817] sock_recvmsg+0xc0/0x100 [ 1280.631525] sock_read_iter+0x252/0x360 [ 1280.635482] ? sock_recvmsg+0x100/0x100 [ 1280.639569] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1280.644302] ? iov_iter_init+0xa6/0x1c0 [ 1280.648256] __vfs_read+0x44b/0x610 [ 1280.651862] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1280.656433] ? selinux_file_permission+0x7a/0x440 [ 1280.661259] ? rw_verify_area+0xe1/0x2a0 [ 1280.665298] vfs_read+0x131/0x330 [ 1280.668741] SyS_read+0xf2/0x210 [ 1280.672115] ? kernel_write+0x110/0x110 [ 1280.676069] ? SyS_clock_settime+0x1a0/0x1a0 [ 1280.680472] ? do_syscall_64+0x4c/0x640 [ 1280.684455] ? kernel_write+0x110/0x110 [ 1280.688427] do_syscall_64+0x1d5/0x640 [ 1280.692298] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1280.697476] RIP: 0033:0x45c829 [ 1280.700642] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1280.708448] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 10:28:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r2, 0x40044104, &(0x7f00000000c0)=0x81) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x1a5) [ 1280.715707] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1280.722964] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1280.730212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1280.737459] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:47 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x68, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4e1ce7c4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4004010) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 10:28:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:47 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:48 executing program 4 (fault-call:6 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1280.821109] FAULT_INJECTION: forcing a failure. [ 1280.821109] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1280.845717] CPU: 1 PID: 30192 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1280.853634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.862990] Call Trace: [ 1280.865586] dump_stack+0x13e/0x194 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1280.869234] should_fail.cold+0x10a/0x14b [ 1280.873406] __alloc_pages_nodemask+0x1bf/0x700 [ 1280.878082] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1280.883095] ? check_preemption_disabled+0x35/0x240 [ 1280.888135] alloc_pages_vma+0xc2/0x4a0 [ 1280.892111] wp_page_copy+0xa22/0x1300 [ 1280.896011] ? follow_pfn+0x200/0x200 [ 1280.899825] do_wp_page+0x244/0x11d0 [ 1280.903552] ? lock_acquire+0x170/0x3f0 [ 1280.907534] ? finish_mkwrite_fault+0x640/0x640 [ 1280.912210] __handle_mm_fault+0x1c0e/0x3280 [ 1280.916624] ? copy_page_range+0x1d70/0x1d70 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1280.921038] ? find_held_lock+0x2d/0x110 [ 1280.925115] handle_mm_fault+0x288/0x7a0 [ 1280.929201] __get_user_pages+0x44d/0x11e0 [ 1280.933448] ? follow_page_mask+0x1580/0x1580 [ 1280.937959] get_user_pages_unlocked+0x1df/0x2e0 [ 1280.942723] ? get_user_pages_locked+0x3d0/0x3d0 [ 1280.947478] ? mark_held_locks+0xa6/0xf0 [ 1280.951544] ? get_user_pages_fast+0x16b/0x2b0 [ 1280.956129] get_user_pages_fast+0x20f/0x2b0 [ 1280.960545] ? check_preemption_disabled+0x35/0x240 [ 1280.965564] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1280.970321] ? perf_trace_lock+0x109/0x4b0 [ 1280.974560] iov_iter_get_pages+0x203/0xc80 [ 1280.978884] ? save_trace+0x290/0x290 [ 1280.982687] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1280.987630] af_alg_make_sg+0x82/0x3f0 [ 1280.991529] ? af_alg_data_wakeup+0x80/0x80 [ 1280.995852] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1281.000866] ? __kmalloc+0x36e/0x7c0 [ 1281.004690] af_alg_get_rsgl+0x1cf/0x510 [ 1281.008752] skcipher_recvmsg+0x766/0xcb0 [ 1281.012897] ? skcipher_release+0x40/0x40 [ 1281.017136] ? security_socket_recvmsg+0x8b/0xc0 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1281.021891] ? skcipher_release+0x40/0x40 [ 1281.026049] sock_recvmsg+0xc0/0x100 [ 1281.029770] sock_read_iter+0x252/0x360 [ 1281.033743] ? sock_recvmsg+0x100/0x100 [ 1281.037726] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1281.042486] ? iov_iter_init+0xa6/0x1c0 [ 1281.046466] __vfs_read+0x44b/0x610 [ 1281.050098] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1281.054686] ? selinux_file_permission+0x7a/0x440 [ 1281.059540] ? rw_verify_area+0xe1/0x2a0 [ 1281.063604] vfs_read+0x131/0x330 [ 1281.067065] SyS_read+0xf2/0x210 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1281.070439] ? kernel_write+0x110/0x110 [ 1281.074413] ? SyS_clock_settime+0x1a0/0x1a0 [ 1281.078821] ? do_syscall_64+0x4c/0x640 [ 1281.082793] ? kernel_write+0x110/0x110 [ 1281.086787] do_syscall_64+0x1d5/0x640 [ 1281.090692] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1281.095882] RIP: 0033:0x45c829 [ 1281.099073] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1281.106781] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1281.114044] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 10:28:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1281.121306] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1281.128574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1281.135845] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:48 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:28:48 executing program 4 (fault-call:6 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1281.724362] FAULT_INJECTION: forcing a failure. [ 1281.724362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1281.742406] CPU: 0 PID: 30224 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1281.750297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.759633] Call Trace: [ 1281.762205] dump_stack+0x13e/0x194 [ 1281.765850] should_fail.cold+0x10a/0x14b [ 1281.769977] __alloc_pages_nodemask+0x1bf/0x700 [ 1281.774634] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1281.779636] ? check_preemption_disabled+0x35/0x240 [ 1281.784659] alloc_pages_vma+0xc2/0x4a0 [ 1281.788613] wp_page_copy+0xa22/0x1300 [ 1281.792482] ? follow_pfn+0x200/0x200 [ 1281.796272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1281.801061] do_wp_page+0x244/0x11d0 [ 1281.804794] ? lock_acquire+0x170/0x3f0 [ 1281.808747] ? finish_mkwrite_fault+0x640/0x640 [ 1281.813404] __handle_mm_fault+0x1c0e/0x3280 [ 1281.817828] ? copy_page_range+0x1d70/0x1d70 [ 1281.822221] ? find_held_lock+0x2d/0x110 [ 1281.826310] handle_mm_fault+0x288/0x7a0 [ 1281.830441] __get_user_pages+0x44d/0x11e0 [ 1281.834672] ? follow_page_mask+0x1580/0x1580 [ 1281.839198] ? lock_acquire+0x1ec/0x3f0 [ 1281.843155] get_user_pages_unlocked+0x1df/0x2e0 [ 1281.847900] ? get_user_pages_locked+0x3d0/0x3d0 [ 1281.852634] ? mark_held_locks+0xa6/0xf0 [ 1281.856672] ? get_user_pages_fast+0x16b/0x2b0 [ 1281.861234] get_user_pages_fast+0x20f/0x2b0 [ 1281.865622] ? check_preemption_disabled+0x35/0x240 [ 1281.870615] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1281.875348] ? perf_trace_lock+0x109/0x4b0 [ 1281.879695] iov_iter_get_pages+0x203/0xc80 [ 1281.884005] ? save_trace+0x290/0x290 [ 1281.887806] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1281.892721] af_alg_make_sg+0x82/0x3f0 [ 1281.897908] ? af_alg_data_wakeup+0x80/0x80 [ 1281.902213] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1281.907331] ? __kmalloc+0x36e/0x7c0 [ 1281.911070] af_alg_get_rsgl+0x1cf/0x510 [ 1281.915141] skcipher_recvmsg+0x766/0xcb0 [ 1281.919274] ? skcipher_release+0x40/0x40 [ 1281.923408] ? security_socket_recvmsg+0x8b/0xc0 [ 1281.928410] ? skcipher_release+0x40/0x40 [ 1281.932545] sock_recvmsg+0xc0/0x100 [ 1281.936239] sock_read_iter+0x252/0x360 [ 1281.940278] ? sock_recvmsg+0x100/0x100 [ 1281.944245] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1281.948978] ? iov_iter_init+0xa6/0x1c0 [ 1281.952931] __vfs_read+0x44b/0x610 [ 1281.956555] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1281.961119] ? selinux_file_permission+0x7a/0x440 [ 1281.965947] ? rw_verify_area+0xe1/0x2a0 [ 1281.969985] vfs_read+0x131/0x330 [ 1281.973416] SyS_read+0xf2/0x210 [ 1281.976774] ? kernel_write+0x110/0x110 [ 1281.980742] ? SyS_clock_settime+0x1a0/0x1a0 [ 1281.985127] ? do_syscall_64+0x4c/0x640 [ 1281.989077] ? kernel_write+0x110/0x110 [ 1281.993028] do_syscall_64+0x1d5/0x640 [ 1281.996912] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1282.002080] RIP: 0033:0x45c829 [ 1282.005254] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.012954] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1282.020201] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1282.027448] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1282.034695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1282.041942] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002800)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}, {{&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/234, 0xea}, {&(0x7f0000000200)=""/153, 0x99}, {&(0x7f00000002c0)=""/136, 0x88}], 0x3, &(0x7f00000003c0)=""/40, 0x28}, 0x3}, {{&(0x7f0000000400)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/15, 0xf}], 0x1, &(0x7f0000000500)=""/14, 0xe}, 0x1ff}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000540)=""/217, 0xd9}, {&(0x7f0000000640)=""/154, 0x9a}, {&(0x7f0000000700)=""/208, 0xd0}, {&(0x7f0000000800)=""/39, 0x27}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/25, 0x19}, {&(0x7f0000001880)=""/115, 0x73}], 0x7, &(0x7f0000001980)=""/112, 0x70}, 0x4}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a00)=""/168, 0xa8}], 0x1, &(0x7f0000001b00)=""/42, 0x2a}, 0x944}, {{&(0x7f0000001b40)=@caif=@dbg, 0x80, &(0x7f0000002140)=[{&(0x7f0000001bc0)=""/25, 0x19}, {&(0x7f0000001c00)=""/238, 0xee}, {&(0x7f0000001d00)=""/211, 0xd3}, {&(0x7f0000001e00)=""/132, 0x84}, {&(0x7f0000001ec0)=""/181, 0xb5}, {&(0x7f0000001f80)=""/43, 0x2b}, {&(0x7f0000001fc0)=""/82, 0xfffffdff}, {&(0x7f0000002040)=""/62, 0x3e}, {&(0x7f0000002080)=""/146, 0x92}], 0x9, &(0x7f0000002200)=""/218, 0xda}, 0xceb6}, {{&(0x7f0000002300)=@phonet, 0x80, &(0x7f0000002480)=[{&(0x7f0000002380)=""/151, 0x97}, {&(0x7f0000002440)=""/46, 0x2e}], 0x2, &(0x7f0000002a00)=""/82, 0x52}, 0x80000000}, {{&(0x7f0000002540)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002780)=[{&(0x7f00000025c0)=""/148, 0x94}, {&(0x7f0000002680)=""/199, 0xc7}], 0x2, &(0x7f00000027c0)=""/59, 0x3b}, 0x8}], 0x8, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:49 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x9, 0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="50000000aef017bc0d47e7ae0000000025344b274e96004a319355aab9550d36b8017826d1437d1ce886773d3185f43be841624dfcd4a70f6c07f78963d772e86778ca099e469957f0d01d9f63d164dad7f592c230ec638c3c929ea34ae441ed7c648851d4c7e280d442c2f7832db9c9b391b741a8b93496659543c6d513118a181227c3769a1a4f721146e4bc241c28620d07fa401a42d8423c30e11bc89cef6425587429", @ANYRES32=0x0, @ANYBLOB="2b03000000000000200012800b00010067656e65766500001000028006000500030000000400060008000500", @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB="5ad902c7749d2f21171c91f4900ad211d62ecd649966a00980392319c4b64b3ef71cf663468bd6351a"], 0x50}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv0\x00', r3}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x300}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) r8 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r8, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) accept(r8, &(0x7f0000000c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000cc0)=0x80) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6577eec0d50ec12d}, 0xc, &(0x7f00000011c0)={&(0x7f0000000d00)={0x4a0, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x13c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xd73}}}]}}, {{0x8}, {0x29c, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x7, 0x0, 0x7a, 0x9}, {0x3, 0x2e, 0xf7, 0x5}, {0x400, 0x6, 0x6, 0x2}, {0x8, 0xff, 0x1, 0x7}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x0, 0x80, 0x1, 0x2}, {0x5, 0x3, 0x6, 0x2}, {0xc, 0x3, 0x7f, 0x7}, {0x3, 0xa, 0x9, 0x1ff}, {0xfff, 0xa8, 0xff, 0x3ff}]}}}]}}, {{0x8, 0x1, r9}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0xe64a1bf8a07fb8ab}, 0x4000844) r10 = socket$inet(0x10, 0x3, 0xc) sendmsg(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e26008188d2c59a9f2c59bb8fa77aaaf0b084925b6b8c05a48fe2c1b89335a8d75591f61660094c6c0359a4d0103ac0e32012f86ae0e13d905abdbd113548756dac7bd98f5bec2723eddc08547ae2b60dbddba425a22c74ad67d39e3a8827a7e4115f92f81185ab6a3373013e84343ba80c7fb8ed7a0dbf84913f9736e936c7b117fcc8dc9102cdaf", 0xac}], 0x1}, 0xa8840) 10:28:49 executing program 4 (fault-call:6 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1282.201396] FAULT_INJECTION: forcing a failure. [ 1282.201396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1282.220954] CPU: 0 PID: 30238 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1282.228861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.238217] Call Trace: [ 1282.240811] dump_stack+0x13e/0x194 [ 1282.244563] should_fail.cold+0x10a/0x14b [ 1282.248718] __alloc_pages_nodemask+0x1bf/0x700 [ 1282.253393] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1282.258406] ? check_preemption_disabled+0x35/0x240 [ 1282.263434] alloc_pages_vma+0xc2/0x4a0 [ 1282.267416] wp_page_copy+0xa22/0x1300 [ 1282.271305] ? follow_pfn+0x200/0x200 [ 1282.275112] do_wp_page+0x244/0x11d0 [ 1282.278825] ? lock_acquire+0x170/0x3f0 [ 1282.282803] ? finish_mkwrite_fault+0x640/0x640 [ 1282.287478] __handle_mm_fault+0x1c0e/0x3280 [ 1282.291890] ? copy_page_range+0x1d70/0x1d70 [ 1282.296303] ? find_held_lock+0x2d/0x110 [ 1282.300379] handle_mm_fault+0x288/0x7a0 [ 1282.304443] __get_user_pages+0x44d/0x11e0 [ 1282.308685] ? follow_page_mask+0x1580/0x1580 [ 1282.313190] get_user_pages_unlocked+0x1df/0x2e0 [ 1282.317952] ? get_user_pages_locked+0x3d0/0x3d0 [ 1282.322706] ? mark_held_locks+0xa6/0xf0 [ 1282.326765] ? get_user_pages_fast+0x16b/0x2b0 [ 1282.331347] get_user_pages_fast+0x20f/0x2b0 [ 1282.335757] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1282.340522] iov_iter_get_pages+0x203/0xc80 [ 1282.344842] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1282.349774] ? iov_iter_get_pages+0x2/0xc80 [ 1282.354096] af_alg_make_sg+0x82/0x3f0 [ 1282.357991] ? af_alg_data_wakeup+0x80/0x80 [ 1282.362316] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1282.367326] ? __kmalloc+0x36e/0x7c0 [ 1282.371039] af_alg_get_rsgl+0x1cf/0x510 [ 1282.375109] skcipher_recvmsg+0x766/0xcb0 [ 1282.379262] ? retint_kernel+0x2d/0x2d [ 1282.383148] ? skcipher_release+0x40/0x40 [ 1282.387295] ? security_socket_recvmsg+0x8b/0xc0 [ 1282.392046] ? skcipher_release+0x40/0x40 [ 1282.396192] sock_recvmsg+0xc0/0x100 [ 1282.399907] sock_read_iter+0x252/0x360 [ 1282.403876] ? sock_recvmsg+0x100/0x100 [ 1282.407856] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1282.412606] ? iov_iter_init+0xa6/0x1c0 [ 1282.416584] __vfs_read+0x44b/0x610 [ 1282.420248] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1282.424834] ? selinux_file_permission+0x7a/0x440 [ 1282.429683] ? rw_verify_area+0xe1/0x2a0 [ 1282.433756] vfs_read+0x131/0x330 [ 1282.437208] SyS_read+0xf2/0x210 [ 1282.440574] ? kernel_write+0x110/0x110 [ 1282.444541] ? SyS_clock_settime+0x1a0/0x1a0 10:28:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffff, 0x500) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff}) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) process_vm_writev(r5, &(0x7f0000000a00)=[{&(0x7f00000008c0)=""/215, 0xd7}, {&(0x7f00000009c0)=""/50, 0x32}], 0x2, &(0x7f0000000a40), 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r4, 0xc0c85666, &(0x7f00000007c0)={{0x4, @addr=0x79}, "f66fa70e96c61eb88e7243ad848f7012c3d91a02a5977803c9fd83050e465f63", 0x1}) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r3, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000780)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000740)={&(0x7f0000000080)={0x28, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x28}}, 0x84) [ 1282.449085] ? do_syscall_64+0x4c/0x640 [ 1282.453063] ? kernel_write+0x110/0x110 [ 1282.457038] do_syscall_64+0x1d5/0x640 [ 1282.460930] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1282.466112] RIP: 0033:0x45c829 [ 1282.469297] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.476997] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1282.484256] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1282.491601] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:28:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1282.498904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1282.506152] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b90483", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/190, 0xbe}, {&(0x7f0000000280)=""/162, 0xa2}, {&(0x7f0000000000)=""/11, 0xb}], 0x3, 0x7fffff) 10:28:49 executing program 4 (fault-call:6 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1282.619790] FAULT_INJECTION: forcing a failure. [ 1282.619790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1282.634308] CPU: 0 PID: 30251 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1282.642200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.651542] Call Trace: [ 1282.654133] dump_stack+0x13e/0x194 [ 1282.657791] should_fail.cold+0x10a/0x14b [ 1282.661921] __alloc_pages_nodemask+0x1bf/0x700 [ 1282.666570] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1282.671574] ? check_preemption_disabled+0x35/0x240 [ 1282.676587] alloc_pages_vma+0xc2/0x4a0 [ 1282.680551] wp_page_copy+0xa22/0x1300 [ 1282.684440] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1282.689438] ? follow_pfn+0x200/0x200 [ 1282.693228] do_wp_page+0x244/0x11d0 [ 1282.696928] ? lock_acquire+0x170/0x3f0 [ 1282.700887] ? finish_mkwrite_fault+0x640/0x640 [ 1282.705544] __handle_mm_fault+0x1c0e/0x3280 [ 1282.709967] ? copy_page_range+0x1d70/0x1d70 [ 1282.714358] ? find_held_lock+0x2d/0x110 [ 1282.718415] handle_mm_fault+0x288/0x7a0 [ 1282.722519] __get_user_pages+0x44d/0x11e0 [ 1282.726740] ? follow_page_mask+0x1580/0x1580 [ 1282.731235] get_user_pages_unlocked+0x1df/0x2e0 [ 1282.735980] ? get_user_pages_locked+0x3d0/0x3d0 [ 1282.740722] ? get_user_pages_fast+0x19d/0x2b0 [ 1282.745307] get_user_pages_fast+0x20f/0x2b0 [ 1282.749707] ? check_preemption_disabled+0x35/0x240 [ 1282.754703] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1282.759448] ? perf_trace_lock+0x109/0x4b0 [ 1282.763667] iov_iter_get_pages+0x203/0xc80 [ 1282.767968] ? save_trace+0x290/0x290 [ 1282.771757] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1282.776678] af_alg_make_sg+0x82/0x3f0 [ 1282.780559] ? af_alg_data_wakeup+0x80/0x80 [ 1282.784876] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1282.789891] ? __kmalloc+0x36e/0x7c0 [ 1282.793599] af_alg_get_rsgl+0x1cf/0x510 [ 1282.797645] skcipher_recvmsg+0x766/0xcb0 [ 1282.801792] ? skcipher_release+0x40/0x40 [ 1282.805925] ? security_socket_recvmsg+0x8b/0xc0 [ 1282.810677] ? skcipher_release+0x40/0x40 [ 1282.815254] sock_recvmsg+0xc0/0x100 [ 1282.819816] sock_read_iter+0x252/0x360 [ 1282.823768] ? sock_recvmsg+0x100/0x100 [ 1282.827730] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1282.832467] ? iov_iter_init+0xa6/0x1c0 [ 1282.836430] __vfs_read+0x44b/0x610 [ 1282.840045] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1282.844618] ? selinux_file_permission+0x7a/0x440 [ 1282.849439] ? rw_verify_area+0xe1/0x2a0 [ 1282.853481] vfs_read+0x131/0x330 [ 1282.856936] SyS_read+0xf2/0x210 [ 1282.860291] ? kernel_write+0x110/0x110 [ 1282.864362] ? SyS_clock_settime+0x1a0/0x1a0 [ 1282.868767] ? do_syscall_64+0x4c/0x640 [ 1282.872730] ? kernel_write+0x110/0x110 [ 1282.876701] do_syscall_64+0x1d5/0x640 [ 1282.880591] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1282.885783] RIP: 0033:0x45c829 [ 1282.888952] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.896653] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1282.903914] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1282.911182] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1282.918441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1282.925691] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) socket$inet(0x10, 0x3, 0xc) 10:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:50 executing program 4 (fault-call:6 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8f", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ptrace$getregset(0x4204, r1, 0x4, &(0x7f0000000000)={&(0x7f0000000100)=""/194, 0xc2}) [ 1283.102432] FAULT_INJECTION: forcing a failure. [ 1283.102432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1283.131179] CPU: 0 PID: 30266 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1283.139086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.148440] Call Trace: [ 1283.151121] dump_stack+0x13e/0x194 [ 1283.154755] should_fail.cold+0x10a/0x14b [ 1283.158909] __alloc_pages_nodemask+0x1bf/0x700 [ 1283.163582] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1283.168598] ? check_preemption_disabled+0x35/0x240 [ 1283.173621] alloc_pages_vma+0xc2/0x4a0 [ 1283.177587] wp_page_copy+0xa22/0x1300 [ 1283.181517] ? follow_pfn+0x200/0x200 [ 1283.185316] ? check_preemption_disabled+0x35/0x240 [ 1283.190326] do_wp_page+0x244/0x11d0 [ 1283.194039] ? lock_acquire+0x170/0x3f0 [ 1283.198002] ? finish_mkwrite_fault+0x640/0x640 [ 1283.202713] __handle_mm_fault+0x1c0e/0x3280 [ 1283.207115] ? copy_page_range+0x1d70/0x1d70 [ 1283.211516] ? find_held_lock+0x2d/0x110 [ 1283.215614] handle_mm_fault+0x288/0x7a0 [ 1283.219664] __get_user_pages+0x44d/0x11e0 [ 1283.223908] ? follow_page_mask+0x1580/0x1580 [ 1283.228400] get_user_pages_unlocked+0x1df/0x2e0 [ 1283.233150] ? get_user_pages_locked+0x3d0/0x3d0 [ 1283.237903] ? get_user_pages_fast+0x19d/0x2b0 [ 1283.242475] get_user_pages_fast+0x20f/0x2b0 [ 1283.246869] ? check_preemption_disabled+0x35/0x240 [ 1283.251877] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1283.256637] ? perf_trace_lock+0x109/0x4b0 [ 1283.260854] iov_iter_get_pages+0x203/0xc80 [ 1283.265155] ? save_trace+0x290/0x290 [ 1283.268955] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1283.274317] af_alg_make_sg+0x82/0x3f0 [ 1283.278218] ? af_alg_data_wakeup+0x80/0x80 [ 1283.282531] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1283.287550] ? __kmalloc+0x36e/0x7c0 [ 1283.291258] af_alg_get_rsgl+0x1cf/0x510 [ 1283.295328] skcipher_recvmsg+0x766/0xcb0 [ 1283.299475] ? skcipher_release+0x40/0x40 [ 1283.303602] ? sock_recvmsg+0x53/0x100 [ 1283.307469] ? skcipher_release+0x40/0x40 [ 1283.311607] sock_recvmsg+0xc0/0x100 [ 1283.315318] sock_read_iter+0x252/0x360 [ 1283.319283] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1283.324277] ? sock_recvmsg+0x100/0x100 [ 1283.328238] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1283.332982] ? iov_iter_init+0xa6/0x1c0 [ 1283.336951] __vfs_read+0x44b/0x610 [ 1283.340561] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1283.345147] ? selinux_file_permission+0x7a/0x440 10:28:50 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x100}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x12) r3 = socket$inet6(0xa, 0x3, 0x7) open(0x0, 0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x4d5, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) keyctl$link(0x11, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r4, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1283.350011] ? rw_verify_area+0xe1/0x2a0 [ 1283.354076] vfs_read+0x131/0x330 [ 1283.357530] SyS_read+0xf2/0x210 [ 1283.360897] ? kernel_write+0x110/0x110 [ 1283.364875] ? SyS_clock_settime+0x1a0/0x1a0 [ 1283.369284] ? do_syscall_64+0x4c/0x640 [ 1283.373256] ? kernel_write+0x110/0x110 [ 1283.377355] do_syscall_64+0x1d5/0x640 [ 1283.381254] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1283.386442] RIP: 0033:0x45c829 [ 1283.389621] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1283.397315] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1283.404579] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1283.411840] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1283.419125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1283.426389] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 4 (fault-call:6 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1283.556314] FAULT_INJECTION: forcing a failure. [ 1283.556314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1283.571823] CPU: 0 PID: 30283 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1283.579721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.589066] Call Trace: [ 1283.591648] dump_stack+0x13e/0x194 [ 1283.595272] should_fail.cold+0x10a/0x14b [ 1283.599415] __alloc_pages_nodemask+0x1bf/0x700 [ 1283.604070] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1283.609067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1283.613821] ? check_preemption_disabled+0x35/0x240 [ 1283.618824] ? retint_kernel+0x2d/0x2d [ 1283.622695] alloc_pages_vma+0xc2/0x4a0 [ 1283.626654] wp_page_copy+0xa22/0x1300 [ 1283.630535] ? follow_pfn+0x200/0x200 [ 1283.634337] do_wp_page+0x244/0x11d0 [ 1283.638056] ? lock_acquire+0x170/0x3f0 [ 1283.642011] ? finish_mkwrite_fault+0x640/0x640 [ 1283.646661] __handle_mm_fault+0x1c0e/0x3280 [ 1283.651060] ? copy_page_range+0x1d70/0x1d70 [ 1283.655467] ? check_preemption_disabled+0x35/0x240 [ 1283.660476] ? __handle_mm_fault+0x2/0x3280 [ 1283.664794] handle_mm_fault+0x288/0x7a0 [ 1283.668839] __get_user_pages+0x44d/0x11e0 [ 1283.673077] ? follow_page_mask+0x1580/0x1580 [ 1283.677567] get_user_pages_unlocked+0x1df/0x2e0 [ 1283.682349] ? get_user_pages_locked+0x3d0/0x3d0 [ 1283.687093] ? mark_held_locks+0xa6/0xf0 [ 1283.691142] ? get_user_pages_fast+0x16b/0x2b0 [ 1283.695722] get_user_pages_fast+0x20f/0x2b0 [ 1283.700123] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1283.705127] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1283.709868] iov_iter_get_pages+0x203/0xc80 [ 1283.714181] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1283.719116] af_alg_make_sg+0x82/0x3f0 [ 1283.722997] ? af_alg_data_wakeup+0x80/0x80 [ 1283.727313] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1283.732318] ? __kmalloc+0x36e/0x7c0 [ 1283.736023] af_alg_get_rsgl+0x1cf/0x510 [ 1283.740100] skcipher_recvmsg+0x766/0xcb0 [ 1283.744243] ? skcipher_release+0x40/0x40 [ 1283.748371] ? security_socket_recvmsg+0x8b/0xc0 [ 1283.753113] ? skcipher_release+0x40/0x40 [ 1283.757247] sock_recvmsg+0xc0/0x100 [ 1283.760945] sock_read_iter+0x252/0x360 [ 1283.764900] ? sock_recvmsg+0x100/0x100 [ 1283.768861] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1283.773602] ? iov_iter_init+0xa6/0x1c0 [ 1283.777568] __vfs_read+0x44b/0x610 [ 1283.781186] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1283.785762] ? selinux_file_permission+0x7a/0x440 [ 1283.790598] ? rw_verify_area+0xe1/0x2a0 [ 1283.794655] vfs_read+0x131/0x330 [ 1283.798106] SyS_read+0xf2/0x210 [ 1283.801470] ? kernel_write+0x110/0x110 [ 1283.805435] ? SyS_clock_settime+0x1a0/0x1a0 [ 1283.809840] ? do_syscall_64+0x4c/0x640 [ 1283.813796] ? kernel_write+0x110/0x110 [ 1283.817769] do_syscall_64+0x1d5/0x640 [ 1283.821651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1283.826827] RIP: 0033:0x45c829 [ 1283.830012] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1283.837717] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1283.844976] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 10:28:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000080)={0x1000, [0x7ff, 0x6], 0x4}, 0x10) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1283.852322] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1283.859593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1283.866853] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:51 executing program 4 (fault-call:6 fault-nth:11): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:51 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1283.975590] FAULT_INJECTION: forcing a failure. [ 1283.975590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1283.993477] CPU: 0 PID: 30299 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1284.001377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.010731] Call Trace: [ 1284.013322] dump_stack+0x13e/0x194 [ 1284.016957] should_fail.cold+0x10a/0x14b [ 1284.021381] __alloc_pages_nodemask+0x1bf/0x700 10:28:51 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) recvmmsg(r1, &(0x7f0000003140), 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) [ 1284.026046] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1284.031062] ? check_preemption_disabled+0x35/0x240 [ 1284.036091] alloc_pages_vma+0xc2/0x4a0 [ 1284.040065] wp_page_copy+0xa22/0x1300 [ 1284.043959] ? follow_pfn+0x200/0x200 [ 1284.047769] do_wp_page+0x244/0x11d0 [ 1284.051486] ? lock_acquire+0x170/0x3f0 [ 1284.055567] ? finish_mkwrite_fault+0x640/0x640 [ 1284.060242] __handle_mm_fault+0x1c0e/0x3280 [ 1284.064672] ? copy_page_range+0x1d70/0x1d70 [ 1284.069079] ? find_held_lock+0x2d/0x110 [ 1284.073133] handle_mm_fault+0x288/0x7a0 [ 1284.077180] __get_user_pages+0x44d/0x11e0 [ 1284.081411] ? follow_page_mask+0x1580/0x1580 [ 1284.085901] get_user_pages_unlocked+0x1df/0x2e0 [ 1284.090657] ? get_user_pages_locked+0x3d0/0x3d0 [ 1284.095403] ? mark_held_locks+0xa6/0xf0 [ 1284.099454] ? get_user_pages_fast+0x16b/0x2b0 [ 1284.104074] get_user_pages_fast+0x20f/0x2b0 [ 1284.108479] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1284.113221] iov_iter_get_pages+0x203/0xc80 [ 1284.117529] ? save_trace+0x290/0x290 [ 1284.121320] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1284.126246] af_alg_make_sg+0x82/0x3f0 [ 1284.130135] ? af_alg_data_wakeup+0x80/0x80 [ 1284.134454] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1284.139500] ? __kmalloc+0x36e/0x7c0 [ 1284.143200] af_alg_get_rsgl+0x1cf/0x510 [ 1284.147251] skcipher_recvmsg+0x766/0xcb0 [ 1284.151397] ? skcipher_release+0x40/0x40 [ 1284.155536] ? security_socket_recvmsg+0x8b/0xc0 [ 1284.160286] ? skcipher_release+0x40/0x40 [ 1284.164427] sock_recvmsg+0xc0/0x100 [ 1284.168126] sock_read_iter+0x252/0x360 [ 1284.172094] ? sock_recvmsg+0x100/0x100 [ 1284.176105] ? iov_iter_init+0xa6/0x1c0 [ 1284.180075] __vfs_read+0x44b/0x610 [ 1284.183693] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1284.188261] ? selinux_file_permission+0x7a/0x440 [ 1284.193091] ? rw_verify_area+0xe1/0x2a0 [ 1284.197138] vfs_read+0x131/0x330 [ 1284.200581] SyS_read+0xf2/0x210 [ 1284.203941] ? kernel_write+0x110/0x110 [ 1284.207900] ? do_syscall_64+0xc8/0x640 [ 1284.211861] ? kernel_write+0x110/0x110 [ 1284.215827] do_syscall_64+0x1d5/0x640 [ 1284.219698] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:28:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1284.224868] RIP: 0033:0x45c829 [ 1284.228035] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1284.235722] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1284.242976] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1284.250239] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1284.257499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1284.264756] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xfe) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000100)=0xabf5, 0x4) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)}, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x10000) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1c9040, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r6, 0xc0845658, &(0x7f0000000180)={0x0, @reserved}) 10:28:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYPTR64], 0x1}, 0x1, 0x0, 0x0, 0x24010082}, 0x0) 10:28:51 executing program 4 (fault-call:6 fault-nth:12): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x6e, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x8}) [ 1284.440963] FAULT_INJECTION: forcing a failure. [ 1284.440963] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1284.455654] CPU: 0 PID: 30317 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1284.463561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.472913] Call Trace: [ 1284.475498] dump_stack+0x13e/0x194 [ 1284.479111] should_fail.cold+0x10a/0x14b [ 1284.483245] __alloc_pages_nodemask+0x1bf/0x700 [ 1284.487903] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1284.492907] ? check_preemption_disabled+0x35/0x240 [ 1284.497915] alloc_pages_vma+0xc2/0x4a0 [ 1284.501880] wp_page_copy+0xa22/0x1300 [ 1284.505759] ? follow_pfn+0x200/0x200 [ 1284.509537] ? retint_kernel+0x2d/0x2d [ 1284.513404] do_wp_page+0x244/0x11d0 [ 1284.517096] ? lock_acquire+0x170/0x3f0 [ 1284.521061] ? finish_mkwrite_fault+0x640/0x640 [ 1284.525892] __handle_mm_fault+0x1c0e/0x3280 [ 1284.530292] ? copy_page_range+0x1d70/0x1d70 [ 1284.534689] ? find_held_lock+0x2d/0x110 [ 1284.538735] handle_mm_fault+0x288/0x7a0 [ 1284.542777] __get_user_pages+0x44d/0x11e0 [ 1284.547003] ? follow_page_mask+0x1580/0x1580 [ 1284.551501] get_user_pages_unlocked+0x1df/0x2e0 [ 1284.556262] ? get_user_pages_locked+0x3d0/0x3d0 [ 1284.561016] ? get_user_pages_fast+0x19d/0x2b0 [ 1284.565588] get_user_pages_fast+0x20f/0x2b0 [ 1284.569988] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1284.574746] ? mark_held_locks+0xa6/0xf0 [ 1284.578785] iov_iter_get_pages+0x203/0xc80 [ 1284.583102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1284.587863] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1284.592779] ? check_preemption_disabled+0x35/0x240 [ 1284.597798] af_alg_make_sg+0x82/0x3f0 [ 1284.601669] ? af_alg_data_wakeup+0x80/0x80 [ 1284.605968] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1284.610967] ? __kmalloc+0x36e/0x7c0 [ 1284.614684] af_alg_get_rsgl+0x1cf/0x510 [ 1284.618731] skcipher_recvmsg+0x766/0xcb0 [ 1284.622862] ? skcipher_release+0x40/0x40 [ 1284.626990] ? security_socket_recvmsg+0x8b/0xc0 [ 1284.631731] ? skcipher_release+0x40/0x40 [ 1284.635867] sock_recvmsg+0xc0/0x100 [ 1284.639561] sock_read_iter+0x252/0x360 [ 1284.643526] ? sock_recvmsg+0x100/0x100 [ 1284.647476] ? retint_kernel+0x2d/0x2d [ 1284.651368] __vfs_read+0x44b/0x610 [ 1284.654994] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1284.659556] ? selinux_file_permission+0x7a/0x440 [ 1284.664392] ? rw_verify_area+0xe1/0x2a0 [ 1284.668453] vfs_read+0x131/0x330 [ 1284.671896] SyS_read+0xf2/0x210 [ 1284.675250] ? kernel_write+0x110/0x110 [ 1284.679202] ? SyS_clock_settime+0x1a0/0x1a0 [ 1284.683705] ? do_syscall_64+0x4c/0x640 [ 1284.687664] ? kernel_write+0x110/0x110 [ 1284.691657] do_syscall_64+0x1d5/0x640 [ 1284.695549] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1284.700732] RIP: 0033:0x45c829 [ 1284.703910] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1284.711602] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1284.718872] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1284.726130] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1284.733379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 10:28:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {{}, {}, {0xc, 0x13, @l2={'ib', 0x3a, 'hsr0\x00'}}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000010) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1284.740631] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:52 executing program 4 (fault-call:6 fault-nth:13): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1284.898776] FAULT_INJECTION: forcing a failure. [ 1284.898776] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1284.916381] CPU: 0 PID: 30340 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1284.924336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.933673] Call Trace: [ 1284.936292] dump_stack+0x13e/0x194 [ 1284.939906] should_fail.cold+0x10a/0x14b [ 1284.944041] __alloc_pages_nodemask+0x1bf/0x700 [ 1284.948706] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1284.953706] ? check_preemption_disabled+0x35/0x240 [ 1284.958712] alloc_pages_vma+0xc2/0x4a0 [ 1284.962673] wp_page_copy+0xa22/0x1300 [ 1284.966542] ? follow_pfn+0x200/0x200 [ 1284.970323] do_wp_page+0x244/0x11d0 [ 1284.974016] ? lock_acquire+0x170/0x3f0 [ 1284.977975] ? finish_mkwrite_fault+0x640/0x640 [ 1284.982635] __handle_mm_fault+0x1c0e/0x3280 [ 1284.987036] ? copy_page_range+0x1d70/0x1d70 [ 1284.991426] ? find_held_lock+0x2d/0x110 [ 1284.995472] handle_mm_fault+0x288/0x7a0 [ 1284.999512] __get_user_pages+0x44d/0x11e0 [ 1285.003734] ? follow_page_mask+0x1580/0x1580 [ 1285.008237] get_user_pages_unlocked+0x1df/0x2e0 [ 1285.012999] ? get_user_pages_locked+0x3d0/0x3d0 [ 1285.017737] ? get_user_pages_fast+0x19d/0x2b0 [ 1285.022369] get_user_pages_fast+0x20f/0x2b0 [ 1285.026780] ? check_preemption_disabled+0x35/0x240 [ 1285.031779] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1285.036518] ? perf_trace_lock+0x109/0x4b0 [ 1285.040736] iov_iter_get_pages+0x203/0xc80 [ 1285.045037] ? save_trace+0x290/0x290 [ 1285.048818] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1285.053739] af_alg_make_sg+0x82/0x3f0 [ 1285.057660] ? af_alg_data_wakeup+0x80/0x80 [ 1285.061965] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1285.066975] ? __kmalloc+0x36e/0x7c0 [ 1285.070674] af_alg_get_rsgl+0x1cf/0x510 [ 1285.074721] skcipher_recvmsg+0x766/0xcb0 [ 1285.078854] ? skcipher_release+0x40/0x40 [ 1285.082994] ? security_socket_recvmsg+0x8b/0xc0 [ 1285.087732] ? skcipher_release+0x40/0x40 [ 1285.091864] sock_recvmsg+0xc0/0x100 [ 1285.095579] sock_read_iter+0x252/0x360 [ 1285.099535] ? sock_recvmsg+0x100/0x100 [ 1285.103499] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1285.108247] ? iov_iter_init+0xa6/0x1c0 [ 1285.112209] __vfs_read+0x44b/0x610 [ 1285.115840] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1285.120404] ? selinux_file_permission+0x7a/0x440 [ 1285.125228] ? rw_verify_area+0xe1/0x2a0 [ 1285.129268] vfs_read+0x131/0x330 [ 1285.132787] SyS_read+0xf2/0x210 [ 1285.136143] ? kernel_write+0x110/0x110 [ 1285.140104] ? SyS_clock_settime+0x1a0/0x1a0 [ 1285.144501] ? do_syscall_64+0x4c/0x640 [ 1285.148452] ? kernel_write+0x110/0x110 [ 1285.152407] do_syscall_64+0x1d5/0x640 [ 1285.156303] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1285.161491] RIP: 0033:0x45c829 [ 1285.164756] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1285.172443] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1285.179689] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1285.186935] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1285.194225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1285.201473] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:52 executing program 4 (fault-call:6 fault-nth:14): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:52 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x50000, 0x8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9b0940, 0xcee, [], @value=0x2}}) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x60000}, 0x0) 10:28:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r1, &(0x7f0000000100)="fce07065bfbb901116bfe48c00ce56ba1764219216d2e257e36caf4e8985f4238e6809809d1aa2f8353207937589903d55d9db3a97545dd3f77706347e042d3caf639ad038294da925f7d8b49ceb7397c113653d7cd42e9af8126288da5fc3030b631ff45d474549803831ea60891bb0cf1d9173d6aba445f1c80717804c730eb98f74e336b7766b75d9c90deac75c5dab432db5a003df059ee4736ed8b582b4576dfa7c3b0981766e370aac9a", 0xad, 0x48050, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000), 0x10) 10:28:52 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000002540)={{0xa, 0x4e22, 0x101, @empty, 0x5}, {0xa, 0x4e21, 0x8, @mcast1, 0x2}, 0x1, [0x8, 0xfffffff9, 0xfffffffa, 0x0, 0x8, 0x3, 0xef0c]}, 0x5c) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getdents64(r1, &(0x7f0000002540), 0x0) write(r0, &(0x7f0000000340), 0x41395527) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r3, &(0x7f0000002400)=[{{&(0x7f0000000140)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="06dcba2fd4249ae70b9a71538446749a6aaf0a6df54318b5521cd3e78995fa0c5ac78ab2b8d5c85ee59fd04e88f8d96a99c2352c8ee685fdd782243ba9639c1192185aae6d4967b688858858d98b7aca828551996bb808f275fa892758af7cbd742602431ea8b7308bbda25bdeebb933c0b5c99781b455c3c75a9185c097a92515ff73549ebba37dec92f8643412fa41d4d9a8290df92059785b44ac9a88a04a9ab8f47fca22e23ab7d9b3d5e52612880d993c924c75d39d63ca7c93c7f0f2a14a0e98926d9e83522ab26bcb5f5c6d2ef1c0", 0xd2}, {&(0x7f00000002c0)="fd041c4fffe60313155f3ed9d9eaae6ee8cc2d5f602800b235fcc7cbb0befc82726939c51940863a9056815a638b31b4f5be944b2545", 0x36}, {&(0x7f0000000340)="ab6acfbe0033347b74537d6725161324d5f7503920c7e3ab535eeabae13fc5e66942321c66ceccad41b351adc6999a6cf2be670100e41c8f8f630acc6f488b223961c7feb0ac376387c50d", 0x4b}, {&(0x7f00000003c0)="b157bda2337a77a5f13ac442c7ecc10c00a24ee50c8474ae90fe2efa93f301a1468a5967aae3e0ef21161ff36cc9a209380e8b6ba6e93be7d8e3069a782658552377c3e505f9ee797f979bbe305b111668e4dc760e237f7d9f9ae464b27bb7a09d78acb271b9", 0x66}, {&(0x7f0000000440)="5487f830784d2e7c7c28f9ef6e5523674df847804d5962652ebe441ae9a1c9c5606f9551cd2a737779d0cb452524a238efc37c59bb55f77f53ca122a1b24bb6653397ac8ffe10d4bd556939b12dd85d0bcb76a4d87fe800a767b2cb1ef395088239f6a1016e3978e22fc1f2157a3ec2f65d046c10a8f4fe80ac7ab098e1c11c6d72a0f89484fe5b015beaffd58358012ee4de186a81f3febccf4403e822e85d1d24b935f7fa0b8ad26f227513de86de90aef165e9ad34ba1fa", 0xb9}, {&(0x7f0000000500)="97362c84595d13996442899a1ff5f329e0106ed5a714f77591054b6dd5201d830097a830409a8f20017f31e09e42456b57925932888a11b8b98369c5e5a2509d11669d2656ca6f2254d7968b56ab6d673b505bdb0e174f53c2fe0dc625a23ef862c3f4df0acbe4da78b28e745f6f921dc312afc2e5bae8f1957ac5fc17c46b843aa5efc51a2a7a550d903b1d92dbd8ab66ae71313af19c454492a8fe3e77a0a233a44b23530ee21db8525ddc", 0xac}, {&(0x7f00000005c0)="edb69b6f4e8d3fef6af61af6adee60d5f90b0512d4fc9330a7e90a4184e4d1925cc88a9f843010ef28cacf8a75069618138889ea76d1839806ccab508a9737c4ff3fb562004625c8fb8595b4dc821e42617205cb183c68dad140da99310b3de1c5136503d9c60daec160fddcf6", 0x6d}, {&(0x7f0000000640)="f529c42cfe640a1ec3e4da906da637e81b34adce0cb805a7dc546730899e4075c0e2fc8394f6ca52fd7ac5830c14caafd411c0f79b54515e6323f61d20e5bd5650472a7272fb028419f5cb361c5190482734499bd7e6a5430a32cdd6", 0x5c}], 0x8}}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000740)="92475ea3ea4402ace2aad98ed38f03b74489a97edcf60dad2db4ca444d91868d67c5b833221592720f252637660ff8570c981b9b8f30771ab78b9bbcbf", 0x3d}, {&(0x7f0000000780)="60d0bd2391bc956a91707dbaa6fb1eae3e019878edecfce08a944ff7fbae8084f1f3bdabd9ee09d81a60cc9a312af00d5aa72d3cd01f044db5c606c4e9b3388f3e86a0b136dfde1c24d6d8a23f9a055e3530e9832ae46090c2a3f8b64770e2252cdb04d597f71045adf2b43cdcb42aaad71b4b4591c6e324c55c62e7756a4a", 0x7f}, {&(0x7f0000000800)="574c64267d0d14577bc592b3a850e68d840d29ecd1c5677ebcbd77460b3d4450f868ebc2a5ac903d15d9e73660b6001986f277161e41390c3c6f1449bfdc7adb7175c6448a64ae74487db0cb1e656f1ad16f5ca4c76c71c74d292be4f6a0dd9b5418a130cda339846037ac88e1e16876dd0886e4139f3834c76530c8d3ec361664007507e2058e16fb2dd983693e42458ba51427365b67a934e93ee0a00d73582c", 0xa1}, {&(0x7f00000008c0)="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", 0xfb}, {&(0x7f00000009c0)="e917d31805403707784298e4971cd7080adba8aaecc862bdb829f0c4b86e5f0770839090d6fd903d7d35bcdcd54d494540d0a329eec5ea2bcb401faf799aee574bb1988b4547ccdda9baf8de19cca9b10627f47a37649e71399494ed746708c5e20639e0fa874ebaf7407398bc4ee56e0350aa28fa", 0x75}, {&(0x7f0000000a40)="db1f445e325a76fdff2606e007c33ab4592c62eea453a620433ffa8a0eee29040e65b0d8ea1be0f59e3a906d735759f726f9bcd2a8ffa9b56b9a81b60b12c7b98fd501752f407f453fcf28c11169124672e5e3ae2f7e730f103d9cd1c9354309420a7be93e349ad7752071b728d9f829ede8a9b36dda56f0793fbde956", 0x7d}, {&(0x7f0000000ac0)="594c418c4a369283eb950c832c53430b3bd84b3016580f461ab08345e0526a63eb6fe3767feb347839d77ee22f4c000e469a0a593b9676e6eb8323c9c59d63c1065022f2f3394dbf4c22d53140e9f2c4ae347f61f5043f037e820cff3479310abe49c86b3645df77ac835ff397a78c41d396864a1959c2f9e364b81039d2f58b1fc77ca445735e3ef775b2d4566629d21c29c82129f8e9922af8fccff23e71d6fff944961f686dd03433e20f3283793d140ae75a35d60fdd5665d54b21fc24a95d640edc7b46e3f513ddce2f139f39ae6daf81bc3bf660c72ffb", 0xda}], 0x7, &(0x7f0000000c40)=[{0xf0, 0x11, 0x1, "5279d8a8924486d3c794ee1992f49cdcc32235a214d4444bc63be8755e18927f0c4d6aee6dca9a1d84224fd92ac02b4fe49e9750f9d0e112819e047a4496fc7c7c1d84fbfdcb724f69a1905c1fa86b9fb03d60c3420171038801f9ef5ebdb3f898629ccedf548badf02618bfe60fafe0586721dbe1f79b59aca96f300602df7a291a529b123f6c81a94d572e5f870d4ee952552e4cbbf964446ac35a3eb87960327c73f58f0eca0f72c0dca351f18fb89e0f9b9fa0994091f4133cd841bc17503543c2834116be1c1b91f7d75d62c91a74f729ad1973d0f4b3d1a8f75b"}, {0xc8, 0x1a, 0x33f, "e745bd06c8e5351c14ceb10db416b1f35fee35dc07d5933b8166ad1afda0774720927362b6816e8ae22c45c604aed4927bfdb3a2166b2e3b71bff7bb1d5ec248eaa6ce21f97f9153ac5924c5086a40718fb3c7586263e327846682b2aac3090b8dbaba56c5320e7c91741c7a9b54424314d0af18eb1bfa9bf070abad5d3913a472d7208624d74d65063c67a50a1da132ccee74a507343ba79584f49f465e122594d99e977b64aad06d1930cdad4bbc8687c1d1385d"}, {0x40, 0x100, 0x3, "5f4cb5a03dbb2d718b15c2e2cf968b3f4e05c1e5cddf8a8c043f28929ecd46fc1aceb84fc1b8bb47c9db6559630ea2"}, {0x108, 0x226, 0x0, "11b584377f569da17fa2c8fad6e46674423e8a9fad5cf8925c2f0e07393e96d336ac00431d58ea04ce4647693a7aaa433a650d477c547483953afaac9eed13a0fcdbbdb2e8e0d2fec4138fd799d6ced4366441b75bc874fe3599b840c15bdbe001fecb08a08ab3dab1e98b1c71b0c0cf83d0a05c8465624c9b4c06d511808daf6e373006664a73c3ed2f67c1d6d8e509c5efb820f2dcc68e50bef5d28756169265366c85d1633e6e76e847bc4699fe393542da8f4318d59b62eeb41371fd75507519ea6cc3e884143ace9b4409a4ced4da49cdc7c1e9837f9146da61b22e82c9de466b98b6279cc6c47be339aeaf5999a0acc0"}, {0xd0, 0x116, 0xa61, "eb1bf02b941c26a4d83f25447c8ca396ac8a16b6b4f24c2caf4ab13abbb287b866d1f728af48fc982c9dc0031b7516d88f4efc3687e0dc2c1b8d6363fb325207a5037f823fa5028ef7652fae7d47e56f623b77b0967926a2d133caabc169d29aff971929fd19ce3de36ab5cd0e73688ff7b2f22af6d666bbaf44250c821ecabd6ffb17c0eef8c819cd0ad6e9025647925d43c9ac0319ed892f1b6bd980cd9303688737a2c6c0fdbf0de212a12cac1c1efca5a7fb3998bca0d1"}, {0x60, 0x10b, 0x0, "6849fd6e9bce716a45888d7710a4b85cff3d7200702f34698cb4b5512c0dedee409fe26fa857dfabe19d1ad38ce6807938862acda4fb002279bda24e9ff7b3d254ffd3b8cfc6acf4a90a47ff41"}], 0x430}}, {{&(0x7f0000001080)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x3, 0x4, 0x1, 0x0, {0xa, 0x4e24, 0x2, @empty, 0x800}}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000001100)="94e763573ec8559560aae745467a97c1474ef778f7f7d53af625e772f606341aa544992ea08f28de15d88a37c686f5ab2b6cf272ee0ba5469f3cf7f61083e1db3502f7ae60872d6204237d429415627b5d53c8b674d616f7436d1bf5b28cd617b19dbef304af4fa1ca67aa3f926b3bbf3258c622d3fd078c1d1dc7ad4886ec726e8a5c76827be397d0799c9ad2cdac4a0ae7d4467bc6163de648d5bfc349b136eda0", 0xa2}, {&(0x7f00000011c0)="649abf171bc50de01c6570c0674cb13337b3ac39c253054b9bc498438d42bc6812bcdc83e2d242166cd56e1abd7ac066a78098755aef14656171798f52d8d8", 0x3f}], 0x2, &(0x7f0000001240)=[{0x1010, 0x89, 0x101, "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"}, {0xb0, 0x88, 0x9, "b6787b38b864ec88cff54660e8552cf4e4e35ca233aac23f4e1dbe1d9abcd723210e82367738fb71bddfbaad00dd1f2f825aa9f9a5e2c8e88b4fb5fcc2e0485980acc0e2c4a960e36185b16378a4eccbfabeaf87a07e6183a7854287d425b69a0c7402940c271d8fa3908c2801a0739aa9e3d7fde4023301a8618e3c09e2db567b4be34c11065bf0f39f47a2deaa4e9238949192f43100d011fbd3fa9d0d"}, {0xf8, 0x101, 0x8000, "79b68d4ebbfd9524d77c72618073c8153760bc6b288ccc90ce0aab9a445c7313c6427d5cdd7114379127cb35e22aa81fdec24da5d5c9d23edd7b7d9c98bfec1216d88a3f179fe55b575daa5397c2b0fce8c86dcf35961637f02413a2aa7d084d3395c4d81b56400e0f789b9383baf7324f05a294a8db7ce9376171d8428a4f87c7ec4d7bc6ff7da24ac197c0c06cff3e110138d0f2b44aa5f166b7ea4d011c0900ac65e7b672b15145d2fa6d8a664d2acae68ca13cba4b1be04a1b6fbf2bf4ea9fd6f12175d3e855953aab37a4d15a995dcc83a32c460839cd7f83c48c3ea2bae94a94844f"}], 0x11b8}}], 0x3, 0x40000) socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x14}, 0x4040444) r5 = openat$mice(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/input/mice\x00', 0x22000) connect$inet(r5, &(0x7f0000002500)={0x2, 0x4e22, @loopback}, 0x10) [ 1285.708149] FAULT_INJECTION: forcing a failure. [ 1285.708149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1285.720463] CPU: 1 PID: 30370 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1285.728356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1285.737702] Call Trace: [ 1285.740285] dump_stack+0x13e/0x194 [ 1285.743918] should_fail.cold+0x10a/0x14b [ 1285.748075] __alloc_pages_nodemask+0x1bf/0x700 [ 1285.752754] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1285.757768] ? check_preemption_disabled+0x35/0x240 [ 1285.762793] alloc_pages_vma+0xc2/0x4a0 [ 1285.766759] wp_page_copy+0xa22/0x1300 [ 1285.770647] ? follow_pfn+0x200/0x200 [ 1285.774432] do_wp_page+0x244/0x11d0 [ 1285.778135] ? lock_acquire+0x170/0x3f0 [ 1285.782151] ? finish_mkwrite_fault+0x640/0x640 [ 1285.786802] __handle_mm_fault+0x1c0e/0x3280 [ 1285.791247] ? copy_page_range+0x1d70/0x1d70 [ 1285.795644] ? find_held_lock+0x2d/0x110 [ 1285.799730] handle_mm_fault+0x288/0x7a0 [ 1285.803780] __get_user_pages+0x44d/0x11e0 [ 1285.807997] ? follow_page_mask+0x1580/0x1580 [ 1285.812483] get_user_pages_unlocked+0x1df/0x2e0 [ 1285.817221] ? get_user_pages_locked+0x3d0/0x3d0 [ 1285.822018] ? mark_held_locks+0xa6/0xf0 [ 1285.826066] ? get_user_pages_fast+0x16b/0x2b0 [ 1285.830631] get_user_pages_fast+0x20f/0x2b0 [ 1285.835028] ? check_preemption_disabled+0x35/0x240 [ 1285.840029] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1285.844766] ? perf_trace_lock+0x109/0x4b0 [ 1285.849027] iov_iter_get_pages+0x203/0xc80 [ 1285.853365] ? save_trace+0x290/0x290 [ 1285.857146] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1285.862071] af_alg_make_sg+0x82/0x3f0 [ 1285.865947] ? af_alg_data_wakeup+0x80/0x80 [ 1285.870264] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1285.875268] ? __kmalloc+0x36e/0x7c0 [ 1285.878970] af_alg_get_rsgl+0x1cf/0x510 [ 1285.883032] skcipher_recvmsg+0x766/0xcb0 [ 1285.887165] ? skcipher_release+0x40/0x40 [ 1285.891293] ? security_socket_recvmsg+0x8b/0xc0 [ 1285.896040] ? skcipher_release+0x40/0x40 [ 1285.900189] sock_recvmsg+0xc0/0x100 [ 1285.903896] sock_read_iter+0x252/0x360 [ 1285.907863] ? sock_recvmsg+0x100/0x100 [ 1285.911827] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1285.916564] ? iov_iter_init+0xa6/0x1c0 [ 1285.920522] __vfs_read+0x44b/0x610 [ 1285.924140] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1285.928710] ? selinux_file_permission+0x7a/0x440 [ 1285.933538] ? rw_verify_area+0xe1/0x2a0 [ 1285.937588] vfs_read+0x131/0x330 [ 1285.941020] SyS_read+0xf2/0x210 [ 1285.944381] ? kernel_write+0x110/0x110 [ 1285.948334] ? SyS_clock_settime+0x1a0/0x1a0 [ 1285.952721] ? do_syscall_64+0x4c/0x640 [ 1285.956680] ? kernel_write+0x110/0x110 [ 1285.960655] do_syscall_64+0x1d5/0x640 [ 1285.964533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1285.969701] RIP: 0033:0x45c829 [ 1285.972872] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1285.980567] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1285.987825] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1285.995078] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1286.002336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 10:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:53 executing program 4 (fault-call:6 fault-nth:15): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1286.009585] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1286.094069] FAULT_INJECTION: forcing a failure. [ 1286.094069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1286.102268] NOHZ: local_softirq_pending 08 [ 1286.109732] CPU: 0 PID: 30379 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1286.118200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.127538] Call Trace: [ 1286.130121] dump_stack+0x13e/0x194 [ 1286.133766] should_fail.cold+0x10a/0x14b [ 1286.137916] __alloc_pages_nodemask+0x1bf/0x700 [ 1286.142568] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1286.147562] ? check_preemption_disabled+0x35/0x240 [ 1286.152580] alloc_pages_vma+0xc2/0x4a0 [ 1286.157028] wp_page_copy+0xa22/0x1300 [ 1286.161009] ? follow_pfn+0x200/0x200 [ 1286.164797] ? check_preemption_disabled+0x35/0x240 [ 1286.169846] do_wp_page+0x244/0x11d0 [ 1286.173561] ? lock_acquire+0x170/0x3f0 [ 1286.177581] ? finish_mkwrite_fault+0x640/0x640 [ 1286.182252] __handle_mm_fault+0x1c0e/0x3280 [ 1286.186663] ? copy_page_range+0x1d70/0x1d70 [ 1286.191071] ? check_preemption_disabled+0x35/0x240 [ 1286.196095] ? handle_mm_fault+0x353/0x7a0 [ 1286.200314] handle_mm_fault+0x288/0x7a0 [ 1286.204376] __get_user_pages+0x44d/0x11e0 [ 1286.208602] ? follow_page_mask+0x1580/0x1580 [ 1286.213108] get_user_pages_unlocked+0x1df/0x2e0 [ 1286.217881] ? get_user_pages_locked+0x3d0/0x3d0 [ 1286.222626] ? get_user_pages_fast+0x19d/0x2b0 [ 1286.227374] get_user_pages_fast+0x20f/0x2b0 [ 1286.231771] ? check_preemption_disabled+0x35/0x240 [ 1286.236817] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1286.241564] ? perf_trace_lock+0x109/0x4b0 [ 1286.245789] iov_iter_get_pages+0x203/0xc80 [ 1286.250099] ? save_trace+0x290/0x290 [ 1286.253903] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1286.258838] af_alg_make_sg+0x82/0x3f0 [ 1286.262723] ? af_alg_data_wakeup+0x80/0x80 [ 1286.267037] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1286.272049] ? __kmalloc+0x36e/0x7c0 [ 1286.275755] af_alg_get_rsgl+0x1cf/0x510 [ 1286.279803] skcipher_recvmsg+0x766/0xcb0 [ 1286.283937] ? skcipher_release+0x40/0x40 [ 1286.288077] ? sock_recvmsg+0x53/0x100 [ 1286.291961] ? skcipher_release+0x40/0x40 [ 1286.296097] sock_recvmsg+0xc0/0x100 [ 1286.299796] sock_read_iter+0x252/0x360 [ 1286.303750] ? sock_recvmsg+0x100/0x100 [ 1286.307705] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1286.312720] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1286.317465] ? iov_iter_init+0xa6/0x1c0 [ 1286.321425] __vfs_read+0x44b/0x610 [ 1286.325035] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1286.329657] ? selinux_file_permission+0x7a/0x440 [ 1286.334492] ? rw_verify_area+0xe1/0x2a0 [ 1286.338545] vfs_read+0x131/0x330 [ 1286.341993] SyS_read+0xf2/0x210 [ 1286.345361] ? kernel_write+0x110/0x110 [ 1286.349326] ? do_syscall_64+0x4c/0x640 [ 1286.353286] ? kernel_write+0x110/0x110 [ 1286.357257] do_syscall_64+0x1d5/0x640 [ 1286.361145] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1286.366323] RIP: 0033:0x45c829 [ 1286.369489] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1286.377178] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1286.384443] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1286.391708] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1286.399105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1286.406411] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:53 executing program 4 (fault-call:6 fault-nth:16): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:53 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1286.533826] FAULT_INJECTION: forcing a failure. [ 1286.533826] name failslab, interval 1, probability 0, space 0, times 0 10:28:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000800)='/dev/input/mice\x00', 0x2000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000840)='/dev/input/mice\x00', 0xb0440) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={r2, r3, 0x4, r4}, 0x10) write(r1, &(0x7f0000000340), 0x41395527) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x28, r6, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6tnl0\x00'}]}, 0x28}}, 0x0) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcsa\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000980)={0x980000, 0x10001, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000940)={0x9b0a7f, 0x5, [], @p_u8=&(0x7f0000000900)=0x40}}) ioctl$KVM_INTERRUPT(r7, 0x4004ae86, &(0x7f00000007c0)=0x25) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r6, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x6f28}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_L2SPEC_LEN={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x404c050) 10:28:53 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000000)=""/77, 0x4d}, {&(0x7f0000000100)=""/130, 0x82}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000001500)=""/170, 0xaa}, {&(0x7f0000000080)}, {&(0x7f0000001280)=""/166, 0xa6}, {&(0x7f0000001340)=""/58, 0x3a}, {&(0x7f0000001380)=""/193, 0xc1}], 0x8, 0x800000) [ 1286.581403] CPU: 0 PID: 30389 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1286.589348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.598736] Call Trace: [ 1286.601336] dump_stack+0x13e/0x194 [ 1286.604970] should_fail.cold+0x10a/0x14b [ 1286.609116] should_failslab+0xd6/0x130 [ 1286.613090] __kmalloc+0x2e9/0x7c0 [ 1286.616632] ? sock_kmalloc+0x75/0xc0 [ 1286.620432] ? iov_iter_advance+0x1c0/0xc70 [ 1286.624749] sock_kmalloc+0x75/0xc0 [ 1286.628370] af_alg_get_rsgl+0xcc/0x510 [ 1286.632355] skcipher_recvmsg+0x766/0xcb0 [ 1286.636510] ? skcipher_release+0x40/0x40 [ 1286.640659] ? security_socket_recvmsg+0x8b/0xc0 [ 1286.645413] ? skcipher_release+0x40/0x40 [ 1286.649558] sock_recvmsg+0xc0/0x100 [ 1286.653273] sock_read_iter+0x252/0x360 [ 1286.657243] ? sock_recvmsg+0x100/0x100 [ 1286.661215] ? iov_iter_init+0xa6/0x1c0 [ 1286.665181] __vfs_read+0x44b/0x610 [ 1286.668800] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1286.673388] ? rw_verify_area+0xe1/0x2a0 [ 1286.677469] vfs_read+0x131/0x330 [ 1286.680911] SyS_read+0xf2/0x210 [ 1286.684277] ? kernel_write+0x110/0x110 [ 1286.688234] ? SyS_clock_settime+0x1a0/0x1a0 [ 1286.692643] ? do_syscall_64+0x4c/0x640 [ 1286.696606] ? kernel_write+0x110/0x110 [ 1286.700561] do_syscall_64+0x1d5/0x640 [ 1286.704437] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1286.709607] RIP: 0033:0x45c829 [ 1286.712781] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1286.720487] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 10:28:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}, {&(0x7f0000000080)="ce8f85bd67e0694c9381db1497f6299602ecabdc991db8cec0f8bbcb65d87a04bfb9414bd48443aab1e7468428f2c9cd4d3c4611b5db21d8d0f511", 0x3b}], 0x2}, 0x0) [ 1286.727747] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1286.735002] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1286.742396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1286.749658] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:54 executing program 4 (fault-call:6 fault-nth:17): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x77, "47cce28f8a00fa5318f2c9ac65eaae715477805bed1325000324eb7b952547457634f7136c97bada4a35404e7fe6a22ec45ce49c2c2dd4ffed23a94459a9a16eb656f680a842b7aced6eb3dd808f4bb5861339096e93efea1dc276904828f682044e28b072e565edc2f31e1ff520b3f4add9a16105bd09"}, &(0x7f0000000180)=0x9b) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1286.835287] FAULT_INJECTION: forcing a failure. [ 1286.835287] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1286.854100] CPU: 1 PID: 30404 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1286.862007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1286.871361] Call Trace: [ 1286.873958] dump_stack+0x13e/0x194 [ 1286.877599] should_fail.cold+0x10a/0x14b 10:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1286.881764] __alloc_pages_nodemask+0x1bf/0x700 [ 1286.888967] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1286.894035] ? check_preemption_disabled+0x35/0x240 [ 1286.899070] alloc_pages_vma+0xc2/0x4a0 [ 1286.903057] wp_page_copy+0xa22/0x1300 [ 1286.906956] ? follow_pfn+0x200/0x200 [ 1286.910768] do_wp_page+0x244/0x11d0 [ 1286.914487] ? lock_acquire+0x170/0x3f0 [ 1286.918468] ? finish_mkwrite_fault+0x640/0x640 [ 1286.923148] __handle_mm_fault+0x1c0e/0x3280 [ 1286.927561] ? copy_page_range+0x1d70/0x1d70 [ 1286.931978] ? find_held_lock+0x2d/0x110 [ 1286.936063] handle_mm_fault+0x288/0x7a0 [ 1286.940133] __get_user_pages+0x44d/0x11e0 [ 1286.944379] ? follow_page_mask+0x1580/0x1580 [ 1286.948888] get_user_pages_unlocked+0x1df/0x2e0 [ 1286.953667] ? get_user_pages_locked+0x3d0/0x3d0 [ 1286.958422] ? mark_held_locks+0xa6/0xf0 [ 1286.962483] ? get_user_pages_fast+0x16b/0x2b0 [ 1286.967069] get_user_pages_fast+0x20f/0x2b0 [ 1286.971489] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1286.976243] ? save_trace+0x290/0x290 [ 1286.980045] ? save_trace+0x290/0x290 [ 1286.984117] iov_iter_get_pages+0x203/0xc80 [ 1286.988439] ? __lock_is_held+0xad/0x140 [ 1286.992534] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1286.997470] af_alg_make_sg+0x82/0x3f0 [ 1287.001358] ? sock_kmalloc+0x75/0xc0 [ 1287.005165] ? af_alg_data_wakeup+0x80/0x80 [ 1287.009493] af_alg_get_rsgl+0x1cf/0x510 [ 1287.013569] skcipher_recvmsg+0x766/0xcb0 [ 1287.017725] ? skcipher_release+0x40/0x40 [ 1287.021875] ? security_socket_recvmsg+0x8b/0xc0 [ 1287.026634] ? skcipher_release+0x40/0x40 [ 1287.030784] sock_recvmsg+0xc0/0x100 10:28:54 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x8, 0x4, 0x4, 0x204e4044, 0x0, {r1, r2/1000+60000}, {0x1, 0x0, 0xa1, 0x6, 0x0, 0x0, "af1798f4"}, 0x0, 0x4, @fd=r3, 0x7, 0x0, r4}) recvmmsg(r5, &(0x7f0000003140), 0x0, 0x40012000, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r6, &(0x7f00000017c0), 0x315, 0x800000) [ 1287.034497] sock_read_iter+0x252/0x360 [ 1287.038465] ? sock_recvmsg+0x100/0x100 [ 1287.042449] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1287.047307] ? iov_iter_init+0xa6/0x1c0 [ 1287.051289] __vfs_read+0x44b/0x610 [ 1287.054925] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1287.059519] ? selinux_file_permission+0x7a/0x440 [ 1287.065413] ? rw_verify_area+0xe1/0x2a0 [ 1287.069477] vfs_read+0x131/0x330 [ 1287.072933] SyS_read+0xf2/0x210 [ 1287.076302] ? kernel_write+0x110/0x110 [ 1287.080333] ? SyS_clock_settime+0x1a0/0x1a0 [ 1287.084726] ? do_syscall_64+0x4c/0x640 [ 1287.088680] ? kernel_write+0x110/0x110 [ 1287.092647] do_syscall_64+0x1d5/0x640 [ 1287.096545] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1287.101748] RIP: 0033:0x45c829 [ 1287.104928] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1287.112704] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1287.119960] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1287.127219] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1287.134482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1287.141829] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:54 executing program 4 (fault-call:6 fault-nth:18): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1287.244848] FAULT_INJECTION: forcing a failure. [ 1287.244848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1287.256989] CPU: 0 PID: 30439 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1287.264869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.274205] Call Trace: [ 1287.276782] dump_stack+0x13e/0x194 [ 1287.280405] should_fail.cold+0x10a/0x14b [ 1287.284580] __alloc_pages_nodemask+0x1bf/0x700 [ 1287.289238] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1287.294242] alloc_pages_vma+0xc2/0x4a0 [ 1287.298208] __handle_mm_fault+0x17b6/0x3280 [ 1287.302614] ? copy_page_range+0x1d70/0x1d70 [ 1287.307070] ? find_held_lock+0x2d/0x110 [ 1287.311139] handle_mm_fault+0x288/0x7a0 [ 1287.315202] __get_user_pages+0x44d/0x11e0 [ 1287.319421] ? follow_page_mask+0x1580/0x1580 [ 1287.323916] get_user_pages_unlocked+0x1df/0x2e0 [ 1287.328670] ? get_user_pages_locked+0x3d0/0x3d0 [ 1287.333406] ? mark_held_locks+0xa6/0xf0 [ 1287.337447] ? get_user_pages_fast+0x16b/0x2b0 [ 1287.342018] get_user_pages_fast+0x20f/0x2b0 [ 1287.346417] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1287.351160] ? save_trace+0x290/0x290 [ 1287.354949] ? save_trace+0x290/0x290 [ 1287.358735] iov_iter_get_pages+0x203/0xc80 [ 1287.363046] ? __lock_is_held+0xad/0x140 [ 1287.367096] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1287.372009] af_alg_make_sg+0x82/0x3f0 [ 1287.375883] ? sock_kmalloc+0x75/0xc0 [ 1287.379675] ? af_alg_data_wakeup+0x80/0x80 [ 1287.383997] af_alg_get_rsgl+0x1cf/0x510 [ 1287.388063] skcipher_recvmsg+0x766/0xcb0 [ 1287.392261] ? skcipher_release+0x40/0x40 [ 1287.396430] ? security_socket_recvmsg+0x8b/0xc0 [ 1287.401172] ? skcipher_release+0x40/0x40 [ 1287.405309] sock_recvmsg+0xc0/0x100 [ 1287.409002] sock_read_iter+0x252/0x360 [ 1287.412986] ? sock_recvmsg+0x100/0x100 [ 1287.416943] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1287.422052] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1287.426795] ? iov_iter_init+0xa6/0x1c0 [ 1287.430761] __vfs_read+0x44b/0x610 [ 1287.434379] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1287.438992] ? selinux_file_permission+0x7a/0x440 [ 1287.443829] ? rw_verify_area+0xe1/0x2a0 [ 1287.447895] vfs_read+0x131/0x330 [ 1287.451341] SyS_read+0xf2/0x210 [ 1287.454806] ? kernel_write+0x110/0x110 [ 1287.458768] ? SyS_clock_settime+0x1a0/0x1a0 [ 1287.463158] ? do_syscall_64+0x4c/0x640 [ 1287.467111] ? kernel_write+0x110/0x110 [ 1287.471075] do_syscall_64+0x1d5/0x640 [ 1287.474962] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1287.480135] RIP: 0033:0x45c829 [ 1287.483310] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1287.491003] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1287.498260] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1287.505525] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1287.512774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1287.520026] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:54 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd2", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:54 executing program 4 (fault-call:6 fault-nth:19): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000000)={0x9cb, "097eb13bd58f19dbdb01137350e737639fc8a923bdd68e4fbeb09b73066a344a", 0x2}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5fb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149e699e0dc04c6f1553f1d"], 0xc4}}, 0x0) 10:28:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000100)={0x8001009, 0x3, 0x3}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='[\x00') sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="031dfffd94061d63680c1baba20400ff7e00ffffffe300"/36, 0x24}], 0x1}, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x42200) [ 1287.706178] FAULT_INJECTION: forcing a failure. [ 1287.706178] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1287.731555] CPU: 1 PID: 30454 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1287.739456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1287.748804] Call Trace: [ 1287.751379] dump_stack+0x13e/0x194 [ 1287.754992] should_fail.cold+0x10a/0x14b [ 1287.759123] __alloc_pages_nodemask+0x1bf/0x700 [ 1287.763779] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1287.768820] ? find_held_lock+0x2d/0x110 [ 1287.772883] alloc_pages_vma+0xc2/0x4a0 [ 1287.776857] __handle_mm_fault+0x17b6/0x3280 [ 1287.781262] ? copy_page_range+0x1d70/0x1d70 [ 1287.785675] ? find_held_lock+0x2d/0x110 [ 1287.789842] handle_mm_fault+0x288/0x7a0 [ 1287.793933] __get_user_pages+0x44d/0x11e0 [ 1287.798201] ? follow_page_mask+0x1580/0x1580 [ 1287.802692] get_user_pages_unlocked+0x1df/0x2e0 [ 1287.807446] ? get_user_pages_locked+0x3d0/0x3d0 [ 1287.812223] ? mark_held_locks+0xa6/0xf0 [ 1287.816266] ? get_user_pages_fast+0x16b/0x2b0 [ 1287.820830] get_user_pages_fast+0x20f/0x2b0 [ 1287.825295] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1287.830050] ? save_trace+0x290/0x290 [ 1287.833840] ? save_trace+0x290/0x290 [ 1287.837630] iov_iter_get_pages+0x203/0xc80 [ 1287.841948] ? __lock_is_held+0xad/0x140 [ 1287.845997] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1287.850912] af_alg_make_sg+0x82/0x3f0 [ 1287.854782] ? sock_kmalloc+0x75/0xc0 [ 1287.858570] ? af_alg_data_wakeup+0x80/0x80 [ 1287.862885] af_alg_get_rsgl+0x1cf/0x510 [ 1287.866933] skcipher_recvmsg+0x766/0xcb0 [ 1287.871282] ? skcipher_release+0x40/0x40 [ 1287.875414] ? security_socket_recvmsg+0x8b/0xc0 [ 1287.880150] ? skcipher_release+0x40/0x40 [ 1287.884302] sock_recvmsg+0xc0/0x100 [ 1287.887999] sock_read_iter+0x252/0x360 [ 1287.891956] ? sock_recvmsg+0x100/0x100 [ 1287.895916] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1287.900671] ? iov_iter_init+0xa6/0x1c0 [ 1287.904636] __vfs_read+0x44b/0x610 [ 1287.908292] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1287.912861] ? selinux_file_permission+0x7a/0x440 [ 1287.917690] ? rw_verify_area+0xe1/0x2a0 [ 1287.921735] vfs_read+0x131/0x330 [ 1287.925171] SyS_read+0xf2/0x210 [ 1287.928527] ? kernel_write+0x110/0x110 [ 1287.932483] ? SyS_clock_settime+0x1a0/0x1a0 [ 1287.936874] ? do_syscall_64+0x4c/0x640 [ 1287.940826] ? kernel_write+0x110/0x110 [ 1287.944777] do_syscall_64+0x1d5/0x640 [ 1287.948649] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1287.953828] RIP: 0033:0x45c829 10:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1287.956995] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1287.964693] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1287.971940] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1287.981449] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1287.988703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1287.995961] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:55 executing program 4 (fault-call:6 fault-nth:20): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0x7, 0x11de303f}) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1288.101285] FAULT_INJECTION: forcing a failure. [ 1288.101285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1288.113864] CPU: 0 PID: 30467 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1288.121748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.131094] Call Trace: [ 1288.133675] dump_stack+0x13e/0x194 [ 1288.137290] should_fail.cold+0x10a/0x14b [ 1288.141434] __alloc_pages_nodemask+0x1bf/0x700 [ 1288.146308] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1288.151312] ? find_held_lock+0x2d/0x110 [ 1288.155369] alloc_pages_vma+0xc2/0x4a0 [ 1288.159342] __handle_mm_fault+0x17b6/0x3280 [ 1288.163746] ? copy_page_range+0x1d70/0x1d70 [ 1288.168231] ? find_held_lock+0x2d/0x110 [ 1288.172305] handle_mm_fault+0x288/0x7a0 [ 1288.176356] __get_user_pages+0x44d/0x11e0 [ 1288.180589] ? follow_page_mask+0x1580/0x1580 [ 1288.185080] get_user_pages_unlocked+0x1df/0x2e0 [ 1288.189941] ? get_user_pages_locked+0x3d0/0x3d0 [ 1288.194694] ? get_user_pages_fast+0x19d/0x2b0 [ 1288.199280] get_user_pages_fast+0x20f/0x2b0 [ 1288.203671] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1288.208405] ? save_trace+0x290/0x290 [ 1288.212194] ? save_trace+0x290/0x290 [ 1288.215999] iov_iter_get_pages+0x203/0xc80 [ 1288.220310] ? __lock_is_held+0xad/0x140 [ 1288.224359] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1288.229372] af_alg_make_sg+0x82/0x3f0 [ 1288.233249] ? sock_kmalloc+0x75/0xc0 [ 1288.237038] ? af_alg_data_wakeup+0x80/0x80 [ 1288.241355] af_alg_get_rsgl+0x1cf/0x510 [ 1288.245410] skcipher_recvmsg+0x766/0xcb0 [ 1288.249556] ? skcipher_release+0x40/0x40 [ 1288.253689] ? skcipher_release+0x40/0x40 [ 1288.257843] sock_recvmsg+0xc0/0x100 [ 1288.261547] sock_read_iter+0x252/0x360 [ 1288.265516] ? sock_recvmsg+0x100/0x100 [ 1288.269497] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1288.274247] ? iov_iter_init+0xa6/0x1c0 [ 1288.278210] __vfs_read+0x44b/0x610 [ 1288.281822] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1288.286389] ? selinux_file_permission+0x7a/0x440 [ 1288.291223] ? rw_verify_area+0xe1/0x2a0 [ 1288.295285] vfs_read+0x131/0x330 [ 1288.298719] SyS_read+0xf2/0x210 [ 1288.302076] ? kernel_write+0x110/0x110 [ 1288.306116] ? SyS_clock_settime+0x1a0/0x1a0 [ 1288.310510] ? do_syscall_64+0x4c/0x640 [ 1288.314475] ? kernel_write+0x110/0x110 [ 1288.318440] do_syscall_64+0x1d5/0x640 [ 1288.322314] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1288.327493] RIP: 0033:0x45c829 [ 1288.330664] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1288.338375] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1288.345630] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1288.352885] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1288.360147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1288.367403] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:55 executing program 4 (fault-call:6 fault-nth:21): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:55 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd2", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1288.496542] FAULT_INJECTION: forcing a failure. [ 1288.496542] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1288.515918] CPU: 1 PID: 30477 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1288.523823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.533176] Call Trace: [ 1288.535776] dump_stack+0x13e/0x194 [ 1288.539412] should_fail.cold+0x10a/0x14b [ 1288.543574] __alloc_pages_nodemask+0x1bf/0x700 [ 1288.548249] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1288.553266] ? find_held_lock+0x2d/0x110 [ 1288.557355] alloc_pages_vma+0xc2/0x4a0 [ 1288.561772] __handle_mm_fault+0x17b6/0x3280 [ 1288.566184] ? copy_page_range+0x1d70/0x1d70 [ 1288.570600] ? find_held_lock+0x2d/0x110 [ 1288.574676] handle_mm_fault+0x288/0x7a0 [ 1288.578744] __get_user_pages+0x44d/0x11e0 [ 1288.582984] ? follow_page_mask+0x1580/0x1580 [ 1288.587480] get_user_pages_unlocked+0x1df/0x2e0 [ 1288.592222] ? get_user_pages_locked+0x3d0/0x3d0 [ 1288.596994] ? mark_held_locks+0xa6/0xf0 [ 1288.601053] ? get_user_pages_fast+0x16b/0x2b0 [ 1288.605636] get_user_pages_fast+0x20f/0x2b0 [ 1288.610051] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1288.614965] ? save_trace+0x290/0x290 [ 1288.618762] ? save_trace+0x290/0x290 [ 1288.622561] iov_iter_get_pages+0x203/0xc80 [ 1288.627070] ? __lock_is_held+0xad/0x140 [ 1288.631152] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1288.636090] af_alg_make_sg+0x82/0x3f0 [ 1288.639972] ? sock_kmalloc+0x75/0xc0 [ 1288.643764] ? af_alg_data_wakeup+0x80/0x80 [ 1288.648084] af_alg_get_rsgl+0x1cf/0x510 [ 1288.652151] skcipher_recvmsg+0x766/0xcb0 [ 1288.656302] ? skcipher_release+0x40/0x40 [ 1288.660443] ? security_socket_recvmsg+0x8b/0xc0 [ 1288.665205] ? skcipher_release+0x40/0x40 [ 1288.669346] sock_recvmsg+0xc0/0x100 [ 1288.673054] sock_read_iter+0x252/0x360 [ 1288.677042] ? sock_recvmsg+0x100/0x100 [ 1288.681013] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1288.685751] ? iov_iter_init+0xa6/0x1c0 [ 1288.689712] __vfs_read+0x44b/0x610 [ 1288.693329] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1288.697895] ? selinux_file_permission+0x7a/0x440 [ 1288.702723] ? rw_verify_area+0xe1/0x2a0 [ 1288.706766] vfs_read+0x131/0x330 [ 1288.710210] SyS_read+0xf2/0x210 [ 1288.713567] ? kernel_write+0x110/0x110 [ 1288.717532] ? SyS_clock_settime+0x1a0/0x1a0 [ 1288.721943] ? do_syscall_64+0x4c/0x640 [ 1288.725903] ? kernel_write+0x110/0x110 [ 1288.729858] do_syscall_64+0x1d5/0x640 [ 1288.733731] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1288.738898] RIP: 0033:0x45c829 10:28:55 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4c) read$dsp(r0, &(0x7f0000000040)=""/95, 0x5f) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000740)=""/30) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) connect$phonet_pipe(r2, &(0x7f0000000780)={0x23, 0xcd, 0x40, 0x5}, 0x10) 10:28:55 executing program 1: rt_sigaction(0x15, &(0x7f0000000180)={&(0x7f00000000c0)="f20f38f074f2016541291036ff5f3365660f38db6d29df3d885c59e6c4a150145e98f2f30f18cac441c57cd8c401da51b9acfac934c4614259cf", 0x40000006, &(0x7f0000000100)="26411c04c443f914918e00000000420f3809601aaf2e67f0ff4be6a0a400000000000000c401f95deb652e0f67971ec8bc3d660f72e7087928", {[0x2f02]}}, &(0x7f0000000280)={&(0x7f00000001c0)="66410f1a3fc421f960ce660f3804450ac4e25d2c1bc4c3016cbf0500000006f20f588009000000c401b1682f660f38f837646566440f382b9dbbd3d3c4676566430f3a6273bec9", 0x0, &(0x7f0000000240)="3e410f18c847e4d0660f671c93f3400f1a4bf2367c0ac4017c5a228f882885e10466440f624800420fae3b2e440fed4900"}, 0x8, &(0x7f00000002c0)) sysfs$2(0x2, 0x7, &(0x7f0000000380)=""/126) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KDGETLED(r4, 0x4b31, &(0x7f0000000340)) write(r3, &(0x7f0000000340), 0x41395527) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000080)) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1288.742071] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1288.749812] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1288.757069] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1288.764319] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1288.771567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1288.778830] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:56 executing program 4 (fault-call:6 fault-nth:22): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x3) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c801}, 0x40000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$SNDRV_PCM_IOCTL_LINK(r3, 0x40044160, &(0x7f0000000040)=0x10000) 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1288.889355] FAULT_INJECTION: forcing a failure. [ 1288.889355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1288.902021] CPU: 1 PID: 30496 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1288.909920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.919277] Call Trace: [ 1288.921870] dump_stack+0x13e/0x194 [ 1288.925508] should_fail.cold+0x10a/0x14b [ 1288.929664] __alloc_pages_nodemask+0x1bf/0x700 [ 1288.934337] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1288.939355] ? find_held_lock+0x2d/0x110 [ 1288.943429] alloc_pages_vma+0xc2/0x4a0 [ 1288.947416] __handle_mm_fault+0x17b6/0x3280 [ 1288.951834] ? copy_page_range+0x1d70/0x1d70 [ 1288.956249] ? find_held_lock+0x2d/0x110 [ 1288.960324] handle_mm_fault+0x288/0x7a0 [ 1288.964390] __get_user_pages+0x44d/0x11e0 [ 1288.968636] ? follow_page_mask+0x1580/0x1580 [ 1288.973144] get_user_pages_unlocked+0x1df/0x2e0 [ 1288.977910] ? get_user_pages_locked+0x3d0/0x3d0 [ 1288.982659] ? mark_held_locks+0xa6/0xf0 10:28:56 executing program 0: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000100)={0x0, @ctrl}) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/168, 0xa8}], 0x1, 0x800000) [ 1288.986748] ? get_user_pages_fast+0x16b/0x2b0 [ 1288.991322] get_user_pages_fast+0x20f/0x2b0 [ 1288.995716] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1289.000457] ? save_trace+0x290/0x290 [ 1289.004327] ? save_trace+0x290/0x290 [ 1289.008239] iov_iter_get_pages+0x203/0xc80 [ 1289.012566] ? __lock_is_held+0xad/0x140 [ 1289.016614] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1289.021550] af_alg_make_sg+0x82/0x3f0 [ 1289.025430] ? sock_kmalloc+0x75/0xc0 [ 1289.029229] ? af_alg_data_wakeup+0x80/0x80 [ 1289.033546] af_alg_get_rsgl+0x1cf/0x510 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1289.037613] skcipher_recvmsg+0x766/0xcb0 [ 1289.041777] ? skcipher_release+0x40/0x40 [ 1289.045929] ? security_socket_recvmsg+0x8b/0xc0 [ 1289.050688] ? skcipher_release+0x40/0x40 [ 1289.054839] sock_recvmsg+0xc0/0x100 [ 1289.058560] sock_read_iter+0x252/0x360 [ 1289.062531] ? sock_recvmsg+0x100/0x100 [ 1289.066509] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1289.071263] ? iov_iter_init+0xa6/0x1c0 [ 1289.075235] __vfs_read+0x44b/0x610 [ 1289.078863] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1289.083436] ? selinux_file_permission+0x7a/0x440 [ 1289.088265] ? rw_verify_area+0xe1/0x2a0 [ 1289.092311] vfs_read+0x131/0x330 [ 1289.095778] SyS_read+0xf2/0x210 [ 1289.099132] ? kernel_write+0x110/0x110 [ 1289.103181] ? SyS_clock_settime+0x1a0/0x1a0 [ 1289.107579] ? do_syscall_64+0x4c/0x640 [ 1289.111539] ? kernel_write+0x110/0x110 [ 1289.115508] do_syscall_64+0x1d5/0x640 [ 1289.119393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1289.124569] RIP: 0033:0x45c829 [ 1289.127744] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:56 executing program 4 (fault-call:6 fault-nth:23): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1289.135456] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1289.142715] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1289.149968] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1289.157217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1289.164467] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) [ 1289.232587] FAULT_INJECTION: forcing a failure. [ 1289.232587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1289.244765] CPU: 1 PID: 30512 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1289.252657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.262023] Call Trace: [ 1289.264607] dump_stack+0x13e/0x194 [ 1289.268235] should_fail.cold+0x10a/0x14b [ 1289.272383] __alloc_pages_nodemask+0x1bf/0x700 [ 1289.277055] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1289.282070] ? find_held_lock+0x2d/0x110 [ 1289.286142] alloc_pages_vma+0xc2/0x4a0 [ 1289.290126] __handle_mm_fault+0x17b6/0x3280 [ 1289.294514] ? copy_page_range+0x1d70/0x1d70 [ 1289.298902] ? find_held_lock+0x2d/0x110 [ 1289.302963] handle_mm_fault+0x288/0x7a0 [ 1289.307011] __get_user_pages+0x44d/0x11e0 [ 1289.311231] ? follow_page_mask+0x1580/0x1580 [ 1289.315715] get_user_pages_unlocked+0x1df/0x2e0 [ 1289.320455] ? get_user_pages_locked+0x3d0/0x3d0 [ 1289.325197] ? mark_held_locks+0xa6/0xf0 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) [ 1289.329255] ? get_user_pages_fast+0x16b/0x2b0 [ 1289.333840] get_user_pages_fast+0x20f/0x2b0 [ 1289.338250] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1289.343011] ? save_trace+0x290/0x290 [ 1289.346810] ? save_trace+0x290/0x290 [ 1289.350616] iov_iter_get_pages+0x203/0xc80 [ 1289.354941] ? __lock_is_held+0xad/0x140 [ 1289.358998] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1289.363937] af_alg_make_sg+0x82/0x3f0 [ 1289.367812] ? sock_kmalloc+0x75/0xc0 [ 1289.371598] ? af_alg_data_wakeup+0x80/0x80 [ 1289.375987] af_alg_get_rsgl+0x1cf/0x510 [ 1289.380049] skcipher_recvmsg+0x766/0xcb0 [ 1289.384207] ? skcipher_release+0x40/0x40 [ 1289.388358] ? security_socket_recvmsg+0x8b/0xc0 [ 1289.393114] ? skcipher_release+0x40/0x40 [ 1289.397258] sock_recvmsg+0xc0/0x100 [ 1289.400974] sock_read_iter+0x252/0x360 [ 1289.404990] ? sock_recvmsg+0x100/0x100 [ 1289.408975] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1289.413722] ? iov_iter_init+0xa6/0x1c0 [ 1289.417698] __vfs_read+0x44b/0x610 [ 1289.421344] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1289.425914] ? selinux_file_permission+0x7a/0x440 [ 1289.430743] ? rw_verify_area+0xe1/0x2a0 [ 1289.434787] vfs_read+0x131/0x330 [ 1289.438234] SyS_read+0xf2/0x210 [ 1289.441582] ? kernel_write+0x110/0x110 [ 1289.445552] ? SyS_clock_settime+0x1a0/0x1a0 [ 1289.449942] ? do_syscall_64+0x4c/0x640 [ 1289.453894] ? kernel_write+0x110/0x110 [ 1289.457867] do_syscall_64+0x1d5/0x640 [ 1289.461741] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1289.466917] RIP: 0033:0x45c829 [ 1289.470094] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1289.477782] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1289.485031] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1289.492284] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1289.499554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1289.506803] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000080)={{0x7, 0x7}, 0x1, 0x81, 0x0, {0x4, 0x7f}, 0x8, 0x4}) 10:28:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, 0x0, 0x0) 10:28:56 executing program 4 (fault-call:6 fault-nth:24): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:56 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd2", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="9a61ce72c2ef8094f801e20ebd33ab1ee171e3032e72bbac36271a347eaf625df176c90e4ea8b21303b01a23e382706d5f43da916f5271d810ece0c4376e5b0c2a2849ffda964331a652b859eb517d54f35c40fe9f8a2d256ef4888978884d07ec7e4f5806243eaa3d1169f526c26ba1673f8b607de66b89751e8a7ef51e198c465988f6d5749f4c745adbcab5d405f0cb8681d6da19ef4cb13abe8cbf7459fe37991d447f978364cc96af04bb532c2af088666192bb7c70281fa69efb85ceb2b9363453156b540bb43cb5a2ebeda54eda2d01e396fef6ffecae533915878cd5b677a165b15a56ed8ce27e114a114d9cacc545c1b9aee456c57f"], @ANYBLOB="18ae58f445b2662be587d770901b1d38798577e1fc3bed5eb76835c1f8ec3e8b3b5fe0e9c060c215f8c13829a9dc1445", @ANYRES16=r0, @ANYRESOCT=r3, @ANYRESDEC=r2], 0x5}, 0x1, 0x0, 0x0, 0x24008812}, 0x0) 10:28:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1289.742380] FAULT_INJECTION: forcing a failure. [ 1289.742380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1289.782825] CPU: 1 PID: 30527 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1289.790743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.800107] Call Trace: [ 1289.802705] dump_stack+0x13e/0x194 [ 1289.806345] should_fail.cold+0x10a/0x14b [ 1289.810501] __alloc_pages_nodemask+0x1bf/0x700 [ 1289.815175] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1289.820193] ? find_held_lock+0x2d/0x110 [ 1289.824270] alloc_pages_vma+0xc2/0x4a0 [ 1289.828253] __handle_mm_fault+0x17b6/0x3280 [ 1289.832665] ? copy_page_range+0x1d70/0x1d70 [ 1289.837074] ? find_held_lock+0x2d/0x110 [ 1289.841150] handle_mm_fault+0x288/0x7a0 [ 1289.845219] __get_user_pages+0x44d/0x11e0 [ 1289.849462] ? follow_page_mask+0x1580/0x1580 [ 1289.853972] get_user_pages_unlocked+0x1df/0x2e0 [ 1289.858737] ? get_user_pages_locked+0x3d0/0x3d0 [ 1289.863492] ? mark_held_locks+0xa6/0xf0 [ 1289.867554] ? get_user_pages_fast+0x16b/0x2b0 [ 1289.872136] get_user_pages_fast+0x20f/0x2b0 [ 1289.876547] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1289.881302] ? save_trace+0x290/0x290 [ 1289.885099] ? save_trace+0x290/0x290 [ 1289.888900] iov_iter_get_pages+0x203/0xc80 [ 1289.893236] ? __lock_is_held+0xad/0x140 [ 1289.897303] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1289.902247] af_alg_make_sg+0x82/0x3f0 [ 1289.906135] ? sock_kmalloc+0x75/0xc0 [ 1289.909943] ? af_alg_data_wakeup+0x80/0x80 [ 1289.914271] af_alg_get_rsgl+0x1cf/0x510 [ 1289.918348] skcipher_recvmsg+0x766/0xcb0 [ 1289.922503] ? skcipher_release+0x40/0x40 [ 1289.926654] ? security_socket_recvmsg+0x8b/0xc0 10:28:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$setpipe(r2, 0x407, 0x3) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000019c0)={0x20, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r6, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000040}, 0x24004005) [ 1289.931406] ? skcipher_release+0x40/0x40 [ 1289.935554] sock_recvmsg+0xc0/0x100 [ 1289.939269] sock_read_iter+0x252/0x360 [ 1289.943241] ? sock_recvmsg+0x100/0x100 [ 1289.947223] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1289.951975] ? iov_iter_init+0xa6/0x1c0 [ 1289.955950] __vfs_read+0x44b/0x610 [ 1289.959581] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1289.964172] ? selinux_file_permission+0x7a/0x440 [ 1289.969026] ? rw_verify_area+0xe1/0x2a0 [ 1289.973086] vfs_read+0x131/0x330 [ 1289.976535] SyS_read+0xf2/0x210 [ 1289.979896] ? kernel_write+0x110/0x110 [ 1289.983859] ? SyS_clock_settime+0x1a0/0x1a0 [ 1289.988253] ? do_syscall_64+0x4c/0x640 [ 1289.992216] ? kernel_write+0x110/0x110 [ 1289.996202] do_syscall_64+0x1d5/0x640 [ 1290.000093] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.005278] RIP: 0033:0x45c829 [ 1290.008464] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1290.016189] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1290.023458] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 10:28:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000000101000000004d04817000009b9723476d5d4ca708c6da57e9ac7d0df6f17035f799a40934adc48c90d0ebaeeae9788d22ddb5e5a7105a757b6317584e9d2b546ce99f45f78f89d729198bacc580cb332b61968a12c9e5b89779c67d82ab76091a7f509f1ba0806ff688156d0fa13ef37830913edd9c991c54d9be718df9bc87dd7c4f842c653e4b86fe4db4c7210031a59039e471f0b6ecec203a51cdee0df07650febe10dbf990cbd0451171c852ce3326ad64f61103dd08611f4000fef497d59096b6bdad465c733e558299d2732880e32d0f7bd593604be50dd8cc98852f"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4) 10:28:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1290.030724] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.037989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1290.045334] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:57 executing program 4 (fault-call:6 fault-nth:25): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:57 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x100}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x12) r3 = socket$inet6(0xa, 0x3, 0x7) open(0x0, 0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x4d5, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) keyctl$link(0x11, 0x0, 0x0) keyctl$invalidate(0x15, 0x0) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r4, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1290.144897] FAULT_INJECTION: forcing a failure. [ 1290.144897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1290.157188] CPU: 1 PID: 30557 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1290.165071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.174411] Call Trace: [ 1290.176982] dump_stack+0x13e/0x194 [ 1290.180591] should_fail.cold+0x10a/0x14b [ 1290.184720] __alloc_pages_nodemask+0x1bf/0x700 [ 1290.189380] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1290.194433] ? find_held_lock+0x2d/0x110 [ 1290.198480] alloc_pages_vma+0xc2/0x4a0 [ 1290.203566] __handle_mm_fault+0x17b6/0x3280 [ 1290.207966] ? copy_page_range+0x1d70/0x1d70 [ 1290.212376] ? find_held_lock+0x2d/0x110 [ 1290.216440] handle_mm_fault+0x288/0x7a0 [ 1290.220575] __get_user_pages+0x44d/0x11e0 [ 1290.224829] ? follow_page_mask+0x1580/0x1580 [ 1290.229309] get_user_pages_unlocked+0x1df/0x2e0 [ 1290.234053] ? get_user_pages_locked+0x3d0/0x3d0 [ 1290.238788] ? mark_held_locks+0xa6/0xf0 [ 1290.242829] ? get_user_pages_fast+0x16b/0x2b0 [ 1290.247391] get_user_pages_fast+0x20f/0x2b0 [ 1290.251779] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1290.256510] ? save_trace+0x290/0x290 [ 1290.260291] ? save_trace+0x290/0x290 [ 1290.264078] iov_iter_get_pages+0x203/0xc80 [ 1290.268391] ? __lock_is_held+0xad/0x140 [ 1290.272432] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1290.277359] af_alg_make_sg+0x82/0x3f0 [ 1290.281232] ? sock_kmalloc+0x75/0xc0 [ 1290.285022] ? af_alg_data_wakeup+0x80/0x80 [ 1290.289334] af_alg_get_rsgl+0x1cf/0x510 [ 1290.293391] skcipher_recvmsg+0x766/0xcb0 [ 1290.297524] ? skcipher_release+0x40/0x40 [ 1290.301677] ? security_socket_recvmsg+0x8b/0xc0 [ 1290.306436] ? skcipher_release+0x40/0x40 [ 1290.310578] sock_recvmsg+0xc0/0x100 [ 1290.314286] sock_read_iter+0x252/0x360 [ 1290.318246] ? sock_recvmsg+0x100/0x100 [ 1290.322222] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1290.326953] ? iov_iter_init+0xa6/0x1c0 [ 1290.330908] __vfs_read+0x44b/0x610 [ 1290.334514] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1290.339079] ? selinux_file_permission+0x7a/0x440 [ 1290.343907] ? rw_verify_area+0xe1/0x2a0 [ 1290.347947] vfs_read+0x131/0x330 [ 1290.351383] SyS_read+0xf2/0x210 [ 1290.354744] ? kernel_write+0x110/0x110 [ 1290.358721] ? SyS_clock_settime+0x1a0/0x1a0 [ 1290.363211] ? do_syscall_64+0x4c/0x640 [ 1290.367164] ? kernel_write+0x110/0x110 [ 1290.371118] do_syscall_64+0x1d5/0x640 [ 1290.374990] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.380161] RIP: 0033:0x45c829 [ 1290.383348] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:28:57 executing program 4 (fault-call:6 fault-nth:26): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1290.391060] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1290.398323] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1290.405571] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.412818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1290.420065] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1290.481261] FAULT_INJECTION: forcing a failure. [ 1290.481261] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1290.495924] CPU: 1 PID: 30563 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1290.503831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.513179] Call Trace: [ 1290.515772] dump_stack+0x13e/0x194 [ 1290.519396] should_fail.cold+0x10a/0x14b [ 1290.523527] __alloc_pages_nodemask+0x1bf/0x700 [ 1290.528185] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1290.533190] ? find_held_lock+0x2d/0x110 [ 1290.537267] alloc_pages_vma+0xc2/0x4a0 [ 1290.541327] __handle_mm_fault+0x17b6/0x3280 [ 1290.545760] ? copy_page_range+0x1d70/0x1d70 [ 1290.550152] ? find_held_lock+0x2d/0x110 [ 1290.554273] handle_mm_fault+0x288/0x7a0 [ 1290.558326] __get_user_pages+0x44d/0x11e0 [ 1290.562653] ? follow_page_mask+0x1580/0x1580 [ 1290.567141] get_user_pages_unlocked+0x1df/0x2e0 [ 1290.571886] ? get_user_pages_locked+0x3d0/0x3d0 [ 1290.576741] ? mark_held_locks+0xa6/0xf0 [ 1290.580799] ? get_user_pages_fast+0x16b/0x2b0 [ 1290.585804] get_user_pages_fast+0x20f/0x2b0 [ 1290.590367] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1290.595123] ? save_trace+0x290/0x290 [ 1290.598912] ? save_trace+0x290/0x290 [ 1290.602708] iov_iter_get_pages+0x203/0xc80 [ 1290.607019] ? __lock_is_held+0xad/0x140 [ 1290.611061] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1290.615976] af_alg_make_sg+0x82/0x3f0 [ 1290.619855] ? sock_kmalloc+0x75/0xc0 [ 1290.623659] ? af_alg_data_wakeup+0x80/0x80 [ 1290.627965] af_alg_get_rsgl+0x1cf/0x510 [ 1290.632017] skcipher_recvmsg+0x766/0xcb0 [ 1290.636160] ? skcipher_release+0x40/0x40 [ 1290.640298] ? security_socket_recvmsg+0x8b/0xc0 [ 1290.645039] ? skcipher_release+0x40/0x40 [ 1290.649183] sock_recvmsg+0xc0/0x100 [ 1290.652897] sock_read_iter+0x252/0x360 [ 1290.656866] ? sock_recvmsg+0x100/0x100 [ 1290.660830] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1290.665830] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1290.670570] ? iov_iter_init+0xa6/0x1c0 [ 1290.674538] __vfs_read+0x44b/0x610 [ 1290.678148] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1290.682844] ? selinux_file_permission+0x7a/0x440 [ 1290.687683] ? rw_verify_area+0xe1/0x2a0 [ 1290.691740] vfs_read+0x131/0x330 [ 1290.695202] SyS_read+0xf2/0x210 [ 1290.698553] ? kernel_write+0x110/0x110 [ 1290.702511] ? SyS_clock_settime+0x1a0/0x1a0 [ 1290.706902] ? do_syscall_64+0x4c/0x640 [ 1290.710860] ? kernel_write+0x110/0x110 [ 1290.714824] do_syscall_64+0x1d5/0x640 [ 1290.718710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1290.723888] RIP: 0033:0x45c829 10:28:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x5, &(0x7f0000000640)=[{&(0x7f0000000380)="be40981181b5e3806fdb1c4d1663faca25776e97a850cf505dfc780bc2388fa0e2e8d73bc9710311ced5815df69ccc3c841e2097e141beeb42643885e123500025cfff1e988f00671e44d66c3ca4f54adf52a1714effc20d30e2cb3b52b275d79cc0580da7557ac3097011c0d7aad874406042522802c2d0a0a3f1978734d7392a3c19d93c5fffab3684225cb8bba0ddb064246bbbbf71b04b9ca38a2e25e214894d30101eb6907938fae4c8755dd0909c1a67a46b8daf12", 0xb8, 0xffff}, {&(0x7f0000000440)="62e23bbc66f52d9f8117ca5b191d21542d7366ebea56f13d3369d195ef2bde52b339f4566108edb199", 0x29, 0x80}, {&(0x7f0000000480)="a111e524b5fddee36297d066f963b606c2ab449a438c2a5cbb43188cba3ce8d9caff43fcc899", 0x26}, {&(0x7f00000004c0)="ad45d99da5aff067118679e85acc7afac47153fa68c686a7877a75fc3e33d7f1f688963141d06299505875889dee70e26742b054809b0fd867262cd221dee478a0188b6c95dd8e57fde4b19af99602c7c08705338ff45b114b9de7e6b8b20c6f8cc3fed3e4ca15a76b9e", 0x6a, 0x9}, {&(0x7f0000000540)="7cbe3242c057cdbe1518493f8faf44e2572ae8546b23bd5f22c98d082fe5006a4f87ff093c97439ed5d3971868b0e8a18924175a1bfe7fd5024ebe0a9cbb1719c7921e475e846252e9661389609a6c92b6390020b3954e740ea7ffc4304ed028ab17580f788b267913cddb3946592ee52c9e6e09608ab4bcccad1e2591b04987dd73639e9df4702f0ca0021e6cb7519b3df701bf4182895636616a938ad6df120a66de1a7ad15a15a531fed48c9f58bc4621351b7fa9048221b8644d35cc16d4256782ae2df508d2885f37dd06a72f23ff54310a641c7fb3837442361ca80aef0eaf34bd642eeb5476f074", 0xeb, 0x4d4}], 0x204000, &(0x7f00000006c0)=ANY=[@ANYBLOB="6e725f626c6f636b733d32392c6d6f64653d30313737373737373737373737373737373737373737362c6d706f6c3d7072656665723d72656c61746976652c687567653d61e4766973653d233a2c687567653d616c776179733d24656d31707070312c6e725f696e6f6465733d25353465376d2c73697a653d0c2c736d61636b6673726f6f743d70726f6376626f786e6574307365637572697479402c66756e633d504f4c4943595f434845434b2c736d61636b66736861743d5e2c646f6e745f686173682c00"]) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000b40)=0xe8) syz_mount_image$ntfs(&(0x7f00000007c0)='ntfs\x00', &(0x7f0000000800)='./file0\x00', 0x6, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000840)="c993ca93f146d6fc1b3c8e0b7f0ea3e2ec1533bfbcc008f75abe6928934cffbc40236883f335617cc69c422637e3e733", 0x30, 0xae}, {&(0x7f0000000880)="b42e2fcddbe712c6487081332f44a24f6ac0e317fdc95375072cb6b6e78ee9460d87564fc9ac55e3adcc4072cd5e4a414d83fc5604", 0x35, 0x2546}, {&(0x7f00000008c0)="5a76e51a23de9cb0773b06b0802bc1fe70", 0x11, 0xc55a}, {&(0x7f0000000900)="3e68a332d2ad79a722f05e56756e773851c657b34146c709c7f6ec23b0954b3e9b964f5d4e5f69b447b7bf172ec3583d51a32dc437b2c1621264e390d615c8d0ffbd85ae7d6e20a2fb9e7660e44fc303b4a5a1050aa6ae27a458c572a7e3909af4f4f4abe8f3787f6d642b25fb394909ce4e85ef33c5dba13d87618e4df61c7d5859605cb6a820c1b80fc3968264a7cd64c0cc27a88f92d4aaa40e34cc", 0x9d, 0x7fff}], 0xc00, &(0x7f0000000c80)=ANY=[@ANYBLOB='umask=00000000000000000007760,errors=recover,fscontext=sysadm_u,fowner<', @ANYRESDEC=r7, @ANYBLOB='\x00k\x00\x00\x00\x00\x00\x00\x00\x00\x00']) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000200012800b00010067656e65766500001000028006000500030000000400060008000500", @ANYRES32=0x0, @ANYBLOB="0000eb80", @ANYRES32=r6, @ANYBLOB], 0x50}}, 0x0) faccessat(r3, &(0x7f00000000c0)='./file0\x00', 0x20, 0x800) sendto$packet(r3, &(0x7f0000000180)="066d603421e1e75e414dec1758538a78e1ab48d3eead05089aeaf113b2e6eb1f0b3271afa44abe053b812158284561682a43ba6f8e91b3e0ea20b98992053e5e4d81baabfd562de62081e0e1bb72f587d0d9c9335262e46ad7930beb5aac59396e587de805f2e141ac4b24622a6a26c3a0d1177f3d86b34b587b8f82fef4ab4ed94d80b74318ae225fd025a76a162da7e80062a1473f664c95a44b24f830c1b2c34f6579381f42a83fe17b0897a0a1c871455eeda565409223e228e9ecd4d29c96fdc58b7a0bf5a3a984f2c7f68dffd8e733c8d4c707a4d9a04aef4f4231270ace5fa44e803c", 0xe6, 0xc010, &(0x7f0000000080)={0x11, 0xf7, r6, 0x1, 0xcb, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:28:58 executing program 4 (fault-call:6 fault-nth:27): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1290.727065] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1290.734849] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1290.742114] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1290.749383] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.756656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1290.763927] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xf) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="8e1a00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000ddd335902838a41060", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x20, 0x2, [@TCA_RSVP_CLASSID={0x8}, @TCA_RSVP_DST={0x14, 0x2, @private2}]}}]}, 0x50}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r5, &(0x7f00000017c0), 0x315, 0x800000) ioctl$DRM_IOCTL_MODE_GETGAMMA(r5, 0xc02064a4, &(0x7f0000000180)={0x6, 0x2, &(0x7f0000000040)=[0xf931, 0x9], &(0x7f0000000100), &(0x7f0000000140)=[0xfff, 0xfaac, 0x90, 0x6, 0x0, 0x0, 0x40]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80000, 0x0) [ 1290.844221] FAULT_INJECTION: forcing a failure. [ 1290.844221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1290.854593] nla_parse: 42 callbacks suppressed [ 1290.854599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1290.870002] CPU: 0 PID: 30574 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1290.877887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.887232] Call Trace: [ 1290.889844] dump_stack+0x13e/0x194 [ 1290.893482] should_fail.cold+0x10a/0x14b [ 1290.897637] __alloc_pages_nodemask+0x1bf/0x700 [ 1290.902304] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1290.907388] ? find_held_lock+0x2d/0x110 [ 1290.911457] alloc_pages_vma+0xc2/0x4a0 [ 1290.915424] __handle_mm_fault+0x17b6/0x3280 [ 1290.919843] ? copy_page_range+0x1d70/0x1d70 [ 1290.924246] ? find_held_lock+0x2d/0x110 [ 1290.928301] ? __rcu_read_unlock+0x27/0x160 [ 1290.932622] handle_mm_fault+0x288/0x7a0 [ 1290.936674] __get_user_pages+0x44d/0x11e0 [ 1290.940893] ? follow_page_mask+0x1580/0x1580 [ 1290.945373] get_user_pages_unlocked+0x1df/0x2e0 [ 1290.950121] ? get_user_pages_locked+0x3d0/0x3d0 [ 1290.954870] ? mark_held_locks+0xa6/0xf0 [ 1290.958929] ? get_user_pages_fast+0x16b/0x2b0 [ 1290.963511] get_user_pages_fast+0x20f/0x2b0 [ 1290.967908] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1290.972923] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1290.977677] ? save_trace+0x290/0x290 [ 1290.981465] iov_iter_get_pages+0x203/0xc80 [ 1290.985769] ? __lock_is_held+0xad/0x140 [ 1290.989818] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1290.994741] af_alg_make_sg+0x82/0x3f0 [ 1290.998617] ? sock_kmalloc+0x75/0xc0 [ 1291.002409] ? af_alg_data_wakeup+0x80/0x80 [ 1291.006711] af_alg_get_rsgl+0x1cf/0x510 [ 1291.010778] skcipher_recvmsg+0x766/0xcb0 [ 1291.014916] ? skcipher_release+0x40/0x40 [ 1291.019045] ? security_socket_recvmsg+0x8b/0xc0 [ 1291.023813] ? skcipher_release+0x40/0x40 [ 1291.027944] sock_recvmsg+0xc0/0x100 [ 1291.031652] sock_read_iter+0x252/0x360 [ 1291.035618] ? sock_recvmsg+0x100/0x100 [ 1291.039581] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1291.044325] ? iov_iter_init+0xa6/0x1c0 [ 1291.048334] __vfs_read+0x44b/0x610 [ 1291.051957] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1291.056534] ? selinux_file_permission+0x7a/0x440 [ 1291.061394] ? rw_verify_area+0xe1/0x2a0 [ 1291.065437] vfs_read+0x131/0x330 [ 1291.068887] SyS_read+0xf2/0x210 [ 1291.072242] ? kernel_write+0x110/0x110 [ 1291.076205] ? SyS_clock_settime+0x1a0/0x1a0 [ 1291.080969] ? do_syscall_64+0x4c/0x640 [ 1291.084936] ? kernel_write+0x110/0x110 [ 1291.088888] do_syscall_64+0x1d5/0x640 10:28:58 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae9914757803793440f0eaca9592fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890a0600000080fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5fb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149"], 0xc4}}, 0x0) [ 1291.092774] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1291.097949] RIP: 0033:0x45c829 [ 1291.101117] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1291.108805] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1291.116055] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1291.123304] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1291.130558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1291.137814] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:58 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:58 executing program 4 (fault-call:6 fault-nth:28): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:58 executing program 2: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1410, 0x200, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0xd1) [ 1291.262435] FAULT_INJECTION: forcing a failure. [ 1291.262435] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.279237] CPU: 1 PID: 30585 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1291.287149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.296498] Call Trace: [ 1291.299083] dump_stack+0x13e/0x194 [ 1291.302717] should_fail.cold+0x10a/0x14b [ 1291.306875] should_failslab+0xd6/0x130 [ 1291.310852] __kmalloc+0x2e9/0x7c0 [ 1291.314392] ? retint_kernel+0x2d/0x2d [ 1291.318271] ? sock_kmalloc+0x75/0xc0 [ 1291.322065] ? skcipher_release+0x40/0x40 [ 1291.326206] ? lock_sock_nested+0x86/0x100 [ 1291.330441] sock_kmalloc+0x75/0xc0 [ 1291.331344] FAULT_INJECTION: forcing a failure. [ 1291.331344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1291.334063] af_alg_alloc_areq+0x1d/0x1d0 [ 1291.334108] skcipher_recvmsg+0x72f/0xcb0 [ 1291.334130] ? skcipher_release+0x40/0x40 [ 1291.358330] ? security_socket_recvmsg+0x8b/0xc0 [ 1291.363095] ? skcipher_release+0x40/0x40 [ 1291.367244] sock_recvmsg+0xc0/0x100 [ 1291.370988] sock_read_iter+0x252/0x360 [ 1291.374959] ? sock_recvmsg+0x100/0x100 [ 1291.378939] ? iov_iter_init+0xa6/0x1c0 [ 1291.382911] __vfs_read+0x44b/0x610 [ 1291.386536] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1291.391203] ? selinux_file_permission+0x7a/0x440 [ 1291.396045] ? rw_verify_area+0xe1/0x2a0 [ 1291.400102] vfs_read+0x131/0x330 [ 1291.403554] SyS_read+0xf2/0x210 [ 1291.406914] ? kernel_write+0x110/0x110 [ 1291.410881] ? SyS_clock_settime+0x1a0/0x1a0 [ 1291.415281] ? do_syscall_64+0x4c/0x640 [ 1291.419250] ? kernel_write+0x110/0x110 [ 1291.423220] do_syscall_64+0x1d5/0x640 [ 1291.427109] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1291.433161] RIP: 0033:0x45c829 [ 1291.436358] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1291.444059] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1291.451320] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1291.458578] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1291.465842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1291.473105] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 [ 1291.480414] CPU: 0 PID: 30588 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1291.488302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.497651] Call Trace: [ 1291.500244] dump_stack+0x13e/0x194 [ 1291.503869] should_fail.cold+0x10a/0x14b [ 1291.508021] __alloc_pages_nodemask+0x1bf/0x700 [ 1291.512694] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1291.517723] alloc_pages_vma+0xc2/0x4a0 [ 1291.521703] __handle_mm_fault+0x17b6/0x3280 [ 1291.526113] ? copy_page_range+0x1d70/0x1d70 [ 1291.530525] ? find_held_lock+0x2d/0x110 [ 1291.534601] handle_mm_fault+0x288/0x7a0 [ 1291.538673] __get_user_pages+0x44d/0x11e0 [ 1291.542913] ? follow_page_mask+0x1580/0x1580 [ 1291.547404] ? lock_acquire+0x1ec/0x3f0 [ 1291.551388] get_user_pages_unlocked+0x1df/0x2e0 [ 1291.556147] ? get_user_pages_locked+0x3d0/0x3d0 [ 1291.560906] ? get_user_pages_fast+0x1f6/0x2b0 [ 1291.565490] get_user_pages_fast+0x20f/0x2b0 [ 1291.569902] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1291.574663] iov_iter_get_pages+0x203/0xc80 [ 1291.578983] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1291.584105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1291.587817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1291.588862] af_alg_make_sg+0x82/0x3f0 [ 1291.588881] ? af_alg_data_wakeup+0x80/0x80 [ 1291.605559] ? af_alg_get_rsgl+0x14b/0x510 [ 1291.609796] af_alg_get_rsgl+0x1cf/0x510 [ 1291.613862] skcipher_recvmsg+0x766/0xcb0 [ 1291.618017] ? skcipher_release+0x40/0x40 [ 1291.622250] ? security_socket_recvmsg+0x8b/0xc0 [ 1291.627002] ? skcipher_release+0x40/0x40 [ 1291.631497] sock_recvmsg+0xc0/0x100 [ 1291.635210] sock_read_iter+0x252/0x360 [ 1291.639179] ? sock_recvmsg+0x100/0x100 [ 1291.643242] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1291.647987] ? iov_iter_init+0xa6/0x1c0 [ 1291.651964] __vfs_read+0x44b/0x610 [ 1291.655607] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1291.660195] ? selinux_file_permission+0x7a/0x440 [ 1291.665043] ? rw_verify_area+0xe1/0x2a0 [ 1291.669279] vfs_read+0x131/0x330 [ 1291.672721] SyS_read+0xf2/0x210 [ 1291.676099] ? kernel_write+0x110/0x110 [ 1291.680062] ? do_syscall_64+0x4c/0x640 [ 1291.684030] ? kernel_write+0x110/0x110 [ 1291.687992] do_syscall_64+0x1d5/0x640 [ 1291.691862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1291.697029] RIP: 0033:0x45c829 [ 1291.700204] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:28:58 executing program 5 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:28:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000100)={'filter\x00', 0xe5, "a19652232bdbbf1ef8aaa8d100e0699e8d7636c0e161c0719101fb107c1cf25bd03a5c2079d1d63a29555e03446ad21a0ab25bff92bb871216a370e7642102b7b5fc78ddf49b3328be5b1a49c06bff1e332630f347cea7e669dc6981709f784a0dfcb153ac3b429023b9bb3b8119575eb2e852f6a0f8ec0a3f7424736547e958ef8b6a63d7edc031795eb018c6af0d59d5e2076f072a1bb9b820b5bc76bf950656f887c25683ae29ec67e761a9037cab87b5bbb5ba8172295389cedee40b9b259f2d630f12a8c3009ae12f08140f43c65beccf280296db6a6e9e14a951b68229819ee1005b"}, &(0x7f0000000040)=0x109) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x70c8) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:28:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) symlinkat(&(0x7f0000000100)='./file0\x00', r1, &(0x7f00000003c0)='./file0\x00') r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)={0x7, {{0x2, 0x4e21, @multicast2}}, 0x0, 0x3, [{{0x2, 0x4e22, @empty}}, {{0x2, 0x4e22, @private=0xa010101}}, {{0x2, 0x4e22, @local}}]}, 0x210) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) [ 1291.707906] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1291.715163] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1291.722418] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1291.729674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1291.737009] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:59 executing program 4 (fault-call:6 fault-nth:29): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1291.802597] FAULT_INJECTION: forcing a failure. [ 1291.802597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1291.816911] CPU: 1 PID: 30605 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1291.824809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.834161] Call Trace: [ 1291.836758] dump_stack+0x13e/0x194 [ 1291.840399] should_fail.cold+0x10a/0x14b [ 1291.844555] __alloc_pages_nodemask+0x1bf/0x700 [ 1291.849235] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1291.854253] ? check_preemption_disabled+0x35/0x240 [ 1291.859288] alloc_pages_vma+0xc2/0x4a0 [ 1291.863267] wp_page_copy+0xa22/0x1300 [ 1291.867162] ? follow_pfn+0x200/0x200 [ 1291.870967] do_wp_page+0x244/0x11d0 [ 1291.874687] ? lock_acquire+0x170/0x3f0 [ 1291.878669] ? finish_mkwrite_fault+0x640/0x640 [ 1291.881599] FAULT_INJECTION: forcing a failure. [ 1291.881599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1291.883433] __handle_mm_fault+0x1c0e/0x3280 [ 1291.883449] ? copy_page_range+0x1d70/0x1d70 [ 1291.883464] ? find_held_lock+0x2d/0x110 [ 1291.883490] handle_mm_fault+0x288/0x7a0 [ 1291.883505] __get_user_pages+0x44d/0x11e0 [ 1291.883528] ? follow_page_mask+0x1580/0x1580 [ 1291.920900] get_user_pages_unlocked+0x1df/0x2e0 [ 1291.925667] ? get_user_pages_locked+0x3d0/0x3d0 [ 1291.930420] ? mark_held_locks+0xa6/0xf0 [ 1291.934479] ? get_user_pages_fast+0x16b/0x2b0 [ 1291.939056] get_user_pages_fast+0x20f/0x2b0 [ 1291.943462] ? check_preemption_disabled+0x35/0x240 [ 1291.948483] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1291.953250] ? perf_trace_lock+0x109/0x4b0 [ 1291.957484] iov_iter_get_pages+0x203/0xc80 [ 1291.961804] ? save_trace+0x290/0x290 [ 1291.965604] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1291.970541] af_alg_make_sg+0x82/0x3f0 [ 1291.974430] ? af_alg_data_wakeup+0x80/0x80 [ 1291.978744] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1291.983856] ? __kmalloc+0x36e/0x7c0 [ 1291.987584] af_alg_get_rsgl+0x1cf/0x510 [ 1291.991649] skcipher_recvmsg+0x766/0xcb0 [ 1291.995801] ? skcipher_release+0x40/0x40 [ 1291.999947] ? security_socket_recvmsg+0x8b/0xc0 [ 1292.004697] ? skcipher_release+0x40/0x40 [ 1292.008839] sock_recvmsg+0xc0/0x100 [ 1292.012553] sock_read_iter+0x252/0x360 [ 1292.016526] ? sock_recvmsg+0x100/0x100 [ 1292.020503] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1292.025254] ? iov_iter_init+0xa6/0x1c0 [ 1292.029223] __vfs_read+0x44b/0x610 [ 1292.032850] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1292.037435] ? selinux_file_permission+0x7a/0x440 [ 1292.042283] ? rw_verify_area+0xe1/0x2a0 [ 1292.046428] vfs_read+0x131/0x330 [ 1292.049877] SyS_read+0xf2/0x210 [ 1292.053263] ? kernel_write+0x110/0x110 [ 1292.057228] ? SyS_clock_settime+0x1a0/0x1a0 [ 1292.061647] ? do_syscall_64+0x4c/0x640 [ 1292.065630] ? kernel_write+0x110/0x110 [ 1292.069623] do_syscall_64+0x1d5/0x640 [ 1292.073521] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1292.078713] RIP: 0033:0x45c829 [ 1292.081897] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1292.089602] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1292.096869] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 10:28:59 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x18f280, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x3, 0x7) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000080)=0x1) recvmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) setsockopt$SO_BINDTODEVICE_wg(r3, 0x1, 0x19, &(0x7f0000000040)='wg2\x00', 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) [ 1292.104136] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.111409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1292.118675] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 [ 1292.125978] CPU: 0 PID: 30611 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1292.133861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.143207] Call Trace: [ 1292.145796] dump_stack+0x13e/0x194 [ 1292.149545] should_fail.cold+0x10a/0x14b [ 1292.153707] __alloc_pages_nodemask+0x1bf/0x700 [ 1292.158382] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1292.163410] alloc_pages_vma+0xc2/0x4a0 [ 1292.167385] __handle_mm_fault+0x17b6/0x3280 [ 1292.171800] ? copy_page_range+0x1d70/0x1d70 [ 1292.176207] ? find_held_lock+0x2d/0x110 [ 1292.180280] handle_mm_fault+0x288/0x7a0 [ 1292.184343] __get_user_pages+0x44d/0x11e0 [ 1292.188589] ? follow_page_mask+0x1580/0x1580 [ 1292.193097] get_user_pages_unlocked+0x1df/0x2e0 [ 1292.197853] ? get_user_pages_locked+0x3d0/0x3d0 [ 1292.202605] ? mark_held_locks+0xa6/0xf0 [ 1292.206662] ? get_user_pages_fast+0x16b/0x2b0 [ 1292.211268] get_user_pages_fast+0x20f/0x2b0 [ 1292.215658] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1292.220431] ? save_trace+0x290/0x290 [ 1292.224219] ? save_trace+0x290/0x290 [ 1292.227999] iov_iter_get_pages+0x203/0xc80 [ 1292.232310] ? __lock_is_held+0xad/0x140 [ 1292.236348] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1292.241262] af_alg_make_sg+0x82/0x3f0 [ 1292.245129] ? sock_kmalloc+0x75/0xc0 [ 1292.248911] ? af_alg_data_wakeup+0x80/0x80 [ 1292.253265] af_alg_get_rsgl+0x1cf/0x510 [ 1292.257310] skcipher_recvmsg+0x766/0xcb0 [ 1292.261454] ? skcipher_release+0x40/0x40 [ 1292.265589] ? security_socket_recvmsg+0x8b/0xc0 [ 1292.270325] ? skcipher_release+0x40/0x40 [ 1292.274466] sock_recvmsg+0xc0/0x100 [ 1292.278161] sock_read_iter+0x252/0x360 [ 1292.282132] ? finish_task_switch+0x178/0x620 [ 1292.286605] ? sock_recvmsg+0x100/0x100 [ 1292.290568] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1292.295308] ? iov_iter_init+0xa6/0x1c0 [ 1292.299357] __vfs_read+0x44b/0x610 [ 1292.303005] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1292.307576] ? selinux_file_permission+0x7a/0x440 [ 1292.312410] ? rw_verify_area+0xe1/0x2a0 [ 1292.316668] vfs_read+0x131/0x330 [ 1292.320199] SyS_read+0xf2/0x210 [ 1292.323554] ? kernel_write+0x110/0x110 [ 1292.327510] ? kernel_write+0x110/0x110 [ 1292.331481] do_syscall_64+0x1d5/0x640 [ 1292.335364] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1292.340543] RIP: 0033:0x45c829 [ 1292.343731] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:28:59 executing program 5 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1292.351526] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1292.358782] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1292.366041] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.373381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1292.380673] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:28:59 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:28:59 executing program 4 (fault-call:6 fault-nth:30): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1292.493864] FAULT_INJECTION: forcing a failure. [ 1292.493864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1292.518599] CPU: 0 PID: 30619 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1292.525967] FAULT_INJECTION: forcing a failure. [ 1292.525967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1292.526506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.547630] Call Trace: [ 1292.550225] dump_stack+0x13e/0x194 [ 1292.553864] should_fail.cold+0x10a/0x14b [ 1292.558008] __alloc_pages_nodemask+0x1bf/0x700 [ 1292.562669] ? check_preemption_disabled+0x35/0x240 [ 1292.567675] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1292.572696] ? alloc_pages_vma+0x12c/0x4a0 [ 1292.576929] alloc_pages_vma+0xc2/0x4a0 [ 1292.580895] wp_page_copy+0xa22/0x1300 [ 1292.584777] ? follow_pfn+0x200/0x200 [ 1292.588570] do_wp_page+0x244/0x11d0 [ 1292.592267] ? lock_acquire+0x170/0x3f0 [ 1292.596238] ? finish_mkwrite_fault+0x640/0x640 [ 1292.600899] __handle_mm_fault+0x1c0e/0x3280 [ 1292.605324] ? copy_page_range+0x1d70/0x1d70 [ 1292.609722] ? find_held_lock+0x2d/0x110 [ 1292.613778] handle_mm_fault+0x288/0x7a0 [ 1292.617822] __get_user_pages+0x44d/0x11e0 [ 1292.622053] ? follow_page_mask+0x1580/0x1580 [ 1292.626553] get_user_pages_unlocked+0x1df/0x2e0 [ 1292.631293] ? get_user_pages_locked+0x3d0/0x3d0 [ 1292.636030] ? get_user_pages_fast+0x19d/0x2b0 [ 1292.640600] get_user_pages_fast+0x20f/0x2b0 [ 1292.644996] ? check_preemption_disabled+0x35/0x240 [ 1292.650000] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1292.654742] ? perf_trace_lock+0x109/0x4b0 [ 1292.658976] iov_iter_get_pages+0x203/0xc80 [ 1292.663290] ? save_trace+0x290/0x290 [ 1292.667080] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1292.671999] af_alg_make_sg+0x82/0x3f0 [ 1292.675872] ? af_alg_data_wakeup+0x80/0x80 [ 1292.680186] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1292.685206] ? __kmalloc+0x36e/0x7c0 [ 1292.688909] af_alg_get_rsgl+0x1cf/0x510 [ 1292.692962] skcipher_recvmsg+0x766/0xcb0 [ 1292.697096] ? skcipher_release+0x40/0x40 [ 1292.701233] ? security_socket_recvmsg+0x8b/0xc0 [ 1292.705978] ? skcipher_release+0x40/0x40 [ 1292.710115] sock_recvmsg+0xc0/0x100 [ 1292.713817] sock_read_iter+0x252/0x360 [ 1292.717771] ? sock_recvmsg+0x100/0x100 [ 1292.721730] ? retint_kernel+0x2d/0x2d [ 1292.725610] ? __vfs_read+0x1a5/0x610 [ 1292.729391] ? iov_iter_init+0xa6/0x1c0 [ 1292.733347] __vfs_read+0x44b/0x610 [ 1292.736959] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1292.741535] ? selinux_file_permission+0x7a/0x440 [ 1292.746380] ? rw_verify_area+0xe1/0x2a0 [ 1292.750428] vfs_read+0x131/0x330 [ 1292.753862] SyS_read+0xf2/0x210 [ 1292.757209] ? kernel_write+0x110/0x110 [ 1292.761169] ? do_syscall_64+0x4c/0x640 [ 1292.765126] ? kernel_write+0x110/0x110 [ 1292.769081] do_syscall_64+0x1d5/0x640 [ 1292.772959] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1292.778127] RIP: 0033:0x45c829 [ 1292.781300] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1292.788997] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1292.796249] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1292.803499] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.810749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1292.818005] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 [ 1292.830546] CPU: 1 PID: 30628 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1292.838451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.847801] Call Trace: [ 1292.850392] dump_stack+0x13e/0x194 [ 1292.854026] should_fail.cold+0x10a/0x14b [ 1292.858178] __alloc_pages_nodemask+0x1bf/0x700 [ 1292.862851] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1292.867864] ? find_held_lock+0x2d/0x110 [ 1292.871974] alloc_pages_vma+0xc2/0x4a0 [ 1292.875952] __handle_mm_fault+0x17b6/0x3280 [ 1292.880367] ? copy_page_range+0x1d70/0x1d70 [ 1292.885298] ? find_held_lock+0x2d/0x110 [ 1292.889374] handle_mm_fault+0x288/0x7a0 [ 1292.893496] __get_user_pages+0x44d/0x11e0 [ 1292.897764] ? follow_page_mask+0x1580/0x1580 [ 1292.902284] get_user_pages_unlocked+0x1df/0x2e0 [ 1292.907048] ? get_user_pages_locked+0x3d0/0x3d0 [ 1292.911805] ? mark_held_locks+0xa6/0xf0 [ 1292.915868] ? get_user_pages_fast+0x16b/0x2b0 [ 1292.920468] get_user_pages_fast+0x20f/0x2b0 [ 1292.924882] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1292.929639] ? save_trace+0x290/0x290 [ 1292.933445] ? save_trace+0x290/0x290 [ 1292.937252] iov_iter_get_pages+0x203/0xc80 [ 1292.941578] ? __lock_is_held+0xad/0x140 10:29:00 executing program 5 (fault-call:6 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1292.945641] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1292.950576] af_alg_make_sg+0x82/0x3f0 [ 1292.954472] ? sock_kmalloc+0x75/0xc0 [ 1292.958275] ? af_alg_data_wakeup+0x80/0x80 [ 1292.962610] af_alg_get_rsgl+0x1cf/0x510 [ 1292.966683] skcipher_recvmsg+0x766/0xcb0 [ 1292.970842] ? skcipher_release+0x40/0x40 [ 1292.974994] ? security_socket_recvmsg+0x8b/0xc0 [ 1292.979748] ? skcipher_release+0x40/0x40 [ 1292.983895] sock_recvmsg+0xc0/0x100 [ 1292.987605] sock_read_iter+0x252/0x360 [ 1292.991573] ? sock_recvmsg+0x100/0x100 [ 1292.995544] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1293.000289] ? iov_iter_init+0xa6/0x1c0 [ 1293.004264] __vfs_read+0x44b/0x610 [ 1293.007892] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1293.012483] ? selinux_file_permission+0x7a/0x440 [ 1293.016126] FAULT_INJECTION: forcing a failure. [ 1293.016126] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1293.017327] ? rw_verify_area+0xe1/0x2a0 [ 1293.017341] vfs_read+0x131/0x330 [ 1293.017354] SyS_read+0xf2/0x210 [ 1293.017364] ? kernel_write+0x110/0x110 [ 1293.017376] ? SyS_clock_settime+0x1a0/0x1a0 [ 1293.017387] ? do_syscall_64+0x4c/0x640 [ 1293.017403] ? kernel_write+0x110/0x110 [ 1293.056303] do_syscall_64+0x1d5/0x640 [ 1293.060200] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1293.065393] RIP: 0033:0x45c829 [ 1293.068585] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1293.076291] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1293.083561] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1293.090834] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1293.098096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1293.105359] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1293.112703] CPU: 0 PID: 30634 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1293.120593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.129940] Call Trace: [ 1293.132537] dump_stack+0x13e/0x194 [ 1293.136169] should_fail.cold+0x10a/0x14b [ 1293.140321] __alloc_pages_nodemask+0x1bf/0x700 10:29:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x1, 0x1, 0x3007, 0x1, 0x8, 0x0, 0x1}}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000580)=""/177, 0xb1}, {&(0x7f0000000340)=""/130, 0x82}, {&(0x7f0000000500)=""/117, 0x75}, {&(0x7f0000003180)=""/102392, 0x18ff8}, {&(0x7f0000000400)=""/108, 0x6c}], 0x5, 0x800000) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r4}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r4, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000640)={r4, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x8, 0x101, 0xec9a8cba, 0x7fffffff, 0x20, 0x4, 0x8}, &(0x7f00000001c0)=0x9c) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000040)={@dev}, &(0x7f0000000100)=0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 1293.144993] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1293.150009] ? check_preemption_disabled+0x35/0x240 [ 1293.155036] alloc_pages_vma+0xc2/0x4a0 [ 1293.159029] wp_page_copy+0xa22/0x1300 [ 1293.162930] ? follow_pfn+0x200/0x200 [ 1293.166738] do_wp_page+0x244/0x11d0 [ 1293.170449] ? lock_acquire+0x170/0x3f0 [ 1293.174421] ? finish_mkwrite_fault+0x640/0x640 [ 1293.179085] __handle_mm_fault+0x1c0e/0x3280 [ 1293.183563] ? copy_page_range+0x1d70/0x1d70 [ 1293.187950] ? find_held_lock+0x2d/0x110 [ 1293.192127] handle_mm_fault+0x288/0x7a0 [ 1293.196185] __get_user_pages+0x44d/0x11e0 [ 1293.200415] ? follow_page_mask+0x1580/0x1580 [ 1293.204910] get_user_pages_unlocked+0x1df/0x2e0 [ 1293.209659] ? get_user_pages_locked+0x3d0/0x3d0 [ 1293.214445] ? get_user_pages_fast+0x19d/0x2b0 [ 1293.219142] get_user_pages_fast+0x20f/0x2b0 [ 1293.223545] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1293.228298] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1293.233306] iov_iter_get_pages+0x203/0xc80 [ 1293.237662] ? retint_kernel+0x2d/0x2d [ 1293.241542] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1293.246471] af_alg_make_sg+0x82/0x3f0 [ 1293.250428] ? quarantine_put+0x1a0/0x1a0 [ 1293.254674] ? af_alg_data_wakeup+0x80/0x80 [ 1293.258972] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1293.263965] ? __kmalloc+0x36e/0x7c0 [ 1293.267657] af_alg_get_rsgl+0x1cf/0x510 [ 1293.271700] skcipher_recvmsg+0x766/0xcb0 [ 1293.275831] ? skcipher_release+0x40/0x40 [ 1293.279965] ? security_socket_recvmsg+0x8b/0xc0 [ 1293.284720] ? skcipher_release+0x40/0x40 [ 1293.288845] sock_recvmsg+0xc0/0x100 [ 1293.292538] sock_read_iter+0x252/0x360 [ 1293.296487] ? sock_recvmsg+0x100/0x100 [ 1293.300459] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1293.305294] ? iov_iter_init+0xa6/0x1c0 [ 1293.309259] __vfs_read+0x44b/0x610 [ 1293.312866] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1293.318300] ? selinux_file_permission+0x7a/0x440 [ 1293.323135] ? rw_verify_area+0xe1/0x2a0 [ 1293.327191] vfs_read+0x131/0x330 [ 1293.330630] SyS_read+0xf2/0x210 [ 1293.333993] ? kernel_write+0x110/0x110 [ 1293.337945] ? do_syscall_64+0x4c/0x640 [ 1293.341896] ? kernel_write+0x110/0x110 [ 1293.345846] do_syscall_64+0x1d5/0x640 [ 1293.349725] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1293.354911] RIP: 0033:0x45c829 [ 1293.358099] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1293.365793] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1293.373054] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1293.380309] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1293.387579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 10:29:00 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x402) getsockname$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000080)=0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:29:00 executing program 4 (fault-call:6 fault-nth:31): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1293.394827] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 10:29:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in6={0xa, 0x4e21, 0x6, @mcast2, 0xffffffd1}, @in6={0xa, 0x5b7, 0x0, @remote, 0xffffffe1}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e24, @private=0xa010100}], 0x68) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000100)={0x2, 0x6}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f00000001c0)={0x7ff, 0x6, 0x1f, 0x8, 0xff, "d2888b04dfef82fac2645f5ca96949688f6ee6", 0x5, 0x74}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f0000000240)="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") r7 = socket$inet(0x10, 0x3, 0xc) sendmsg(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:00 executing program 5 (fault-call:6 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:00 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000000)={0x101, 0xf10, 0x7, 0x400, 0x6, 0x1, 0x3ff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1293.484111] FAULT_INJECTION: forcing a failure. [ 1293.484111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1293.503588] CPU: 1 PID: 30642 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1293.511489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.520841] Call Trace: [ 1293.523433] dump_stack+0x13e/0x194 [ 1293.527075] should_fail.cold+0x10a/0x14b [ 1293.531229] __alloc_pages_nodemask+0x1bf/0x700 [ 1293.535903] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1293.541267] ? find_held_lock+0x2d/0x110 [ 1293.545338] alloc_pages_vma+0xc2/0x4a0 [ 1293.549319] __handle_mm_fault+0x17b6/0x3280 [ 1293.549354] FAULT_INJECTION: forcing a failure. [ 1293.549354] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1293.553723] ? copy_page_range+0x1d70/0x1d70 [ 1293.553736] ? find_held_lock+0x2d/0x110 [ 1293.553762] handle_mm_fault+0x288/0x7a0 [ 1293.553778] __get_user_pages+0x44d/0x11e0 [ 1293.553796] ? follow_page_mask+0x1580/0x1580 [ 1293.553818] get_user_pages_unlocked+0x1df/0x2e0 [ 1293.553835] ? get_user_pages_locked+0x3d0/0x3d0 [ 1293.597653] ? mark_held_locks+0xa6/0xf0 [ 1293.601716] ? get_user_pages_fast+0x16b/0x2b0 [ 1293.606383] get_user_pages_fast+0x20f/0x2b0 [ 1293.610786] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1293.615535] ? save_trace+0x290/0x290 [ 1293.619330] ? save_trace+0x290/0x290 [ 1293.623126] iov_iter_get_pages+0x203/0xc80 [ 1293.627444] ? __lock_is_held+0xad/0x140 [ 1293.631499] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1293.636429] af_alg_make_sg+0x82/0x3f0 [ 1293.640313] ? sock_kmalloc+0x75/0xc0 [ 1293.644112] ? af_alg_data_wakeup+0x80/0x80 [ 1293.648439] af_alg_get_rsgl+0x1cf/0x510 [ 1293.652505] skcipher_recvmsg+0x766/0xcb0 [ 1293.656750] ? skcipher_release+0x40/0x40 [ 1293.660896] ? security_socket_recvmsg+0x8b/0xc0 [ 1293.665648] ? skcipher_release+0x40/0x40 [ 1293.669799] sock_recvmsg+0xc0/0x100 [ 1293.673512] sock_read_iter+0x252/0x360 [ 1293.677481] ? sock_recvmsg+0x100/0x100 [ 1293.681462] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1293.686212] ? iov_iter_init+0xa6/0x1c0 [ 1293.690182] __vfs_read+0x44b/0x610 [ 1293.693807] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1293.698390] ? selinux_file_permission+0x7a/0x440 [ 1293.703231] ? rw_verify_area+0xe1/0x2a0 [ 1293.707286] vfs_read+0x131/0x330 [ 1293.710741] SyS_read+0xf2/0x210 [ 1293.714104] ? kernel_write+0x110/0x110 [ 1293.718070] ? SyS_clock_settime+0x1a0/0x1a0 [ 1293.722474] ? do_syscall_64+0x4c/0x640 [ 1293.726440] ? kernel_write+0x110/0x110 [ 1293.730410] do_syscall_64+0x1d5/0x640 [ 1293.734298] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1293.739480] RIP: 0033:0x45c829 [ 1293.742658] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1293.750360] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1293.757621] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1293.764881] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1293.772155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1293.779416] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1293.786706] CPU: 0 PID: 30647 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1293.794593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.803940] Call Trace: [ 1293.806530] dump_stack+0x13e/0x194 [ 1293.810336] should_fail.cold+0x10a/0x14b [ 1293.814484] __alloc_pages_nodemask+0x1bf/0x700 [ 1293.819158] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1293.824178] ? __sanitizer_cov_trace_pc+0x3d/0x50 [ 1293.829024] alloc_pages_vma+0xc2/0x4a0 [ 1293.833002] wp_page_copy+0xa22/0x1300 [ 1293.836894] ? follow_pfn+0x200/0x200 [ 1293.840691] ? check_preemption_disabled+0x35/0x240 [ 1293.845716] do_wp_page+0x244/0x11d0 [ 1293.849603] ? lock_acquire+0x170/0x3f0 [ 1293.853662] ? finish_mkwrite_fault+0x640/0x640 [ 1293.858342] __handle_mm_fault+0x1c0e/0x3280 [ 1293.862752] ? copy_page_range+0x1d70/0x1d70 [ 1293.867155] ? find_held_lock+0x2d/0x110 [ 1293.871221] handle_mm_fault+0x288/0x7a0 [ 1293.875281] __get_user_pages+0x44d/0x11e0 [ 1293.879510] ? follow_page_mask+0x1580/0x1580 [ 1293.883999] get_user_pages_unlocked+0x1df/0x2e0 [ 1293.888742] ? get_user_pages_locked+0x3d0/0x3d0 [ 1293.893491] ? mark_held_locks+0xa6/0xf0 [ 1293.897560] ? get_user_pages_fast+0x16b/0x2b0 [ 1293.902236] get_user_pages_fast+0x20f/0x2b0 [ 1293.906672] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1293.911426] iov_iter_get_pages+0x203/0xc80 [ 1293.915755] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1293.920668] af_alg_make_sg+0x82/0x3f0 [ 1293.924536] ? af_alg_data_wakeup+0x80/0x80 [ 1293.936912] ? af_alg_get_rsgl+0x289/0x510 [ 1293.941137] af_alg_get_rsgl+0x1cf/0x510 [ 1293.945209] skcipher_recvmsg+0x766/0xcb0 [ 1293.949359] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1293.954357] ? skcipher_release+0x40/0x40 [ 1293.958487] ? security_socket_recvmsg+0x8b/0xc0 [ 1293.963221] ? skcipher_release+0x40/0x40 [ 1293.967349] sock_recvmsg+0xc0/0x100 [ 1293.971054] sock_read_iter+0x252/0x360 [ 1293.975015] ? sock_recvmsg+0x100/0x100 [ 1293.978970] ? iov_iter_init+0xa6/0x1c0 [ 1293.982924] __vfs_read+0x44b/0x610 [ 1293.986526] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1293.991096] ? file_has_perm+0x14a/0x220 [ 1293.995144] ? selinux_file_permission+0x7a/0x440 [ 1293.999968] ? rw_verify_area+0xe1/0x2a0 [ 1294.004005] vfs_read+0x131/0x330 [ 1294.007433] SyS_read+0xf2/0x210 [ 1294.010784] ? kernel_write+0x110/0x110 [ 1294.014741] ? SyS_clock_settime+0x1a0/0x1a0 [ 1294.019140] ? do_syscall_64+0x4c/0x640 [ 1294.023114] ? kernel_write+0x110/0x110 [ 1294.027066] do_syscall_64+0x1d5/0x640 [ 1294.030947] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:29:01 executing program 4 (fault-call:6 fault-nth:32): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:01 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1294.036306] RIP: 0033:0x45c829 [ 1294.039476] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1294.047179] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1294.054429] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1294.061676] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1294.068983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1294.076371] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 10:29:01 executing program 5 (fault-call:6 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1294.164140] FAULT_INJECTION: forcing a failure. [ 1294.164140] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1294.194517] CPU: 0 PID: 30662 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1294.202426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.211785] Call Trace: [ 1294.214380] dump_stack+0x13e/0x194 [ 1294.218014] should_fail.cold+0x10a/0x14b [ 1294.222155] __alloc_pages_nodemask+0x1bf/0x700 [ 1294.226805] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1294.231803] ? find_held_lock+0x2d/0x110 [ 1294.235862] alloc_pages_vma+0xc2/0x4a0 [ 1294.239838] __handle_mm_fault+0x17b6/0x3280 [ 1294.244234] ? copy_page_range+0x1d70/0x1d70 [ 1294.248621] ? find_held_lock+0x2d/0x110 [ 1294.252669] handle_mm_fault+0x288/0x7a0 [ 1294.256708] __get_user_pages+0x44d/0x11e0 [ 1294.260945] ? follow_page_mask+0x1580/0x1580 [ 1294.265454] get_user_pages_unlocked+0x1df/0x2e0 [ 1294.270211] ? get_user_pages_locked+0x3d0/0x3d0 [ 1294.274956] ? mark_held_locks+0xa6/0xf0 [ 1294.278999] ? get_user_pages_fast+0x16b/0x2b0 [ 1294.283562] get_user_pages_fast+0x20f/0x2b0 [ 1294.287952] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1294.292694] ? save_trace+0x290/0x290 [ 1294.296529] ? save_trace+0x290/0x290 [ 1294.300309] iov_iter_get_pages+0x203/0xc80 [ 1294.304608] ? __lock_is_held+0xad/0x140 [ 1294.308645] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1294.313568] af_alg_make_sg+0x82/0x3f0 [ 1294.317442] ? sock_kmalloc+0x75/0xc0 [ 1294.321280] ? af_alg_data_wakeup+0x80/0x80 [ 1294.325601] af_alg_get_rsgl+0x1cf/0x510 [ 1294.329660] skcipher_recvmsg+0x766/0xcb0 [ 1294.333809] ? skcipher_release+0x40/0x40 [ 1294.337947] ? security_socket_recvmsg+0x8b/0xc0 [ 1294.342680] ? skcipher_release+0x40/0x40 [ 1294.346806] sock_recvmsg+0xc0/0x100 [ 1294.350509] sock_read_iter+0x252/0x360 [ 1294.354476] ? sock_recvmsg+0x100/0x100 [ 1294.358433] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1294.363166] ? iov_iter_init+0xa6/0x1c0 [ 1294.367121] __vfs_read+0x44b/0x610 [ 1294.370823] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1294.375394] ? selinux_file_permission+0x7a/0x440 [ 1294.380307] ? rw_verify_area+0xe1/0x2a0 [ 1294.384348] vfs_read+0x131/0x330 [ 1294.387778] SyS_read+0xf2/0x210 [ 1294.391132] ? kernel_write+0x110/0x110 [ 1294.395103] ? SyS_clock_settime+0x1a0/0x1a0 [ 1294.399495] ? do_syscall_64+0x4c/0x640 [ 1294.403444] ? kernel_write+0x110/0x110 [ 1294.407422] do_syscall_64+0x1d5/0x640 [ 1294.411304] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1294.416479] RIP: 0033:0x45c829 [ 1294.419654] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1294.427356] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1294.434605] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1294.441851] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1294.449099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1294.456347] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1294.498356] FAULT_INJECTION: forcing a failure. [ 1294.498356] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:29:01 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x9, 0x3, "9fefe5"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r2, 0x4148, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:01 executing program 4 (fault-call:6 fault-nth:33): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1294.556197] CPU: 1 PID: 30668 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1294.564109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.573550] Call Trace: [ 1294.576148] dump_stack+0x13e/0x194 [ 1294.579784] should_fail.cold+0x10a/0x14b [ 1294.583940] __alloc_pages_nodemask+0x1bf/0x700 [ 1294.588616] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1294.593634] ? check_preemption_disabled+0x35/0x240 [ 1294.598660] alloc_pages_vma+0xc2/0x4a0 [ 1294.602648] wp_page_copy+0xa22/0x1300 [ 1294.606541] ? follow_pfn+0x200/0x200 [ 1294.610352] do_wp_page+0x244/0x11d0 [ 1294.614066] ? lock_acquire+0x170/0x3f0 [ 1294.618039] ? finish_mkwrite_fault+0x640/0x640 [ 1294.622713] __handle_mm_fault+0x1c0e/0x3280 [ 1294.627123] ? copy_page_range+0x1d70/0x1d70 [ 1294.631537] ? find_held_lock+0x2d/0x110 [ 1294.635611] handle_mm_fault+0x288/0x7a0 [ 1294.640112] __get_user_pages+0x44d/0x11e0 [ 1294.644357] ? follow_page_mask+0x1580/0x1580 [ 1294.648871] get_user_pages_unlocked+0x1df/0x2e0 [ 1294.653643] ? get_user_pages_locked+0x3d0/0x3d0 [ 1294.658397] ? mark_held_locks+0xa6/0xf0 [ 1294.662466] ? get_user_pages_fast+0x16b/0x2b0 [ 1294.667057] get_user_pages_fast+0x20f/0x2b0 [ 1294.671476] ? check_preemption_disabled+0x35/0x240 [ 1294.676499] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1294.681267] ? perf_trace_lock+0x109/0x4b0 [ 1294.685511] iov_iter_get_pages+0x203/0xc80 [ 1294.689842] ? save_trace+0x290/0x290 [ 1294.693651] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1294.698594] af_alg_make_sg+0x82/0x3f0 [ 1294.702495] ? af_alg_data_wakeup+0x80/0x80 [ 1294.706819] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1294.711837] ? __kmalloc+0x36e/0x7c0 [ 1294.715557] af_alg_get_rsgl+0x1cf/0x510 [ 1294.719627] skcipher_recvmsg+0x766/0xcb0 [ 1294.723783] ? skcipher_release+0x40/0x40 [ 1294.728456] ? security_socket_recvmsg+0x8b/0xc0 [ 1294.733215] ? skcipher_release+0x40/0x40 [ 1294.737365] sock_recvmsg+0xc0/0x100 [ 1294.741083] sock_read_iter+0x252/0x360 [ 1294.745060] ? sock_recvmsg+0x100/0x100 [ 1294.749046] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1294.753796] ? iov_iter_init+0xa6/0x1c0 [ 1294.757779] __vfs_read+0x44b/0x610 [ 1294.761408] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1294.766009] ? selinux_file_permission+0x7a/0x440 [ 1294.770857] ? rw_verify_area+0xe1/0x2a0 [ 1294.774922] vfs_read+0x131/0x330 [ 1294.778467] SyS_read+0xf2/0x210 [ 1294.781833] ? kernel_write+0x110/0x110 [ 1294.785805] ? SyS_clock_settime+0x1a0/0x1a0 [ 1294.790211] ? do_syscall_64+0x4c/0x640 [ 1294.794183] ? kernel_write+0x110/0x110 [ 1294.798159] do_syscall_64+0x1d5/0x640 [ 1294.802055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1294.807276] RIP: 0033:0x45c829 [ 1294.810483] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1294.818196] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1294.825466] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1294.832732] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1294.840002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1294.847270] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 10:29:02 executing program 5 (fault-call:6 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1294.892877] FAULT_INJECTION: forcing a failure. [ 1294.892877] name failslab, interval 1, probability 0, space 0, times 0 [ 1294.913156] CPU: 1 PID: 30678 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1294.921061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.930417] Call Trace: [ 1294.933023] dump_stack+0x13e/0x194 [ 1294.936656] should_fail.cold+0x10a/0x14b [ 1294.940808] should_failslab+0xd6/0x130 [ 1294.944787] __kmalloc+0x2e9/0x7c0 [ 1294.948329] ? sock_kmalloc+0x75/0xc0 [ 1294.952129] ? iov_iter_advance+0x1c0/0xc70 [ 1294.956455] sock_kmalloc+0x75/0xc0 [ 1294.960087] af_alg_get_rsgl+0xcc/0x510 [ 1294.964070] skcipher_recvmsg+0x766/0xcb0 [ 1294.968227] ? skcipher_release+0x40/0x40 [ 1294.972373] ? security_socket_recvmsg+0x8b/0xc0 [ 1294.977125] ? skcipher_release+0x40/0x40 [ 1294.981273] sock_recvmsg+0xc0/0x100 [ 1294.984992] sock_read_iter+0x252/0x360 [ 1294.988966] ? sock_recvmsg+0x100/0x100 [ 1294.992950] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1294.997712] ? iov_iter_init+0xa6/0x1c0 [ 1295.001693] __vfs_read+0x44b/0x610 [ 1295.005322] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1295.009910] ? selinux_file_permission+0x7a/0x440 [ 1295.014759] ? rw_verify_area+0xe1/0x2a0 [ 1295.018828] vfs_read+0x131/0x330 [ 1295.022285] SyS_read+0xf2/0x210 [ 1295.025649] ? kernel_write+0x110/0x110 [ 1295.029622] ? SyS_clock_settime+0x1a0/0x1a0 [ 1295.034029] ? do_syscall_64+0x4c/0x640 [ 1295.037999] ? kernel_write+0x110/0x110 [ 1295.041973] do_syscall_64+0x1d5/0x640 [ 1295.045958] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1295.051145] RIP: 0033:0x45c829 [ 1295.054328] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1295.062038] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1295.069307] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1295.076577] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1295.083849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1295.091117] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1295.112877] FAULT_INJECTION: forcing a failure. [ 1295.112877] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1295.130536] CPU: 1 PID: 30680 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1295.138520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1295.147869] Call Trace: [ 1295.150464] dump_stack+0x13e/0x194 [ 1295.154108] should_fail.cold+0x10a/0x14b [ 1295.158262] __alloc_pages_nodemask+0x1bf/0x700 [ 1295.162936] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1295.167947] ? check_preemption_disabled+0x35/0x240 [ 1295.172993] alloc_pages_vma+0xc2/0x4a0 [ 1295.176971] wp_page_copy+0xa22/0x1300 [ 1295.180864] ? follow_pfn+0x200/0x200 [ 1295.184674] do_wp_page+0x244/0x11d0 [ 1295.188390] ? lock_acquire+0x170/0x3f0 [ 1295.192362] ? finish_mkwrite_fault+0x640/0x640 [ 1295.197034] __handle_mm_fault+0x1c0e/0x3280 [ 1295.201449] ? copy_page_range+0x1d70/0x1d70 [ 1295.205859] ? find_held_lock+0x2d/0x110 [ 1295.209934] handle_mm_fault+0x288/0x7a0 [ 1295.214002] __get_user_pages+0x44d/0x11e0 [ 1295.218243] ? follow_page_mask+0x1580/0x1580 [ 1295.222744] get_user_pages_unlocked+0x1df/0x2e0 [ 1295.227506] ? get_user_pages_locked+0x3d0/0x3d0 [ 1295.232259] ? mark_held_locks+0xa6/0xf0 [ 1295.236319] ? get_user_pages_fast+0x16b/0x2b0 [ 1295.240909] get_user_pages_fast+0x20f/0x2b0 [ 1295.245314] ? check_preemption_disabled+0x35/0x240 [ 1295.250326] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1295.255079] ? perf_trace_lock+0x109/0x4b0 [ 1295.259313] iov_iter_get_pages+0x203/0xc80 [ 1295.263640] ? save_trace+0x290/0x290 [ 1295.267441] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1295.272375] af_alg_make_sg+0x82/0x3f0 [ 1295.276269] ? af_alg_data_wakeup+0x80/0x80 [ 1295.280591] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1295.285605] ? __kmalloc+0x36e/0x7c0 [ 1295.289320] af_alg_get_rsgl+0x1cf/0x510 [ 1295.293394] skcipher_recvmsg+0x766/0xcb0 [ 1295.297548] ? skcipher_release+0x40/0x40 [ 1295.301697] ? security_socket_recvmsg+0x8b/0xc0 [ 1295.306451] ? skcipher_release+0x40/0x40 [ 1295.310596] sock_recvmsg+0xc0/0x100 [ 1295.314310] sock_read_iter+0x252/0x360 [ 1295.318286] ? sock_recvmsg+0x100/0x100 [ 1295.322266] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1295.327021] ? iov_iter_init+0xa6/0x1c0 [ 1295.331002] __vfs_read+0x44b/0x610 [ 1295.334632] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1295.339221] ? selinux_file_permission+0x7a/0x440 [ 1295.344072] ? rw_verify_area+0xe1/0x2a0 [ 1295.348135] vfs_read+0x131/0x330 [ 1295.351593] SyS_read+0xf2/0x210 [ 1295.354960] ? kernel_write+0x110/0x110 [ 1295.358932] ? SyS_clock_settime+0x1a0/0x1a0 [ 1295.363340] ? do_syscall_64+0x4c/0x640 [ 1295.367307] ? kernel_write+0x110/0x110 [ 1295.371293] do_syscall_64+0x1d5/0x640 [ 1295.375186] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1295.380380] RIP: 0033:0x45c829 [ 1295.383565] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1295.391274] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1295.398543] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1295.405812] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1295.413177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1295.420443] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 10:29:03 executing program 4 (fault-call:6 fault-nth:34): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:03 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2b", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:03 executing program 5 (fault-call:6 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKRRPART(r1, 0x125f, 0x0) setsockopt(r0, 0x0, 0x9, &(0x7f0000000080)="d0659b779c2dd0f9a4d9725bf5bd50af7d002feb535a8aaf6e37fa967718c5d725f1cc583c5dab57eff6fce182e4c087133bbcf3036ba239b73d8ea8da798613bddc924f0fa8a5803b55bddc6fe2435ac239811b009f3fa4ed1ecaf849ccff232765f367071dad3423d4fd552b026524cfae4bcdb8d3a2c7d11f6ae33db190020b", 0x81) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f0000000040)=0x7) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03020067656e65766500001000028006000500030000000400060008000500"/44, @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0x50}}, 0x0) connect$can_bcm(r1, &(0x7f0000000000)={0x1d, r4}, 0x10) 10:29:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, &(0x7f0000000380)="07349a96dd680069eba7fc2d6f732d26f6dbc4eb791b2f36a34c37e9b4f642690a2590694a293b1b218273b8ee30c578af42d73e4a987cb1b6d675e777a431fe2d41c5faed77e36f318885467a67a8d72146", 0x52, r1) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000740)="a71dcdd2dcd92b472a343295d69f0a77707793e3c12bbb62d63afa56e6ebe6f6c807eee800dfd729eef26339ef3da8efd3f01c7e40145f7e5f97a877126b2a0c0dc3482a88c475497d9f4adaab768562ab9f588298858cc92da07dcc3d3de8eb0bb85b05d2fce31a03960803b9ff8f9b8e13f003c8", 0x75, r1) keyctl$assume_authority(0x10, r2) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x2a, &(0x7f00000000c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = fanotify_init(0x10, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000080)) accept$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x300}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x50}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03000000000000200012800b00010067656e65766500001000028006000500030000000400060008000500", @ANYRES32=0x0, @ANYBLOB='H\x00\n@', @ANYRES32=r10, @ANYBLOB], 0x50}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x108, 0x0, 0x1, 0x70bd2d, 0x8000, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKINFO_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x41}, 0x48801) [ 1296.570625] FAULT_INJECTION: forcing a failure. [ 1296.570625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1296.574227] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1296.585238] CPU: 1 PID: 30700 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1296.599278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.602248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1296.608635] Call Trace: [ 1296.619718] dump_stack+0x13e/0x194 [ 1296.623382] should_fail.cold+0x10a/0x14b [ 1296.627536] __alloc_pages_nodemask+0x1bf/0x700 [ 1296.632207] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1296.637224] ? find_held_lock+0x2d/0x110 [ 1296.641335] alloc_pages_vma+0xc2/0x4a0 [ 1296.645316] __handle_mm_fault+0x17b6/0x3280 [ 1296.649726] ? copy_page_range+0x1d70/0x1d70 [ 1296.654138] ? find_held_lock+0x2d/0x110 [ 1296.658211] handle_mm_fault+0x288/0x7a0 [ 1296.662272] __get_user_pages+0x44d/0x11e0 [ 1296.666512] ? follow_page_mask+0x1580/0x1580 [ 1296.667570] FAULT_INJECTION: forcing a failure. [ 1296.667570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1296.671007] get_user_pages_unlocked+0x1df/0x2e0 [ 1296.671022] ? get_user_pages_locked+0x3d0/0x3d0 [ 1296.671032] ? mark_held_locks+0xa6/0xf0 [ 1296.671043] ? get_user_pages_fast+0x16b/0x2b0 [ 1296.671057] get_user_pages_fast+0x20f/0x2b0 [ 1296.671070] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1296.671078] ? save_trace+0x290/0x290 [ 1296.671087] ? save_trace+0x290/0x290 [ 1296.671101] iov_iter_get_pages+0x203/0xc80 [ 1296.671114] ? __lock_is_held+0xad/0x140 [ 1296.671124] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1296.671142] af_alg_make_sg+0x82/0x3f0 [ 1296.671153] ? sock_kmalloc+0x75/0xc0 [ 1296.671167] ? af_alg_data_wakeup+0x80/0x80 [ 1296.671184] af_alg_get_rsgl+0x1cf/0x510 [ 1296.671205] skcipher_recvmsg+0x766/0xcb0 [ 1296.671223] ? skcipher_release+0x40/0x40 [ 1296.671237] ? security_socket_recvmsg+0x8b/0xc0 [ 1296.671246] ? skcipher_release+0x40/0x40 [ 1296.671256] sock_recvmsg+0xc0/0x100 [ 1296.671267] sock_read_iter+0x252/0x360 [ 1296.671277] ? sock_recvmsg+0x100/0x100 [ 1296.671295] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1296.671309] ? iov_iter_init+0xa6/0x1c0 [ 1296.792564] __vfs_read+0x44b/0x610 [ 1296.796191] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1296.800802] ? selinux_file_permission+0x7a/0x440 [ 1296.805652] ? rw_verify_area+0xe1/0x2a0 [ 1296.809708] vfs_read+0x131/0x330 [ 1296.813158] SyS_read+0xf2/0x210 [ 1296.816513] ? kernel_write+0x110/0x110 [ 1296.820481] ? SyS_clock_settime+0x1a0/0x1a0 [ 1296.824909] ? do_syscall_64+0x4c/0x640 [ 1296.828873] ? kernel_write+0x110/0x110 [ 1296.832854] do_syscall_64+0x1d5/0x640 [ 1296.836759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1296.841953] RIP: 0033:0x45c829 [ 1296.845137] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1296.852855] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1296.860121] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1296.867390] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1296.874651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1296.881915] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1296.889201] CPU: 0 PID: 30704 Comm: syz-executor.5 Not tainted 4.14.177-syzkaller #0 [ 1296.897197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1296.906638] Call Trace: [ 1296.909234] dump_stack+0x13e/0x194 [ 1296.912873] should_fail.cold+0x10a/0x14b [ 1296.917025] __alloc_pages_nodemask+0x1bf/0x700 10:29:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080), 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x28, r5, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6tnl0\x00'}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x402800}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="3200f5ff9b71c7fab2cfeb19f2cb185474a47fa21b5784ca1941758bd3b6e6805fc4fe4b5eeee3b5772ef368e2684c38419a5dd09784bcbbde2e47a745e282fdb6635258e250e9541596c36f8850896344aa7625a98b0adbca4d0e3a5f43e6243e0fda07c347dffe7ce95b95478f76b7f186e05ad3b473", @ANYRES16=r5, @ANYBLOB="20002abd7000e200000006000000140008006873722b000000000000000010000000"], 0x3}, 0x1, 0x0, 0x0, 0x4040000}, 0x4081) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 10:29:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) 10:29:04 executing program 4 (fault-call:6 fault-nth:35): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1296.921707] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1296.926721] ? check_preemption_disabled+0x35/0x240 [ 1296.931759] alloc_pages_vma+0xc2/0x4a0 [ 1296.935740] wp_page_copy+0xa22/0x1300 [ 1296.939634] ? follow_pfn+0x200/0x200 [ 1296.943437] ? check_preemption_disabled+0x35/0x240 [ 1296.948446] do_wp_page+0x244/0x11d0 [ 1296.952175] ? lock_acquire+0x170/0x3f0 [ 1296.956141] ? finish_mkwrite_fault+0x640/0x640 [ 1296.960794] __handle_mm_fault+0x1c0e/0x3280 [ 1296.965232] ? copy_page_range+0x1d70/0x1d70 [ 1296.969670] ? find_held_lock+0x2d/0x110 [ 1296.973738] handle_mm_fault+0x288/0x7a0 [ 1296.977827] __get_user_pages+0x44d/0x11e0 [ 1296.982056] ? follow_page_mask+0x1580/0x1580 [ 1296.986543] get_user_pages_unlocked+0x1df/0x2e0 [ 1296.991287] ? get_user_pages_locked+0x3d0/0x3d0 [ 1296.996023] ? get_user_pages_fast+0x19d/0x2b0 [ 1297.000593] get_user_pages_fast+0x20f/0x2b0 [ 1297.004991] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1297.009726] ? get_user_pages_fast+0x13/0x2b0 [ 1297.014315] iov_iter_get_pages+0x203/0xc80 [ 1297.018633] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1297.023544] af_alg_make_sg+0x82/0x3f0 [ 1297.027413] ? af_alg_data_wakeup+0x80/0x80 [ 1297.031713] ? __list_add_valid+0x1e/0xa0 [ 1297.035863] af_alg_get_rsgl+0x1cf/0x510 [ 1297.039935] skcipher_recvmsg+0x766/0xcb0 [ 1297.044072] ? skcipher_release+0x40/0x40 [ 1297.048200] ? sock_recvmsg+0x53/0x100 [ 1297.052076] ? skcipher_release+0x40/0x40 [ 1297.056217] sock_recvmsg+0xc0/0x100 [ 1297.059911] sock_read_iter+0x252/0x360 [ 1297.063868] ? sock_recvmsg+0x100/0x100 [ 1297.067841] ? iov_iter_init+0xa6/0x1c0 [ 1297.071795] __vfs_read+0x44b/0x610 [ 1297.075414] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1297.079992] vfs_read+0x131/0x330 [ 1297.083425] SyS_read+0xf2/0x210 [ 1297.086944] ? kernel_write+0x110/0x110 [ 1297.090903] ? SyS_clock_settime+0x1a0/0x1a0 [ 1297.095299] ? do_syscall_64+0x4c/0x640 [ 1297.099259] ? kernel_write+0x110/0x110 [ 1297.103220] do_syscall_64+0x1d5/0x640 [ 1297.107089] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1297.112254] RIP: 0033:0x45c829 [ 1297.115448] RSP: 002b:00007f975cf1fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1297.123230] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1297.130479] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1297.137751] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1297.145008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1297.152256] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f975cf206d4 10:29:04 executing program 5 (fault-call:6 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000000)="660f72f4000fc7290516cb0f1883975e670fc5d204660f38822bea05000c00805a97d2b883008ee0d8739c", 0x2b}], 0x1, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pwrite64(r2, &(0x7f0000000780)="87dd8c6ea0feb206cda81577df1878b0c8bde43d2faa5f836b466549708e31fd3a9ea726", 0x24, 0x4000000000000004) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x111000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) sendmsg$AUDIT_TTY_GET(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x262c456b8ea99b94}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3f8, 0x400, 0x70bd2a, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000010) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000740)=0xe) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1297.240175] FAULT_INJECTION: forcing a failure. [ 1297.240175] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1297.261835] CPU: 1 PID: 30715 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1297.269737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.279091] Call Trace: [ 1297.281684] dump_stack+0x13e/0x194 [ 1297.285342] should_fail.cold+0x10a/0x14b [ 1297.289499] __alloc_pages_nodemask+0x1bf/0x700 [ 1297.294172] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1297.299276] ? find_held_lock+0x2d/0x110 [ 1297.303347] alloc_pages_vma+0xc2/0x4a0 [ 1297.307327] __handle_mm_fault+0x17b6/0x3280 [ 1297.311738] ? copy_page_range+0x1d70/0x1d70 [ 1297.316243] ? find_held_lock+0x2d/0x110 [ 1297.320360] handle_mm_fault+0x288/0x7a0 [ 1297.324421] __get_user_pages+0x44d/0x11e0 [ 1297.328665] ? follow_page_mask+0x1580/0x1580 [ 1297.333170] get_user_pages_unlocked+0x1df/0x2e0 [ 1297.337937] ? get_user_pages_locked+0x3d0/0x3d0 [ 1297.342688] ? mark_held_locks+0xa6/0xf0 [ 1297.346748] ? get_user_pages_fast+0x16b/0x2b0 [ 1297.351330] get_user_pages_fast+0x20f/0x2b0 [ 1297.355751] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1297.356624] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1297.360503] ? save_trace+0x290/0x290 [ 1297.360515] ? save_trace+0x290/0x290 [ 1297.360530] iov_iter_get_pages+0x203/0xc80 [ 1297.360543] ? __lock_is_held+0xad/0x140 [ 1297.360553] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1297.360571] af_alg_make_sg+0x82/0x3f0 [ 1297.360581] ? sock_kmalloc+0x75/0xc0 [ 1297.360594] ? af_alg_data_wakeup+0x80/0x80 [ 1297.360609] af_alg_get_rsgl+0x1cf/0x510 [ 1297.360629] skcipher_recvmsg+0x766/0xcb0 [ 1297.360648] ? skcipher_release+0x40/0x40 [ 1297.360661] ? security_socket_recvmsg+0x8b/0xc0 [ 1297.360671] ? skcipher_release+0x40/0x40 [ 1297.360680] sock_recvmsg+0xc0/0x100 [ 1297.360690] sock_read_iter+0x252/0x360 [ 1297.360700] ? sock_recvmsg+0x100/0x100 [ 1297.360720] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1297.420192] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1297.423387] ? iov_iter_init+0xa6/0x1c0 [ 1297.423405] __vfs_read+0x44b/0x610 [ 1297.423419] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1297.423439] ? selinux_file_permission+0x7a/0x440 [ 1297.423456] ? rw_verify_area+0xe1/0x2a0 [ 1297.423469] vfs_read+0x131/0x330 [ 1297.472956] SyS_read+0xf2/0x210 [ 1297.476330] ? kernel_write+0x110/0x110 [ 1297.480327] ? SyS_clock_settime+0x1a0/0x1a0 [ 1297.484738] ? do_syscall_64+0x4c/0x640 10:29:04 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r1}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r1, 0x4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={r1}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x2}, {{&(0x7f0000000100)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/148, 0x94}, {&(0x7f0000000040)=""/2, 0x2}, {&(0x7f0000000400)=""/139, 0x8b}, {&(0x7f00000004c0)=""/134, 0x86}, {&(0x7f0000000180)=""/115, 0x73}], 0x5}, 0x40}], 0x2, 0x2102, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r4}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r4, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000680)={r4, @in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0xfffffffd, 0x4, 0xeb5b, 0xff, 0x87}, &(0x7f0000000580)=0x98) 10:29:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f00000000c0), 0x4) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1297.488971] ? kernel_write+0x110/0x110 [ 1297.492952] do_syscall_64+0x1d5/0x640 [ 1297.496853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1297.502039] RIP: 0033:0x45c829 [ 1297.505230] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1297.512939] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1297.520234] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1297.527504] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1297.534772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1297.542042] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:04 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2b", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:04 executing program 4 (fault-call:6 fault-nth:36): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1297.780968] FAULT_INJECTION: forcing a failure. [ 1297.780968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1297.798819] CPU: 0 PID: 30743 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1297.806706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1297.816063] Call Trace: [ 1297.818657] dump_stack+0x13e/0x194 [ 1297.822300] should_fail.cold+0x10a/0x14b [ 1297.826455] __alloc_pages_nodemask+0x1bf/0x700 [ 1297.831130] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1297.836422] alloc_pages_vma+0xc2/0x4a0 [ 1297.840387] __handle_mm_fault+0x17b6/0x3280 [ 1297.844782] ? copy_page_range+0x1d70/0x1d70 [ 1297.849182] ? find_held_lock+0x2d/0x110 [ 1297.853256] handle_mm_fault+0x288/0x7a0 [ 1297.857308] __get_user_pages+0x44d/0x11e0 [ 1297.861547] ? follow_page_mask+0x1580/0x1580 [ 1297.866047] get_user_pages_unlocked+0x1df/0x2e0 [ 1297.870800] ? get_user_pages_locked+0x3d0/0x3d0 [ 1297.875550] ? mark_held_locks+0xa6/0xf0 [ 1297.879606] ? get_user_pages_fast+0x16b/0x2b0 [ 1297.887757] get_user_pages_fast+0x20f/0x2b0 [ 1297.892263] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1297.897020] ? save_trace+0x290/0x290 [ 1297.900911] iov_iter_get_pages+0x203/0xc80 [ 1297.905231] ? __lock_is_held+0xad/0x140 [ 1297.909281] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1297.914208] af_alg_make_sg+0x82/0x3f0 [ 1297.918114] ? sock_kmalloc+0x75/0xc0 [ 1297.921912] ? af_alg_data_wakeup+0x80/0x80 [ 1297.926230] af_alg_get_rsgl+0x1cf/0x510 [ 1297.930379] skcipher_recvmsg+0x766/0xcb0 [ 1297.934544] ? skcipher_release+0x40/0x40 [ 1297.938683] ? security_socket_recvmsg+0x8b/0xc0 [ 1297.943421] ? skcipher_release+0x40/0x40 [ 1297.947643] sock_recvmsg+0xc0/0x100 [ 1297.951342] sock_read_iter+0x252/0x360 [ 1297.955309] ? sock_recvmsg+0x100/0x100 [ 1297.959283] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1297.964028] ? iov_iter_init+0xa6/0x1c0 [ 1297.967999] __vfs_read+0x44b/0x610 [ 1297.971611] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1297.976191] ? selinux_file_permission+0x7a/0x440 [ 1297.981041] ? rw_verify_area+0xe1/0x2a0 [ 1297.985087] vfs_read+0x131/0x330 [ 1297.988526] SyS_read+0xf2/0x210 [ 1297.991887] ? kernel_write+0x110/0x110 [ 1297.995866] ? do_syscall_64+0x4c/0x640 [ 1297.999831] ? kernel_write+0x110/0x110 [ 1298.003808] do_syscall_64+0x1d5/0x640 [ 1298.007686] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1298.012855] RIP: 0033:0x45c829 [ 1298.016111] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1298.023813] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 10:29:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1298.031071] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1298.038859] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1298.049090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1298.057140] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYRESHEX=r8, @ANYRESHEX, @ANYRES64=r0]], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) 10:29:05 executing program 4 (fault-call:6 fault-nth:37): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1298.228727] FAULT_INJECTION: forcing a failure. [ 1298.228727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1298.246711] CPU: 1 PID: 30774 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1298.254643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.264103] Call Trace: [ 1298.266699] dump_stack+0x13e/0x194 [ 1298.270336] should_fail.cold+0x10a/0x14b [ 1298.274493] __alloc_pages_nodemask+0x1bf/0x700 10:29:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 1298.279179] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1298.284209] alloc_pages_vma+0xc2/0x4a0 [ 1298.288187] __handle_mm_fault+0x17b6/0x3280 [ 1298.292594] ? copy_page_range+0x1d70/0x1d70 [ 1298.297001] ? find_held_lock+0x2d/0x110 [ 1298.301081] handle_mm_fault+0x288/0x7a0 [ 1298.305149] __get_user_pages+0x44d/0x11e0 [ 1298.309424] ? follow_page_mask+0x1580/0x1580 [ 1298.313934] get_user_pages_unlocked+0x1df/0x2e0 [ 1298.318699] ? get_user_pages_locked+0x3d0/0x3d0 [ 1298.323546] ? mark_held_locks+0xa6/0xf0 10:29:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES16=r0], 0x1}}, 0x4000008) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xda, 0x52980) write(r1, &(0x7f0000000340), 0x41395527) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2ed3, 0xb9, 0x38e996eb, 0x520, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x40) [ 1298.327614] ? get_user_pages_fast+0x16b/0x2b0 [ 1298.332201] get_user_pages_fast+0x20f/0x2b0 [ 1298.336631] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1298.341387] ? save_trace+0x290/0x290 [ 1298.345203] ? save_trace+0x290/0x290 [ 1298.349015] iov_iter_get_pages+0x203/0xc80 [ 1298.353340] ? __lock_is_held+0xad/0x140 [ 1298.357403] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1298.362332] af_alg_make_sg+0x82/0x3f0 [ 1298.366206] ? sock_kmalloc+0x75/0xc0 [ 1298.370002] ? af_alg_data_wakeup+0x80/0x80 [ 1298.374322] af_alg_get_rsgl+0x1cf/0x510 [ 1298.378387] skcipher_recvmsg+0x766/0xcb0 [ 1298.382531] ? skcipher_release+0x40/0x40 [ 1298.386681] ? security_socket_recvmsg+0x8b/0xc0 [ 1298.391422] ? skcipher_release+0x40/0x40 [ 1298.395558] sock_recvmsg+0xc0/0x100 [ 1298.399276] sock_read_iter+0x252/0x360 [ 1298.403240] ? sock_recvmsg+0x100/0x100 [ 1298.407205] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1298.411940] ? iov_iter_init+0xa6/0x1c0 [ 1298.415903] __vfs_read+0x44b/0x610 [ 1298.419527] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1298.424096] ? selinux_file_permission+0x7a/0x440 [ 1298.428930] ? rw_verify_area+0xe1/0x2a0 [ 1298.432988] vfs_read+0x131/0x330 [ 1298.436430] SyS_read+0xf2/0x210 [ 1298.445431] ? kernel_write+0x110/0x110 [ 1298.449401] ? SyS_clock_settime+0x1a0/0x1a0 [ 1298.453814] ? do_syscall_64+0x4c/0x640 [ 1298.457767] ? kernel_write+0x110/0x110 [ 1298.461747] do_syscall_64+0x1d5/0x640 [ 1298.465629] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1298.470808] RIP: 0033:0x45c829 10:29:05 executing program 4 (fault-call:6 fault-nth:38): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x2042, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x63}}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000200)=0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x300}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r5) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r6, &(0x7f0000000580), 0x0, 0x1007fffff) [ 1298.473988] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1298.481684] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1298.488932] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1298.496181] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1298.503433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1298.510695] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x200, 0x0) bind$alg(r1, &(0x7f0000001780)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfe08) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f00000000c0)={0x3, 'vlan0\x00', {0x6}, 0xad5}) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x1, 0x2, 0x0, 0x4, 0x8898, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400}, 0x22, 0x0, 0x20000000, 0x9, 0x0, 0x0, 0x7fff}, r4, 0x2, r5, 0x0) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1298.580300] FAULT_INJECTION: forcing a failure. [ 1298.580300] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1298.593382] CPU: 1 PID: 30791 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1298.601278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1298.610632] Call Trace: [ 1298.613225] dump_stack+0x13e/0x194 [ 1298.616861] should_fail.cold+0x10a/0x14b [ 1298.621018] __alloc_pages_nodemask+0x1bf/0x700 [ 1298.625693] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1298.630795] ? find_held_lock+0x2d/0x110 [ 1298.634856] alloc_pages_vma+0xc2/0x4a0 [ 1298.638829] __handle_mm_fault+0x17b6/0x3280 [ 1298.643241] ? copy_page_range+0x1d70/0x1d70 [ 1298.647655] ? find_held_lock+0x2d/0x110 [ 1298.651905] handle_mm_fault+0x288/0x7a0 [ 1298.655974] __get_user_pages+0x44d/0x11e0 [ 1298.660222] ? follow_page_mask+0x1580/0x1580 [ 1298.664728] get_user_pages_unlocked+0x1df/0x2e0 [ 1298.669487] ? get_user_pages_locked+0x3d0/0x3d0 [ 1298.674247] ? mark_held_locks+0xa6/0xf0 10:29:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10580, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) [ 1298.678311] ? get_user_pages_fast+0x16b/0x2b0 [ 1298.682892] get_user_pages_fast+0x20f/0x2b0 [ 1298.687307] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1298.692065] ? save_trace+0x290/0x290 [ 1298.695865] ? save_trace+0x290/0x290 [ 1298.699677] iov_iter_get_pages+0x203/0xc80 [ 1298.704200] ? __lock_is_held+0xad/0x140 [ 1298.708334] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1298.713266] af_alg_make_sg+0x82/0x3f0 [ 1298.717156] ? sock_kmalloc+0x75/0xc0 [ 1298.720958] ? af_alg_data_wakeup+0x80/0x80 [ 1298.725282] af_alg_get_rsgl+0x1cf/0x510 [ 1298.729350] skcipher_recvmsg+0x766/0xcb0 [ 1298.733513] ? skcipher_release+0x40/0x40 [ 1298.737695] ? security_socket_recvmsg+0x8b/0xc0 [ 1298.742446] ? skcipher_release+0x40/0x40 [ 1298.746593] sock_recvmsg+0xc0/0x100 [ 1298.750304] sock_read_iter+0x252/0x360 [ 1298.754277] ? sock_recvmsg+0x100/0x100 [ 1298.758273] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1298.763029] ? iov_iter_init+0xa6/0x1c0 [ 1298.767005] __vfs_read+0x44b/0x610 [ 1298.770632] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1298.775218] ? selinux_file_permission+0x7a/0x440 [ 1298.780066] ? rw_verify_area+0xe1/0x2a0 [ 1298.784127] vfs_read+0x131/0x330 [ 1298.787580] SyS_read+0xf2/0x210 [ 1298.790941] ? kernel_write+0x110/0x110 [ 1298.794912] ? SyS_clock_settime+0x1a0/0x1a0 [ 1298.799319] ? do_syscall_64+0x4c/0x640 [ 1298.803289] ? kernel_write+0x110/0x110 [ 1298.807267] do_syscall_64+0x1d5/0x640 [ 1298.811158] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1298.816342] RIP: 0033:0x45c829 [ 1298.819527] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffa0d35b1004bb0800450000380000000000019078ac1e0001ac1414aa0b049078030000004500000004bdc3cf14d0386c710000010000000000006371ae9b1c01"], 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1298.827227] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1298.834494] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1298.841763] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1298.849290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1298.856590] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:06 executing program 4 (fault-call:6 fault-nth:39): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:06 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2b", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x0, 0x1, {0x2d, 0x13, 0x14, 0x1b, 0x5, 0x9, 0x2, 0xd2}}) r2 = socket$inet(0x10, 0x2, 0xf) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/mice\x00', 0x2000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000280)={0x3, 0x0, "380e2c", 0x0, 0x3}) bind$alg(r1, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r4, 0x8004500b, &(0x7f0000000140)=0x9) r5 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r5, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1298.977609] FAULT_INJECTION: forcing a failure. [ 1298.977609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1298.991684] CPU: 1 PID: 30810 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1298.999582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.008934] Call Trace: [ 1299.011559] dump_stack+0x13e/0x194 [ 1299.015195] should_fail.cold+0x10a/0x14b [ 1299.019355] __alloc_pages_nodemask+0x1bf/0x700 [ 1299.024015] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1299.029024] ? find_held_lock+0x2d/0x110 [ 1299.033132] alloc_pages_vma+0xc2/0x4a0 [ 1299.037121] __handle_mm_fault+0x17b6/0x3280 [ 1299.041539] ? copy_page_range+0x1d70/0x1d70 [ 1299.046315] ? find_held_lock+0x2d/0x110 [ 1299.050400] handle_mm_fault+0x288/0x7a0 [ 1299.054472] __get_user_pages+0x44d/0x11e0 [ 1299.058726] ? follow_page_mask+0x1580/0x1580 [ 1299.063234] get_user_pages_unlocked+0x1df/0x2e0 [ 1299.068002] ? get_user_pages_locked+0x3d0/0x3d0 [ 1299.072799] ? mark_held_locks+0xa6/0xf0 [ 1299.076857] ? get_user_pages_fast+0x16b/0x2b0 [ 1299.081447] get_user_pages_fast+0x20f/0x2b0 [ 1299.085865] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1299.090620] ? save_trace+0x290/0x290 [ 1299.094424] ? save_trace+0x290/0x290 [ 1299.098233] iov_iter_get_pages+0x203/0xc80 [ 1299.102554] ? __lock_is_held+0xad/0x140 [ 1299.106613] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1299.111546] af_alg_make_sg+0x82/0x3f0 [ 1299.115432] ? sock_kmalloc+0x75/0xc0 [ 1299.119234] ? af_alg_data_wakeup+0x80/0x80 [ 1299.123557] af_alg_get_rsgl+0x1cf/0x510 [ 1299.127624] skcipher_recvmsg+0x766/0xcb0 [ 1299.131780] ? skcipher_release+0x40/0x40 [ 1299.135927] ? security_socket_recvmsg+0x8b/0xc0 [ 1299.140678] ? skcipher_release+0x40/0x40 [ 1299.144824] sock_recvmsg+0xc0/0x100 [ 1299.148538] sock_read_iter+0x252/0x360 [ 1299.152507] ? sock_recvmsg+0x100/0x100 [ 1299.156492] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1299.161240] ? iov_iter_init+0xa6/0x1c0 [ 1299.165221] __vfs_read+0x44b/0x610 [ 1299.168846] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1299.173432] ? selinux_file_permission+0x7a/0x440 [ 1299.178279] ? rw_verify_area+0xe1/0x2a0 [ 1299.182338] vfs_read+0x131/0x330 [ 1299.185787] SyS_read+0xf2/0x210 [ 1299.189149] ? kernel_write+0x110/0x110 [ 1299.193131] ? SyS_clock_settime+0x1a0/0x1a0 [ 1299.197538] ? do_syscall_64+0x4c/0x640 [ 1299.201507] ? kernel_write+0x110/0x110 [ 1299.205488] do_syscall_64+0x1d5/0x640 [ 1299.209378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1299.214563] RIP: 0033:0x45c829 [ 1299.217748] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x3, 0x0, 0x0, {0x1, 0x0, 0x8}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) 10:29:06 executing program 4 (fault-call:6 fault-nth:40): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1299.225457] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1299.232724] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1299.239982] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1299.252275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1299.259534] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8000, 0x10002) getsockname$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x200400, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r1, 0x500e, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x268, 0x0, 0x5, 0x301, 0x0, 0x0, {0xa, 0x0, 0x8}, [{{0x254, 0x1, {{0x0, 0x7}, 0x0, 0x6, 0x4, 0x1, 0x7, 'syz0\x00', "83ce03ca6f2d9f303bf3bfe99e6770ddcad46f3ccc83fc2b78a0e71c81deee80", "fef96bcea41f3e9047f1cc7bb82d3ad81342181b406ba72f7ed7aeef221cc44b", [{0x1, 0x7, {0x3, 0x101}}, {0x8001, 0xece2, {0x3, 0x9}}, {0x8001, 0x2, {0x2, 0x1f}}, {0x477, 0x8, {0x0, 0x2}}, {0x2, 0xffff, {0x2, 0x8}}, {0x7f, 0x6, {0x3, 0x200}}, {0x200, 0x6, {0x0, 0x6}}, {0x8, 0x4, {0x2, 0xf05c}}, {0x4, 0x3ff, {0x2, 0x81}}, {0x9, 0x8, {0x2, 0x80000000}}, {0x1, 0x9a4, {0x3, 0x7f}}, {0x800, 0xfff, {0x1, 0x5}}, {0x2b, 0x8, {0x0, 0x51b6}}, {0x4, 0xd545, {0x0, 0xef7}}, {0x10d9, 0x1, {0x2, 0x7fffffff}}, {0x3f, 0x6, {0x0, 0x8}}, {0xfff, 0x5, {0x2, 0x6}}, {0x0, 0x3, {0x2, 0x6}}, {0x7f, 0x2, {0x1, 0x12b}}, {0x3c4, 0x1, {0x3, 0x20}}, {0x898, 0x1000, {0x0, 0x2}}, {0xf161, 0x0, {0x0, 0x4}}, {0x2, 0x3ff, {0x0, 0x2}}, {0xfc01, 0x3, {0x0, 0x100}}, {0x80, 0x1, {0x0, 0x7f}}, {0x4, 0x9, {0x2, 0x82327340}}, {0x2, 0x100, {0x1, 0x2}}, {0x2, 0x6, {0x0, 0x7f}}, {0xfffa, 0x3, {0x1, 0xfff}}, {0x8, 0xcd, {0x3, 0x1}}, {0xa8, 0x4, {0x3, 0x4}}, {0x0, 0xba, {0x2, 0x7}}, {0x8, 0x6, {0x1, 0x1}}, {0xf70c, 0x78, {0x0, 0x4}}, {0x100, 0x6, {0x3, 0x100}}, {0xee, 0x0, {0x2, 0x7}}, {0x0, 0x9, {0x1, 0x1a8}}, {0x2, 0x6, {0x3, 0x7161}}, {0x0, 0x1, {0x3, 0x8000}}, {0x4, 0x1, {0x1, 0x4}}]}}}]}, 0x268}, 0x1, 0x0, 0x0, 0x4000840}, 0x24000080) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, r6, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYPTR64, @ANYRESOCT=r0, @ANYRES16=r3], 0x3}}, 0x7e561f8085eb91fa) r7 = syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x6, 0x24000) ioctl$KVM_SET_BOOT_CPU_ID(r7, 0xae78, &(0x7f00000005c0)=0x2) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000000)=""/8) 10:29:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x5, 0x18) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000080)={0x81, 0xfffffffd, 0x0, 'queue0\x00', 0xfffffff9}) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1299.356163] FAULT_INJECTION: forcing a failure. [ 1299.356163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1299.376821] CPU: 1 PID: 30832 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1299.384737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.394091] Call Trace: [ 1299.396688] dump_stack+0x13e/0x194 [ 1299.400325] should_fail.cold+0x10a/0x14b [ 1299.404493] __alloc_pages_nodemask+0x1bf/0x700 [ 1299.409173] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1299.414191] ? find_held_lock+0x2d/0x110 [ 1299.418265] alloc_pages_vma+0xc2/0x4a0 [ 1299.422248] __handle_mm_fault+0x17b6/0x3280 [ 1299.426664] ? copy_page_range+0x1d70/0x1d70 [ 1299.431076] ? find_held_lock+0x2d/0x110 [ 1299.435156] handle_mm_fault+0x288/0x7a0 [ 1299.439223] __get_user_pages+0x44d/0x11e0 [ 1299.443470] ? follow_page_mask+0x1580/0x1580 [ 1299.447977] get_user_pages_unlocked+0x1df/0x2e0 10:29:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/172, 0xac}, {&(0x7f0000000300)=""/124, 0x7c}], 0x2, 0x800000) 10:29:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0], 0x2}}, 0x40041) [ 1299.452742] ? get_user_pages_locked+0x3d0/0x3d0 [ 1299.457498] ? mark_held_locks+0xa6/0xf0 [ 1299.461563] ? get_user_pages_fast+0x16b/0x2b0 [ 1299.466150] get_user_pages_fast+0x20f/0x2b0 [ 1299.470566] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1299.475319] ? save_trace+0x290/0x290 [ 1299.479119] ? save_trace+0x290/0x290 [ 1299.482922] iov_iter_get_pages+0x203/0xc80 [ 1299.487246] ? __lock_is_held+0xad/0x140 [ 1299.491307] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1299.496250] af_alg_make_sg+0x82/0x3f0 [ 1299.500136] ? sock_kmalloc+0x75/0xc0 10:29:06 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x244100) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0x200, 0x4, &(0x7f0000000040)=0x7}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000740)) [ 1299.503940] ? af_alg_data_wakeup+0x80/0x80 [ 1299.508265] af_alg_get_rsgl+0x1cf/0x510 [ 1299.512336] skcipher_recvmsg+0x766/0xcb0 [ 1299.516492] ? skcipher_release+0x40/0x40 [ 1299.520643] ? security_socket_recvmsg+0x8b/0xc0 [ 1299.525394] ? skcipher_release+0x40/0x40 [ 1299.529542] sock_recvmsg+0xc0/0x100 [ 1299.533347] sock_read_iter+0x252/0x360 [ 1299.537314] ? sock_recvmsg+0x100/0x100 [ 1299.541294] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1299.546045] ? iov_iter_init+0xa6/0x1c0 [ 1299.550990] __vfs_read+0x44b/0x610 [ 1299.555579] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1299.560172] ? selinux_file_permission+0x7a/0x440 [ 1299.565025] ? rw_verify_area+0xe1/0x2a0 [ 1299.569089] vfs_read+0x131/0x330 [ 1299.572542] SyS_read+0xf2/0x210 [ 1299.575915] ? kernel_write+0x110/0x110 [ 1299.579888] ? SyS_clock_settime+0x1a0/0x1a0 [ 1299.584294] ? do_syscall_64+0x4c/0x640 [ 1299.588265] ? kernel_write+0x110/0x110 [ 1299.592239] do_syscall_64+0x1d5/0x640 [ 1299.596133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1299.601319] RIP: 0033:0x45c829 10:29:06 executing program 4 (fault-call:6 fault-nth:41): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1299.604502] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1299.612208] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1299.619472] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1299.626740] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1299.634012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1299.641276] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 1299.725409] FAULT_INJECTION: forcing a failure. [ 1299.725409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1299.738692] CPU: 0 PID: 30866 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1299.746578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.755927] Call Trace: [ 1299.758518] dump_stack+0x13e/0x194 [ 1299.762155] should_fail.cold+0x10a/0x14b [ 1299.766305] __alloc_pages_nodemask+0x1bf/0x700 [ 1299.770977] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1299.775999] ? retint_kernel+0x2d/0x2d [ 1299.779895] alloc_pages_vma+0xc2/0x4a0 [ 1299.783873] __handle_mm_fault+0x17b6/0x3280 [ 1299.788285] ? copy_page_range+0x1d70/0x1d70 [ 1299.792712] handle_mm_fault+0x288/0x7a0 [ 1299.796779] __get_user_pages+0x44d/0x11e0 [ 1299.801007] ? follow_page_mask+0x1580/0x1580 [ 1299.805488] get_user_pages_unlocked+0x1df/0x2e0 [ 1299.810226] ? get_user_pages_locked+0x3d0/0x3d0 [ 1299.814964] ? mark_held_locks+0xa6/0xf0 [ 1299.819016] ? get_user_pages_fast+0x16b/0x2b0 [ 1299.823589] get_user_pages_fast+0x20f/0x2b0 [ 1299.827998] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1299.832735] ? save_trace+0x290/0x290 [ 1299.836522] ? save_trace+0x290/0x290 [ 1299.840306] iov_iter_get_pages+0x203/0xc80 [ 1299.844658] ? __lock_is_held+0xad/0x140 [ 1299.848698] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1299.853607] af_alg_make_sg+0x82/0x3f0 [ 1299.857474] ? sock_kmalloc+0x75/0xc0 [ 1299.861263] ? af_alg_data_wakeup+0x80/0x80 [ 1299.865566] af_alg_get_rsgl+0x1cf/0x510 [ 1299.869613] skcipher_recvmsg+0x766/0xcb0 [ 1299.873795] ? retint_kernel+0x2d/0x2d [ 1299.877679] ? skcipher_release+0x40/0x40 [ 1299.881810] ? security_socket_recvmsg+0x8b/0xc0 [ 1299.886550] ? skcipher_release+0x40/0x40 [ 1299.890682] sock_recvmsg+0xc0/0x100 [ 1299.894387] sock_read_iter+0x252/0x360 [ 1299.898344] ? sock_recvmsg+0x100/0x100 [ 1299.902329] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1299.907073] ? iov_iter_init+0xa6/0x1c0 [ 1299.911036] __vfs_read+0x44b/0x610 [ 1299.917379] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1299.921956] ? __inode_security_revalidate+0xcf/0x120 [ 1299.927131] ? selinux_file_permission+0x7a/0x440 [ 1299.931959] ? rw_verify_area+0xe1/0x2a0 [ 1299.936111] vfs_read+0x131/0x330 [ 1299.939564] SyS_read+0xf2/0x210 [ 1299.942937] ? kernel_write+0x110/0x110 [ 1299.946971] ? SyS_clock_settime+0x1a0/0x1a0 [ 1299.951367] ? do_syscall_64+0x4c/0x640 [ 1299.955675] ? kernel_write+0x110/0x110 [ 1299.959670] do_syscall_64+0x1d5/0x640 [ 1299.964159] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1299.969330] RIP: 0033:0x45c829 [ 1299.972500] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1299.980199] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1299.987451] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1299.994716] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1300.001988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1300.009402] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:07 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d416", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='fd\x00') ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000000180)) r2 = syz_open_procfs(r0, &(0x7f00000000c0)='net/route\x00') ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000000)={0x4, 0x1000, 0x4, 0x2}) preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000100)={0x9, 0x84db, 0x5, 0x1fe62d20}, 0x10) ioctl$SNDCTL_DSP_SETFMT(r3, 0xc0045005, &(0x7f00000001c0)=0x7) 10:29:07 executing program 4 (fault-call:6 fault-nth:42): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1300.146806] FAULT_INJECTION: forcing a failure. [ 1300.146806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1300.171550] CPU: 0 PID: 30881 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1300.180071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.189949] Call Trace: [ 1300.192562] dump_stack+0x13e/0x194 10:29:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x3, 0x0, 0xffffffff, 0x21, 'syz1\x00', 0x6}) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/224, 0xe0) [ 1300.196228] should_fail.cold+0x10a/0x14b [ 1300.200728] __alloc_pages_nodemask+0x1bf/0x700 [ 1300.205492] ? retint_kernel+0x2d/0x2d [ 1300.209375] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1300.214383] ? alloc_pages_vma+0x26/0x4a0 [ 1300.218524] alloc_pages_vma+0xc2/0x4a0 [ 1300.222527] __handle_mm_fault+0x17b6/0x3280 [ 1300.226968] ? copy_page_range+0x1d70/0x1d70 [ 1300.231394] ? find_held_lock+0x2d/0x110 [ 1300.235452] handle_mm_fault+0x288/0x7a0 [ 1300.239496] __get_user_pages+0x44d/0x11e0 [ 1300.243726] ? follow_page_mask+0x1580/0x1580 [ 1300.248564] get_user_pages_unlocked+0x1df/0x2e0 [ 1300.253477] ? get_user_pages_locked+0x3d0/0x3d0 [ 1300.258223] ? mark_held_locks+0xa6/0xf0 [ 1300.262273] ? get_user_pages_fast+0x16b/0x2b0 [ 1300.266837] get_user_pages_fast+0x20f/0x2b0 [ 1300.271230] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1300.275967] ? save_trace+0x290/0x290 [ 1300.279756] ? save_trace+0x290/0x290 [ 1300.283566] iov_iter_get_pages+0x203/0xc80 [ 1300.287884] ? __lock_is_held+0xad/0x140 [ 1300.291948] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1300.297836] af_alg_make_sg+0x82/0x3f0 [ 1300.301965] ? sock_kmalloc+0x75/0xc0 [ 1300.305751] ? af_alg_data_wakeup+0x80/0x80 [ 1300.310056] af_alg_get_rsgl+0x1cf/0x510 [ 1300.314107] skcipher_recvmsg+0x766/0xcb0 [ 1300.318262] ? skcipher_release+0x40/0x40 [ 1300.322494] ? security_socket_recvmsg+0x8b/0xc0 [ 1300.327229] ? skcipher_release+0x40/0x40 [ 1300.331357] sock_recvmsg+0xc0/0x100 [ 1300.335061] sock_read_iter+0x252/0x360 [ 1300.339012] ? sock_recvmsg+0x100/0x100 [ 1300.342983] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1300.347731] ? iov_iter_init+0xa6/0x1c0 [ 1300.351686] __vfs_read+0x44b/0x610 [ 1300.355294] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1300.359868] vfs_read+0x131/0x330 [ 1300.363301] SyS_read+0xf2/0x210 [ 1300.366664] ? kernel_write+0x110/0x110 [ 1300.370617] ? SyS_clock_settime+0x1a0/0x1a0 [ 1300.375005] ? do_syscall_64+0x4c/0x640 [ 1300.378957] ? kernel_write+0x110/0x110 [ 1300.382909] do_syscall_64+0x1d5/0x640 [ 1300.386781] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1300.391948] RIP: 0033:0x45c829 10:29:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYRESOCT=r0], @ANYRESOCT=r2, @ANYRESOCT=r0, @ANYRES16=r0]], 0x2}}, 0x0) [ 1300.395112] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1300.402796] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1300.410048] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1300.417298] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1300.424550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1300.431805] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x4, 0x8) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:07 executing program 4 (fault-call:6 fault-nth:43): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1300.581138] FAULT_INJECTION: forcing a failure. [ 1300.581138] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:29:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) splice(r0, &(0x7f0000000000)=0x4, r2, &(0x7f0000000040)=0x100000000, 0x7, 0x8) [ 1300.621918] CPU: 0 PID: 30902 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1300.629827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.639178] Call Trace: [ 1300.641754] dump_stack+0x13e/0x194 [ 1300.645399] should_fail.cold+0x10a/0x14b [ 1300.649543] __alloc_pages_nodemask+0x1bf/0x700 [ 1300.654216] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1300.659225] ? find_held_lock+0x2d/0x110 [ 1300.663282] ? mark_held_locks+0xa6/0xf0 [ 1300.667335] alloc_pages_vma+0xc2/0x4a0 [ 1300.671298] __handle_mm_fault+0x17b6/0x3280 [ 1300.675694] ? copy_page_range+0x1d70/0x1d70 [ 1300.680084] ? find_held_lock+0x2d/0x110 [ 1300.684133] handle_mm_fault+0x288/0x7a0 [ 1300.688185] __get_user_pages+0x44d/0x11e0 [ 1300.692418] ? follow_page_mask+0x1580/0x1580 [ 1300.696909] get_user_pages_unlocked+0x1df/0x2e0 [ 1300.701658] ? get_user_pages_locked+0x3d0/0x3d0 [ 1300.706393] ? mark_held_locks+0xa6/0xf0 [ 1300.710438] ? get_user_pages_fast+0x16b/0x2b0 [ 1300.715004] get_user_pages_fast+0x20f/0x2b0 [ 1300.719418] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1300.724165] ? save_trace+0x290/0x290 [ 1300.727954] ? save_trace+0x290/0x290 [ 1300.731745] iov_iter_get_pages+0x203/0xc80 [ 1300.736047] ? __lock_is_held+0xad/0x140 [ 1300.740126] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1300.745158] af_alg_make_sg+0x82/0x3f0 [ 1300.749039] ? sock_kmalloc+0x75/0xc0 [ 1300.752836] ? af_alg_data_wakeup+0x80/0x80 [ 1300.757159] af_alg_get_rsgl+0x1cf/0x510 [ 1300.761222] skcipher_recvmsg+0x766/0xcb0 [ 1300.765363] ? skcipher_release+0x40/0x40 [ 1300.769492] ? security_socket_recvmsg+0x8b/0xc0 [ 1300.774229] ? skcipher_release+0x40/0x40 [ 1300.778356] sock_recvmsg+0xc0/0x100 [ 1300.782059] sock_read_iter+0x252/0x360 [ 1300.786038] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1300.791035] ? sock_recvmsg+0x100/0x100 [ 1300.795006] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1300.799760] ? iov_iter_init+0xa6/0x1c0 [ 1300.803725] __vfs_read+0x44b/0x610 [ 1300.807337] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1300.811909] ? selinux_file_permission+0x159/0x440 [ 1300.816824] ? selinux_file_permission+0x7a/0x440 [ 1300.821650] ? rw_verify_area+0xe1/0x2a0 [ 1300.825692] vfs_read+0x131/0x330 [ 1300.829135] SyS_read+0xf2/0x210 [ 1300.832500] ? kernel_write+0x110/0x110 [ 1300.836456] ? SyS_clock_settime+0x1a0/0x1a0 [ 1300.840846] ? do_syscall_64+0x4c/0x640 [ 1300.844799] ? kernel_write+0x110/0x110 [ 1300.848844] do_syscall_64+0x1d5/0x640 [ 1300.852729] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1300.857909] RIP: 0033:0x45c829 [ 1300.861080] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:08 executing program 4 (fault-call:6 fault-nth:44): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1300.868768] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1300.876031] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1300.883317] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1300.890578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1300.897829] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1300.990495] FAULT_INJECTION: forcing a failure. [ 1300.990495] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1301.005466] CPU: 1 PID: 30926 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1301.013366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.022719] Call Trace: [ 1301.025315] dump_stack+0x13e/0x194 [ 1301.028962] should_fail.cold+0x10a/0x14b [ 1301.033113] __alloc_pages_nodemask+0x1bf/0x700 [ 1301.037791] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1301.042800] ? find_held_lock+0x2d/0x110 [ 1301.046853] alloc_pages_vma+0xc2/0x4a0 [ 1301.050816] __handle_mm_fault+0x17b6/0x3280 [ 1301.055235] ? copy_page_range+0x1d70/0x1d70 [ 1301.059630] ? find_held_lock+0x2d/0x110 [ 1301.063709] handle_mm_fault+0x288/0x7a0 [ 1301.067757] __get_user_pages+0x44d/0x11e0 [ 1301.071982] ? follow_page_mask+0x1580/0x1580 [ 1301.076468] get_user_pages_unlocked+0x1df/0x2e0 [ 1301.081215] ? get_user_pages_locked+0x3d0/0x3d0 [ 1301.085955] ? mark_held_locks+0xa6/0xf0 [ 1301.090010] ? get_user_pages_fast+0x16b/0x2b0 [ 1301.094575] get_user_pages_fast+0x20f/0x2b0 [ 1301.098966] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1301.103701] ? save_trace+0x290/0x290 [ 1301.107481] ? save_trace+0x290/0x290 [ 1301.111270] iov_iter_get_pages+0x203/0xc80 [ 1301.115572] ? __lock_is_held+0xad/0x140 [ 1301.119636] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1301.124547] af_alg_make_sg+0x82/0x3f0 [ 1301.128414] ? sock_kmalloc+0x75/0xc0 [ 1301.132195] ? af_alg_data_wakeup+0x80/0x80 [ 1301.136510] af_alg_get_rsgl+0x1cf/0x510 [ 1301.140557] skcipher_recvmsg+0x766/0xcb0 [ 1301.144703] ? skcipher_release+0x40/0x40 [ 1301.148832] ? security_socket_recvmsg+0x8b/0xc0 [ 1301.153655] ? skcipher_release+0x40/0x40 [ 1301.157782] sock_recvmsg+0xc0/0x100 [ 1301.161488] sock_read_iter+0x252/0x360 [ 1301.166920] ? sock_recvmsg+0x100/0x100 [ 1301.170878] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1301.175610] ? iov_iter_init+0xa6/0x1c0 [ 1301.179576] __vfs_read+0x44b/0x610 [ 1301.183186] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1301.187753] ? selinux_file_permission+0x7a/0x440 [ 1301.192590] ? rw_verify_area+0xe1/0x2a0 [ 1301.196631] vfs_read+0x131/0x330 [ 1301.200067] SyS_read+0xf2/0x210 [ 1301.203411] ? kernel_write+0x110/0x110 [ 1301.207365] ? SyS_clock_settime+0x1a0/0x1a0 [ 1301.211754] ? do_syscall_64+0x4c/0x640 [ 1301.215708] ? kernel_write+0x110/0x110 [ 1301.219671] do_syscall_64+0x1d5/0x640 [ 1301.223541] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1301.228707] RIP: 0033:0x45c829 [ 1301.231875] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:08 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d416", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f00000000c0)={0x2, 'ip6gretap0\x00', {0x2}, 0x1}) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1301.239659] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1301.246939] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1301.254210] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1301.261465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1301.268807] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1}}, 0x4015) 10:29:08 executing program 4 (fault-call:6 fault-nth:45): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64=r0], 0x1}}, 0x4000054) 10:29:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x20000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:29:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000080)={0x3ff, 0x3ff, 0x1000, {0x2, 0x7}, 0x1, 0x401}) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000019c0)={0x20, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r6, 0x1, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x90}, 0x1010) [ 1301.465073] FAULT_INJECTION: forcing a failure. [ 1301.465073] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1301.495066] CPU: 1 PID: 30949 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1301.502980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.512514] Call Trace: [ 1301.515109] dump_stack+0x13e/0x194 [ 1301.518746] should_fail.cold+0x10a/0x14b [ 1301.522904] __alloc_pages_nodemask+0x1bf/0x700 [ 1301.527581] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1301.533030] ? find_held_lock+0x2d/0x110 [ 1301.537098] alloc_pages_vma+0xc2/0x4a0 [ 1301.541082] __handle_mm_fault+0x17b6/0x3280 [ 1301.545498] ? copy_page_range+0x1d70/0x1d70 [ 1301.549910] ? find_held_lock+0x2d/0x110 [ 1301.553988] handle_mm_fault+0x288/0x7a0 [ 1301.558086] __get_user_pages+0x44d/0x11e0 10:29:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x200480c0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100bbb800009c0007801800018014000240fe80000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc5629df0d82ff10000103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb37524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d66ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15df66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdbdfb9ac0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4a86500560eb6b149e699e0dc04c6f1553f1d"], 0xc4}}, 0x0) 10:29:08 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000180)={0x3000, 0x8, &(0x7f0000000000)=[0x6, 0x6, 0xd8bd, 0x1657, 0x800, 0x8, 0x9, 0x8000], &(0x7f0000000040)=[0x9, 0x5, 0x7f, 0x7f, 0xf000, 0x101], &(0x7f0000000100)=[0xfffe], &(0x7f0000000140)=[0x800, 0x0]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) faccessat(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) [ 1301.562359] ? follow_page_mask+0x1580/0x1580 [ 1301.566863] get_user_pages_unlocked+0x1df/0x2e0 [ 1301.571628] ? get_user_pages_locked+0x3d0/0x3d0 [ 1301.576385] ? mark_held_locks+0xa6/0xf0 [ 1301.580452] ? get_user_pages_fast+0x16b/0x2b0 [ 1301.585039] get_user_pages_fast+0x20f/0x2b0 [ 1301.589462] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1301.594213] ? save_trace+0x290/0x290 [ 1301.598020] ? save_trace+0x290/0x290 [ 1301.601807] iov_iter_get_pages+0x203/0xc80 [ 1301.606131] ? __lock_is_held+0xad/0x140 [ 1301.610179] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1301.615100] af_alg_make_sg+0x82/0x3f0 [ 1301.618972] ? sock_kmalloc+0x75/0xc0 [ 1301.622759] ? af_alg_data_wakeup+0x80/0x80 [ 1301.627074] af_alg_get_rsgl+0x1cf/0x510 [ 1301.631134] skcipher_recvmsg+0x766/0xcb0 [ 1301.635376] ? skcipher_release+0x40/0x40 [ 1301.639873] ? security_socket_recvmsg+0x8b/0xc0 [ 1301.644623] ? skcipher_release+0x40/0x40 [ 1301.648764] sock_recvmsg+0xc0/0x100 [ 1301.652485] sock_read_iter+0x252/0x360 [ 1301.656501] ? sock_recvmsg+0x100/0x100 [ 1301.660485] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1301.665225] ? iov_iter_init+0xa6/0x1c0 [ 1301.669197] __vfs_read+0x44b/0x610 [ 1301.672833] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1301.677438] ? selinux_file_permission+0x7a/0x440 [ 1301.682289] ? rw_verify_area+0xe1/0x2a0 [ 1301.686351] vfs_read+0x131/0x330 [ 1301.689808] SyS_read+0xf2/0x210 [ 1301.693177] ? kernel_write+0x110/0x110 [ 1301.697166] ? SyS_clock_settime+0x1a0/0x1a0 [ 1301.701584] ? do_syscall_64+0x4c/0x640 [ 1301.705555] ? kernel_write+0x110/0x110 [ 1301.709523] do_syscall_64+0x1d5/0x640 [ 1301.713408] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1301.718579] RIP: 0033:0x45c829 [ 1301.721757] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1301.729464] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1301.736723] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1301.743983] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1301.751251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1301.758509] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:09 executing program 4 (fault-call:6 fault-nth:46): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1301.831626] FAULT_INJECTION: forcing a failure. [ 1301.831626] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1301.845446] CPU: 0 PID: 30965 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1301.853342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.862697] Call Trace: [ 1301.865271] dump_stack+0x13e/0x194 [ 1301.868884] should_fail.cold+0x10a/0x14b [ 1301.873017] __alloc_pages_nodemask+0x1bf/0x700 [ 1301.877672] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1301.882699] ? find_held_lock+0x2d/0x110 [ 1301.886759] alloc_pages_vma+0xc2/0x4a0 [ 1301.890720] __handle_mm_fault+0x17b6/0x3280 [ 1301.895154] ? copy_page_range+0x1d70/0x1d70 [ 1301.899570] ? find_held_lock+0x2d/0x110 [ 1301.903703] handle_mm_fault+0x288/0x7a0 [ 1301.907767] __get_user_pages+0x44d/0x11e0 [ 1301.911991] ? follow_page_mask+0x1580/0x1580 [ 1301.916479] get_user_pages_unlocked+0x1df/0x2e0 [ 1301.921237] ? get_user_pages_locked+0x3d0/0x3d0 [ 1301.926018] ? mark_held_locks+0xa6/0xf0 [ 1301.930071] ? get_user_pages_fast+0x16b/0x2b0 [ 1301.934646] get_user_pages_fast+0x20f/0x2b0 [ 1301.939047] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1301.944054] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1301.948808] iov_iter_get_pages+0x203/0xc80 [ 1301.953133] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1301.958156] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1301.962899] af_alg_make_sg+0x82/0x3f0 [ 1301.966922] ? af_alg_data_wakeup+0x80/0x80 [ 1301.971243] af_alg_get_rsgl+0x1cf/0x510 [ 1301.975297] skcipher_recvmsg+0x766/0xcb0 [ 1301.979454] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 1301.984463] ? skcipher_release+0x40/0x40 [ 1301.988597] ? security_socket_recvmsg+0x8b/0xc0 [ 1301.993350] ? skcipher_release+0x40/0x40 [ 1301.997490] sock_recvmsg+0xc0/0x100 [ 1302.001193] sock_read_iter+0x252/0x360 [ 1302.005465] ? sock_recvmsg+0x100/0x100 [ 1302.009429] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1302.014173] ? iov_iter_init+0xa6/0x1c0 [ 1302.018142] __vfs_read+0x44b/0x610 [ 1302.021765] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1302.026348] ? selinux_file_permission+0x7a/0x440 [ 1302.031185] ? rw_verify_area+0xe1/0x2a0 [ 1302.035237] vfs_read+0x131/0x330 [ 1302.038692] SyS_read+0xf2/0x210 [ 1302.042055] ? kernel_write+0x110/0x110 [ 1302.046021] ? SyS_clock_settime+0x1a0/0x1a0 [ 1302.050413] ? do_syscall_64+0x4c/0x640 [ 1302.054377] ? kernel_write+0x110/0x110 [ 1302.058343] do_syscall_64+0x1d5/0x640 [ 1302.062227] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1302.067465] RIP: 0033:0x45c829 [ 1302.070633] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:09 executing program 4 (fault-call:6 fault-nth:47): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1302.078372] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1302.085621] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1302.092870] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1302.100142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1302.107392] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:09 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d416", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1302.197855] FAULT_INJECTION: forcing a failure. [ 1302.197855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1302.218351] CPU: 0 PID: 30970 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1302.226254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.235599] Call Trace: [ 1302.238190] dump_stack+0x13e/0x194 [ 1302.241812] should_fail.cold+0x10a/0x14b [ 1302.245943] __alloc_pages_nodemask+0x1bf/0x700 [ 1302.250684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.255421] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1302.260426] alloc_pages_vma+0xc2/0x4a0 [ 1302.264385] __handle_mm_fault+0x17b6/0x3280 [ 1302.268881] ? copy_page_range+0x1d70/0x1d70 [ 1302.273384] ? find_held_lock+0x2d/0x110 [ 1302.277473] handle_mm_fault+0x288/0x7a0 [ 1302.281531] __get_user_pages+0x44d/0x11e0 [ 1302.285771] ? follow_page_mask+0x1580/0x1580 [ 1302.290268] get_user_pages_unlocked+0x1df/0x2e0 10:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000740)={'nat\x00', 0xe8, "d62a1f260cc476691250f48e77fdf32ddddf57062573a5f8d6fa6ad93e9b503cc80ead2593760c17dc2962d574d3784442da459ea63ef14b17037a8b9eac124b9425d5dc9871285a50a239818205bcf732ad358502bb784c5fa4b12879b7512687b822bf3a754368cdc465b192141b69f56df2b7a82197ce6b7513332feb58cb92d8bb5605994b5dc1fe0f89e900ed12346ac323f0314c26fcc1597febc2ba2ca0d04cfc4c10322c99316fba7451ca6cde07b509ed0248930d2fdedaafd8382dc0987232f445fa36d7f70167bca460581882d62e30a45420d852f801b77e433bce7fdb03fa4d5f86"}, &(0x7f0000000040)=0x10c) [ 1302.295016] ? get_user_pages_locked+0x3d0/0x3d0 [ 1302.299760] ? mark_held_locks+0xa6/0xf0 [ 1302.303913] ? get_user_pages_fast+0x16b/0x2b0 [ 1302.308493] get_user_pages_fast+0x20f/0x2b0 [ 1302.312892] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1302.317656] ? retint_kernel+0x2d/0x2d [ 1302.321542] iov_iter_get_pages+0x203/0xc80 [ 1302.325868] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1302.330795] ? lock_is_held_type+0x17a/0x210 [ 1302.335207] af_alg_make_sg+0x82/0x3f0 [ 1302.339091] ? sock_kmalloc+0x75/0xc0 [ 1302.342894] ? af_alg_data_wakeup+0x80/0x80 10:29:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000480)={[0xbd7, 0x0, 0x7, 0x1, 0x4, 0x401, 0x1, 0x101, 0x1, 0x3, 0x101, 0x1, 0x2, 0x0, 0x3, 0x0, 0xf8b, 0xa, 0x4, 0x101, 0x2, 0x2, 0x7f, 0x95eb, 0xbac, 0x9, 0xe9, 0x80000000, 0x7fffffff, 0x3, 0x6, 0x0, 0x7f, 0x3, 0x0, 0xfffffff7, 0x76d, 0x2, 0x1, 0x5, 0xa42e, 0xfffffc00, 0x1cc9, 0xffff, 0xfff, 0x10000, 0x0, 0x7effe8e8, 0x3, 0xfffffff7, 0x7, 0x8, 0x0, 0x100, 0x1, 0x6, 0x0, 0x1, 0x20, 0x7, 0xffffff01, 0x8, 0x6, 0x8, 0xffffff9b, 0x1, 0x1, 0x1, 0x4, 0x107, 0x0, 0xfffffffe, 0x9, 0x3f, 0x3, 0x0, 0x2de, 0x6, 0x7f, 0x1, 0x3, 0x2, 0x1ff, 0x1, 0x7fff, 0x4, 0x0, 0x61388240, 0xc376, 0x3f, 0x40c, 0x2, 0x10000, 0xff, 0x7, 0x4, 0x2, 0x7fff, 0x9, 0xff, 0x22, 0x3, 0x7, 0x1000, 0x4, 0x9, 0x3f, 0x0, 0xf0a, 0x3, 0x10000, 0xfa, 0x5, 0x3, 0x4, 0x3, 0x2000000, 0x5, 0x3ff, 0x80, 0x200, 0x4, 0x6, 0x0, 0x80, 0x0, 0x80000001, 0x7, 0x7ff, 0x3, 0x8, 0x5, 0x1, 0x1, 0x4, 0x8000, 0xbc3, 0xfffffff9, 0x1, 0x6, 0x5, 0x0, 0x5, 0x81, 0x101, 0x9, 0x2, 0x3dc2, 0x82b9, 0x0, 0x6, 0x100, 0x0, 0x4, 0x4cdeda59, 0x54, 0x9, 0x8, 0x8, 0x46, 0x7, 0x0, 0x5, 0x1f, 0x8, 0x7, 0xffffffff, 0x5, 0xffffffff, 0x5, 0xfffffff8, 0x3, 0x8, 0x6, 0x8000, 0x101, 0x6, 0x8001, 0x4, 0x5, 0x5, 0x1000, 0xb0, 0x3f, 0x3, 0x3ff, 0x0, 0x80000001, 0x8001, 0x4, 0x9, 0x3, 0x9, 0xc2, 0x1ff, 0x1, 0x5, 0x7fffffff, 0x8, 0x0, 0x7fffffff, 0x0, 0xaa0e, 0x846, 0x0, 0x3, 0x7, 0x4, 0x8, 0x2, 0x1, 0x5, 0x1, 0x4, 0xffffffff, 0x1, 0xb7, 0x3, 0x7589, 0x317, 0x101, 0x200, 0x5c13, 0x2, 0x65, 0x8, 0x8001, 0xe720, 0x9, 0x3, 0x0, 0xff, 0x1000, 0x10000, 0x8, 0x7, 0x40, 0x5, 0x8, 0xffffffff, 0xec, 0x0, 0x5, 0x80000001, 0x0, 0x4, 0x5, 0x6, 0x4346b8c6, 0xfffffff7, 0x78, 0x81eb, 0x4, 0x53d, 0xc6, 0x20, 0x6, 0x4cc6, 0x800, 0x2, 0xb97, 0x914, 0x82e, 0x5, 0x4, 0x8, 0x2, 0x55fd90ea, 0x20, 0x1f, 0x401, 0xffff, 0x3, 0xc6, 0xfffffffb, 0x331180, 0x1, 0x8, 0xffffff43, 0x5, 0x7, 0x2, 0x5, 0xfff, 0x6, 0x80, 0x6, 0x1, 0xff, 0xdf11, 0x1, 0x7f, 0x8001, 0x800, 0x8, 0x10000, 0x6, 0x0, 0xeb, 0x20, 0x1, 0x401, 0x10001, 0x7, 0xe8, 0x535, 0x7f, 0x8, 0x7a6f, 0x5, 0xa01, 0x10000, 0x200, 0x3f, 0xffffffc0, 0x9, 0x3235, 0x0, 0xff, 0x6, 0x6, 0x8, 0x7, 0x6, 0x7ff, 0x5, 0x100, 0x101, 0x5, 0x8001, 0x2, 0xd25, 0x2, 0x1ff, 0x200, 0xe02f, 0x401, 0x100, 0x1f, 0x8000, 0x1270, 0x7fffffff, 0x0, 0x10000, 0x3f, 0x9, 0x90, 0x1, 0x510, 0x1000, 0x81, 0x9, 0x401, 0x7fffffff, 0x200, 0x20, 0x7fffffff, 0x4, 0x10001, 0x1, 0x8000, 0x4, 0x498a, 0x3f, 0x7fffffff, 0x81, 0xc5f, 0x3, 0x7ff, 0x2, 0x6, 0xf9c, 0x9, 0x3, 0x4, 0x4ab4edff, 0x1, 0xffffff80, 0x3f, 0x7, 0x400, 0x7, 0xfffffffe, 0x5, 0xff, 0x2, 0x3, 0x3f, 0x9, 0x6, 0xfffffffc, 0x80000001, 0x800000, 0x57c, 0x40, 0x200, 0x5, 0x7, 0x2, 0x1, 0x5, 0x9, 0x4, 0xffff, 0x1f, 0x8, 0x56ac, 0x9, 0x6, 0x1, 0x4, 0x1f, 0x10001, 0xd, 0x4, 0xffffffff, 0x100, 0xdf4, 0x1f, 0x2, 0x9, 0x4, 0x3, 0x80000, 0x2, 0xf353, 0x0, 0xfffffffe, 0x1, 0x3, 0xfffffffd, 0x2, 0x3, 0x8000, 0x8, 0x3, 0x8, 0x80, 0x5, 0x2, 0xa59, 0x7, 0x7, 0x7fff0, 0x8, 0x5, 0x9f4e, 0x8001, 0x8, 0x5, 0x101, 0x80000000, 0xfb, 0x9, 0x7, 0xfff, 0x3, 0xfe, 0x6, 0x9, 0x7, 0xb1e00000, 0x3, 0x0, 0xb3c9, 0x4, 0x7, 0x1, 0x4, 0x0, 0x3, 0xff, 0x7ff, 0x0, 0x1f, 0x7ff, 0x7ff, 0x1, 0x4, 0x3, 0x6, 0x8, 0x7, 0x1000, 0x9, 0x3, 0xfffffffb, 0x3, 0x1ff, 0x5, 0x7, 0x39, 0x7, 0x8001, 0x1, 0xfffffffa, 0x5, 0x2, 0x6, 0x0, 0x5, 0x3, 0x0, 0xff, 0x80000001, 0xbe, 0x5, 0x1, 0x7, 0x1, 0x0, 0x40, 0x0, 0x7, 0x9, 0x9730, 0xc, 0x6, 0x0, 0x2, 0x7f95, 0x48a, 0x0, 0x59, 0x7, 0x4, 0xb8cb, 0x0, 0xe6b, 0x2, 0x80000001, 0x1, 0xff, 0x6, 0x7, 0x3, 0x7fffffff, 0x8, 0x3, 0x8, 0xffffffff, 0x3f, 0xd9, 0x2, 0x4, 0x8000, 0x1000, 0x1000, 0x4, 0x0, 0x40, 0x5, 0x6d80, 0x1, 0x3, 0x74bb, 0x8001, 0x9, 0x9, 0x73, 0x5, 0xfff, 0x1, 0x8f6f, 0x5, 0x8, 0x7, 0x9, 0xffff, 0x1, 0xf57, 0x0, 0x8, 0xfffffe00, 0x57, 0x400, 0x9, 0x1ff, 0x1, 0xffffffff, 0x3, 0x8, 0x3ff, 0x0, 0x100, 0x400, 0x0, 0x80, 0x3, 0x2, 0x0, 0x8, 0x401, 0xfffffffe, 0x2, 0x100, 0x3, 0x1ff, 0xfff, 0x800, 0xe, 0xa7, 0x101, 0x5, 0x0, 0x0, 0x7fffffff, 0x8, 0x6, 0x8001, 0x200, 0x10001, 0x100, 0x1, 0x9, 0x7, 0xd3, 0x2, 0xe6, 0x80000000, 0x9434, 0x7ff, 0x7, 0x8001, 0x0, 0x293, 0x9, 0xd755, 0x401, 0x5fdf, 0x8, 0x2800000, 0x400, 0x6, 0x0, 0x3ff, 0x1000, 0x57, 0x75, 0x4, 0x4, 0x6, 0x6, 0x43e4, 0x401, 0x3, 0x49, 0xc8, 0x7fffffff, 0x7, 0x9, 0x1, 0x555, 0x8, 0x3, 0x1, 0x2, 0xf148, 0x1ff, 0x5, 0x3, 0x6, 0x7fff, 0x3, 0x66d, 0xfffffffe, 0x8, 0x1, 0x40, 0x633, 0xf71f, 0xff, 0x8000, 0x3, 0x2, 0x9, 0x2c, 0xfffffffe, 0xfffffff9, 0x0, 0x1, 0x400, 0x9, 0x56b9, 0x4, 0xfffffffe, 0x1, 0x8001, 0x8, 0x40000, 0xbf, 0x9, 0x3, 0x1, 0x80, 0x8000, 0x10001, 0xffff, 0x6, 0x1, 0x2, 0x800, 0x1, 0x80000000, 0x4, 0x5, 0x8, 0x383, 0x0, 0x2, 0x4, 0x8, 0x7, 0x5, 0xffff, 0x101, 0x3, 0x4, 0xffffffff, 0x8000, 0x5, 0x2, 0x1000, 0x5, 0x100, 0x5, 0x8, 0x1, 0xdb1, 0x10001, 0x7, 0x0, 0x1, 0x0, 0x81, 0x0, 0xf96, 0x80000000, 0xf1, 0x6, 0x9, 0x316, 0x5, 0xff, 0x1, 0x1, 0x6, 0x8, 0x8, 0xc11, 0x3ff, 0xfffff001, 0x2, 0xffffffff, 0x0, 0x800, 0x0, 0x8, 0x9, 0x61a, 0x1, 0x8, 0xffff, 0xfffffffa, 0x0, 0x0, 0x2, 0x1000, 0xe0, 0xffff, 0x28, 0x1e9c, 0x1, 0xffffff31, 0x5, 0x5, 0xd550, 0x0, 0x8, 0x800, 0xffffffff, 0x7, 0x7ff, 0x80000000, 0x7, 0x0, 0x3, 0x4, 0x10000, 0x4, 0x800, 0x0, 0x40, 0x1000, 0x101, 0x8, 0x6, 0x6, 0xb4c600, 0x80000001, 0x3, 0x8001, 0x2, 0x4, 0x6f, 0x8, 0x7f, 0x7, 0x401, 0x4, 0x5, 0xff, 0x10000, 0xffff, 0x0, 0x7fffffff, 0x80000000, 0x3, 0x8, 0x0, 0x0, 0x1000, 0x1, 0x7, 0x0, 0x5, 0x1000, 0x200, 0xfffffff7, 0xff, 0x5e, 0xa36, 0xecaa, 0xfffffffe, 0x401, 0xffffffff, 0xdc, 0x0, 0x10000, 0x3ff, 0x0, 0x800, 0x80000000, 0x994, 0x400, 0x1000, 0xfffffffe, 0x10001, 0x6, 0x1, 0x5, 0x1, 0x2482, 0x2, 0x20, 0x1ff, 0x5, 0x401, 0x400, 0x7, 0xffffffff, 0x800, 0x8000, 0xdf000000, 0x10001, 0x5, 0x4, 0x1000, 0x0, 0xa6, 0x80000000, 0x400, 0x1, 0x1, 0xdf, 0x0, 0x2, 0x800, 0x0, 0x80000001, 0x4, 0x3f, 0x1, 0x8000, 0x80000000, 0x10001, 0x10001, 0x8, 0x7, 0x6, 0xacdf, 0xdc, 0x3cf, 0x2b4, 0xd7, 0x5, 0x7fff, 0xffff, 0xff, 0x0, 0x1, 0x630, 0x5054, 0x5, 0x7fff, 0xb06, 0x101, 0x7fffffff, 0xcf7, 0x8, 0x1ff, 0x2, 0xbe, 0x400, 0x1, 0x7, 0x52, 0x7, 0xc6, 0x0, 0x0, 0x6, 0x1, 0x6, 0xffffce31, 0xac8, 0x7ff, 0x7, 0x6203, 0x101, 0x2, 0xfff, 0x2, 0x6, 0x40, 0x5, 0x800, 0x80a, 0xfffffffc, 0x8, 0x1, 0x20, 0x40, 0x81e, 0xff, 0x6, 0x6, 0x7, 0x5, 0x8001, 0x3, 0x81, 0xa2c8, 0x8849, 0x9, 0x0, 0x8, 0x9, 0x2, 0x3, 0x7713, 0x0, 0x100, 0x100, 0xd6, 0x6, 0xfffffff8, 0x8000, 0x3, 0x2, 0x4, 0x7, 0xfffffffc, 0x3, 0xbd45, 0x7fffffff, 0x7fff, 0x79, 0x1, 0x101, 0x6, 0x3, 0x40, 0xf46b, 0x0, 0x13, 0xfe4b, 0x7fffffff, 0x9, 0x9, 0x7, 0x9, 0x6, 0x1, 0x80, 0x1, 0xe, 0xba, 0x6f0ba753, 0x6, 0x247825d7, 0x6, 0x9, 0x2, 0x579, 0x2a, 0xffff, 0x6, 0x19, 0x8000, 0x3, 0xa5d, 0x8, 0xfe76, 0x8, 0x1f, 0xfffffff9, 0x0, 0x80, 0xce, 0x5, 0x7, 0x3, 0x5]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) ioctl$UI_GET_SYSNAME(r5, 0x8040552c, &(0x7f0000000140)) [ 1302.347219] af_alg_get_rsgl+0x1cf/0x510 [ 1302.351285] skcipher_recvmsg+0x766/0xcb0 [ 1302.355439] ? retint_kernel+0x2d/0x2d [ 1302.359323] ? skcipher_release+0x40/0x40 [ 1302.363465] ? security_socket_recvmsg+0x8b/0xc0 [ 1302.368199] ? skcipher_release+0x40/0x40 [ 1302.372470] sock_recvmsg+0xc0/0x100 [ 1302.376171] sock_read_iter+0x252/0x360 [ 1302.380147] ? sock_recvmsg+0x100/0x100 [ 1302.384132] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1302.388881] ? iov_iter_init+0xa6/0x1c0 [ 1302.392856] __vfs_read+0x44b/0x610 [ 1302.396483] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1302.401057] ? selinux_file_permission+0x7a/0x440 [ 1302.405879] ? rw_verify_area+0xe1/0x2a0 [ 1302.409917] vfs_read+0x131/0x330 [ 1302.413349] SyS_read+0xf2/0x210 [ 1302.416692] ? kernel_write+0x110/0x110 [ 1302.420680] ? SyS_clock_settime+0x1a0/0x1a0 [ 1302.425067] ? do_syscall_64+0x4c/0x640 [ 1302.429024] ? kernel_write+0x110/0x110 [ 1302.432988] do_syscall_64+0x1d5/0x640 [ 1302.436861] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1302.442028] RIP: 0033:0x45c829 10:29:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f00000021c0), 0x0, &(0x7f0000002200)=""/165, 0xa5}, 0x8}, {{&(0x7f00000022c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private1}}, 0x80, &(0x7f0000002380)=[{&(0x7f0000002340)=""/28, 0x1c}], 0x1, &(0x7f00000023c0)=""/241, 0xfffffffffffffe94}, 0x1e}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000003a40)=""/65, 0x41}, {&(0x7f0000003ac0)=""/102400}, {&(0x7f0000002580)=""/178, 0xb2}, {&(0x7f0000000000)=""/167, 0xa7}, {&(0x7f0000002700)=""/136, 0x88}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000003980)=""/176, 0xb0}], 0x7, &(0x7f00000024c0)=""/66, 0x42}, 0x8}], 0x3, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:29:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x151200, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x401) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$RTC_WIE_OFF(r1, 0x7010) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1302.445225] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1302.452910] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1302.460156] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1302.467402] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1302.474651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1302.481913] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:09 executing program 4 (fault-call:6 fault-nth:48): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x2, 0x7, 0x801, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008080}, 0x40) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1302.594830] FAULT_INJECTION: forcing a failure. [ 1302.594830] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1302.636918] CPU: 1 PID: 30991 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1302.644829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.654183] Call Trace: [ 1302.656776] dump_stack+0x13e/0x194 [ 1302.660409] should_fail.cold+0x10a/0x14b [ 1302.664558] __alloc_pages_nodemask+0x1bf/0x700 [ 1302.669232] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1302.674248] ? find_held_lock+0x2d/0x110 [ 1302.678498] alloc_pages_vma+0xc2/0x4a0 [ 1302.682477] __handle_mm_fault+0x17b6/0x3280 [ 1302.686901] ? copy_page_range+0x1d70/0x1d70 [ 1302.691333] ? find_held_lock+0x2d/0x110 [ 1302.695406] handle_mm_fault+0x288/0x7a0 [ 1302.699472] __get_user_pages+0x44d/0x11e0 [ 1302.703712] ? follow_page_mask+0x1580/0x1580 [ 1302.708215] get_user_pages_unlocked+0x1df/0x2e0 [ 1302.712975] ? get_user_pages_locked+0x3d0/0x3d0 [ 1302.717727] ? mark_held_locks+0xa6/0xf0 [ 1302.721785] ? get_user_pages_fast+0x16b/0x2b0 [ 1302.726369] get_user_pages_fast+0x20f/0x2b0 [ 1302.730778] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1302.735794] ? save_trace+0x290/0x290 [ 1302.739683] ? save_trace+0x290/0x290 [ 1302.743514] iov_iter_get_pages+0x203/0xc80 [ 1302.747838] ? __lock_is_held+0xad/0x140 [ 1302.752161] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1302.757099] af_alg_make_sg+0x82/0x3f0 [ 1302.760995] ? sock_kmalloc+0x75/0xc0 [ 1302.764804] ? af_alg_data_wakeup+0x80/0x80 [ 1302.769153] af_alg_get_rsgl+0x1cf/0x510 [ 1302.773227] skcipher_recvmsg+0x766/0xcb0 [ 1302.777384] ? skcipher_release+0x40/0x40 [ 1302.781536] ? security_socket_recvmsg+0x8b/0xc0 [ 1302.786727] ? skcipher_release+0x40/0x40 [ 1302.790887] sock_recvmsg+0xc0/0x100 [ 1302.794603] sock_read_iter+0x252/0x360 [ 1302.798576] ? sock_recvmsg+0x100/0x100 [ 1302.802559] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1302.807314] ? iov_iter_init+0xa6/0x1c0 [ 1302.811294] __vfs_read+0x44b/0x610 [ 1302.814936] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1302.819527] ? selinux_file_permission+0x7a/0x440 [ 1302.824383] ? rw_verify_area+0xe1/0x2a0 [ 1302.828449] vfs_read+0x131/0x330 [ 1302.831908] SyS_read+0xf2/0x210 10:29:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) sendmmsg(r2, &(0x7f0000003c80)=[{{&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000180)="2a44011220c4cb110251160673992e5c7591f5684256eea8ad489840817dd837248ec777e220565d3eea37c6400b0250fb61deaa709199509bdaf17d84fa7ec610153a73065ab1fbb3ada055faa2ac1aff5ea4f7368b1cf77a2d9f4d63546e10973a1875e7512ef9ddebe953c7a88ca79a90d03a", 0x74}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="12fc50e4decb4db170bafd73694928c367f80c5d541525b8143338c878843b58a29b54e6a41c1c8c0cec0549e5d472d58fc48de12dcd95962bd36a84e540fc5e4a0c12d2ca0d10a623ca729266fb23c86bbb182a4b1dac86419bbd8ce9b079000945327ea449bbb5", 0x68}, {&(0x7f0000000100)="f96402595589904df94f1a28", 0xc}, {&(0x7f0000001280)="51bfd5f2486b2dbb6735ad5f2904123ef33e14dc851f7336a7913b56eec8e2ac1bc8337c13e90a332ae494d69e40c10e7c9d3e3f729c42bc848898782300602d23f823d0308b763017e4e5650e29fd0b960550072d58bd0af0a82ad0a45d8ed9f2d421b500016a7b1557147d080c2bd90b9f51e7e669a229a76fff4eb2862aac00d0a1d5f90c40700e15fbae00e8c451dda331c4865c6ea4de192edfded6cfde342a28920b0609d63aa2650721f716cfce9151f72a48486e0cb0e46ff3755e392827462c1c4a6d7f9c43909d2b39ad", 0xcf}], 0x5, &(0x7f0000001400)=[{0xc8, 0x111, 0x7fff, "bfe987b95dfca9278d8cb4f990557dc5f9d1e7029536b066e967102c7c1b6995b31b4f92dabc333e978b5c881d65df95fa2a43c235b023d649a26f427155050430145a09864714bac415093000bd06920e792315d8a76d59e6a3e8165523fe681e1fe3426a87bb6fd2263e66d5c7f8e63e3bf3158f78c82c32aab221ebf9eb8dafe22a2eba7e7a8ce764d27fdc691de279197b8a8162e6acf8ff7d690781cf36de72866bf350dac2bf7b9d919a76309170"}], 0xc8}}, {{&(0x7f0000001500)=@ipx={0x4, 0x0, 0x0, "34cfbb945390", 0xcd}, 0x80, &(0x7f0000003740)=[{&(0x7f0000001580)="02f264f8e8da3e7dc8e5cd2ae1d40eaad5a54444cec959ad3df4e6b6499a946cb92e8d586011e36e4d6ed2405c91fc6f3b821c8493d4383ae25d75b981c17a916bbd5df00386c0102099ea080fb50e91f931995f86d08f53013e4eb54999a77682b96435664c91c203246d8955b2fc0b6965ae2903310f6ee35c75395081fc29cea2a7c105a9107f75dc40554dac43482dcb050cc552a8779f18218d5f11d85ef02a184745c4dc45ff1f1f8d80fe1f3ab690fbc808d7e3f6e79adf608114fdfecba2203e0b3f9eeec38ff50ed6cb32008f94e2af07954cf1e022e3123fa5c190445b10c5aa66ed1c7e4304350abd7791be931fd2bd", 0xf5}, {&(0x7f0000001680)="0c46e66006d3058d4066c1e45abdb6bf2e5c0f49f9330d0acef4c785aee8dca8f9de3ce1a7e9e13a84e044962cb432fbd6e564e505fb20be19baff2e2e591d24de5c84ceee5d79c0c119254e491931a7dec076a49860984970a0e785830f8cc9e65a3b4f1030ad2561c7c3eb56b119d7c20dee32253c0f06b0abe1ab618396ff419f68fd2781eba952736f16f9", 0x8d}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="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", 0x1000}], 0x4}}, {{&(0x7f0000003780)=@ethernet={0x1, @link_local}, 0x80, &(0x7f0000003900)=[{&(0x7f0000003800)="f88a9fd01ec9d73205418cb6bf383bac6c32f640", 0x14}, {&(0x7f0000003840)="269b73a1a60c4d160828c0d34810512a560fc1fa4b2effd1e2135ea5ddfcbc8674bebe30575d7188c69c895b45eafe04e8eee9898e18f21fce96fc58cadb67c2deff7fdc8d7265240661c913d57e04116c92361fb2445be47c5893fcc3ca2a2ce944072fffae862947973b8a44a74c57d8e2dc94a924f28ad9ec210e1dd30d3cb5f22c7811", 0x85}], 0x2, &(0x7f0000003940)=[{0x10, 0x3a, 0x3f}, {0xf8, 0x11, 0x53, "65955e700ec90ff1468cb6c5a7c1be58da288c85212bdd77110afdaccd68f0b688e87e9f055a3b99173340d01ee4c7429d8f5c6bc2fab5b98e7d79bfa0757cc47ab802eff6e7cf5d1e1783e6309e2ae82131957c6c5b7a38de343eb0d37823ad707b79968b783503a23ab51f26a91ea4c5649fc2e0ce2bc190528064e4302622cdddfe0688ee109b56081cfc5bd33dbf9f30804ffbd4dbae168a766b2f41b10626543b45d306c80a06cc1efd412a543e1528662ec9378a6a399a27221b1a6fc1132bf3442ab930a2e6fbcbe0d5741905a934917802afda2be773bd110f168f7c0a1a0e0c7a"}, {0x28, 0x104, 0x66ab, "080c603fbfe2deef65193ed991f06bf49d76"}, {0xd8, 0x100, 0xcb, "2db1f188e4d96b46a1b19b357cb9b1c98120459a5a5f56011c25f2cbed13068fae89e3cbd24aea5eab92053b81a1c0159032e61852d24e8ded67cd57e3710a8bbbec97a6a96e8c3f1ea4853d0a912bb8fbc785d34a4ff552075dff796499f983f329ad9533574fceff7b0f58210ca4040c5cccb1213857d96ea207d53d65194f7af22d5a645fa725aa5d490edd42ddfe2d90bfa172a3f0a7a12a4689f818e30c67e1f2050c41757739c35f0bd0b07bda89c90d3a174d9293fa6d70336c44c6d0d4263e7329"}, {0xa0, 0x10b, 0x7, "c36765e8d57437a0c771cf03fb0d1a776af4a49c246c3c28d47109569c2a775b8654549f7a72854620acf2c4e31e504624268aa7e1d110b989c4b7ba2863d380aecd5cb19f0e0e2102812cf54382d39293a516ca6a8ce53942222a42c6d82ac8f9bb269ba56a5f9c746eadc6192d6db037a4934be3ac777e9d047d2c01c8c8d69fe92cfa61b59bb518f6e34c46fb"}, {0x78, 0x113, 0x1, "ff50b42b676a1b22e102922e07d1cd6f830fd09af42064aa3360771fc667dbc6d5522e427d5201e0d2526ae91429c17ebea9908ee839c5630f93a9fc1b1cab8124e651fdbeada6895f85fd6d6a3a0fe3af2d58e9092a7576df794caadc66d8dee4"}], 0x320}}], 0x3, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = getpid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) 10:29:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='id_resolver\x00', 0x0, &(0x7f0000000380)="07349a96dd680069eba7fc2d6f732d26f6dbc4eb791b2f36a34c37e9b4f642690a2590694a293b1b218273b8ee30c578af42d73e4a987cb1b6d675e777a431fe2d41c5faed77e36f318885467a67a8d72146", 0x52, r1) keyctl$read(0xb, r1, &(0x7f0000000000)=""/36, 0x24) preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) [ 1302.835273] ? kernel_write+0x110/0x110 [ 1302.839249] ? SyS_clock_settime+0x1a0/0x1a0 [ 1302.843659] ? do_syscall_64+0x4c/0x640 [ 1302.847632] ? kernel_write+0x110/0x110 [ 1302.851610] do_syscall_64+0x1d5/0x640 [ 1302.855506] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1302.860694] RIP: 0033:0x45c829 [ 1302.863913] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1302.871625] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1302.878897] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 10:29:10 executing program 4 (fault-call:6 fault-nth:49): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1302.886164] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1302.893435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1302.900716] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1302.952047] FAULT_INJECTION: forcing a failure. [ 1302.952047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1302.964821] CPU: 1 PID: 31016 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1302.972712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1302.982152] Call Trace: [ 1302.984743] dump_stack+0x13e/0x194 [ 1302.988380] should_fail.cold+0x10a/0x14b [ 1302.992525] __alloc_pages_nodemask+0x1bf/0x700 [ 1302.997221] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1303.002229] ? find_held_lock+0x2d/0x110 [ 1303.006290] alloc_pages_vma+0xc2/0x4a0 [ 1303.010257] __handle_mm_fault+0x17b6/0x3280 [ 1303.014654] ? copy_page_range+0x1d70/0x1d70 [ 1303.019169] ? find_held_lock+0x2d/0x110 [ 1303.023255] handle_mm_fault+0x288/0x7a0 [ 1303.027316] __get_user_pages+0x44d/0x11e0 [ 1303.031540] ? follow_page_mask+0x1580/0x1580 [ 1303.036051] get_user_pages_unlocked+0x1df/0x2e0 [ 1303.041079] ? get_user_pages_locked+0x3d0/0x3d0 [ 1303.045826] ? mark_held_locks+0xa6/0xf0 [ 1303.049896] ? get_user_pages_fast+0x16b/0x2b0 [ 1303.054486] get_user_pages_fast+0x20f/0x2b0 [ 1303.058900] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1303.063655] ? save_trace+0x290/0x290 [ 1303.067771] ? save_trace+0x290/0x290 [ 1303.071569] iov_iter_get_pages+0x203/0xc80 [ 1303.075920] ? __lock_is_held+0xad/0x140 [ 1303.079996] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1303.084924] af_alg_make_sg+0x82/0x3f0 [ 1303.088895] ? sock_kmalloc+0x75/0xc0 [ 1303.092695] ? af_alg_data_wakeup+0x80/0x80 [ 1303.097068] af_alg_get_rsgl+0x1cf/0x510 [ 1303.101227] skcipher_recvmsg+0x766/0xcb0 [ 1303.105374] ? skcipher_release+0x40/0x40 [ 1303.109506] ? security_socket_recvmsg+0x8b/0xc0 [ 1303.114245] ? skcipher_release+0x40/0x40 [ 1303.118377] sock_recvmsg+0xc0/0x100 [ 1303.122191] sock_read_iter+0x252/0x360 [ 1303.126157] ? sock_recvmsg+0x100/0x100 [ 1303.130121] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1303.134864] ? iov_iter_init+0xa6/0x1c0 [ 1303.138831] __vfs_read+0x44b/0x610 [ 1303.142452] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1303.147991] ? selinux_file_permission+0x7a/0x440 [ 1303.152820] ? rw_verify_area+0xe1/0x2a0 [ 1303.156863] vfs_read+0x131/0x330 [ 1303.160309] SyS_read+0xf2/0x210 [ 1303.163670] ? kernel_write+0x110/0x110 [ 1303.167640] ? SyS_clock_settime+0x1a0/0x1a0 [ 1303.172060] ? do_syscall_64+0x4c/0x640 [ 1303.176069] ? kernel_write+0x110/0x110 [ 1303.180061] do_syscall_64+0x1d5/0x640 [ 1303.183959] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1303.189137] RIP: 0033:0x45c829 [ 1303.192313] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000026c0), 0x0, 0x7fffff) [ 1303.200008] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1303.207285] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1303.214535] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1303.221880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1303.229139] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:10 executing program 4 (fault-call:6 fault-nth:50): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:10 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\a\x00\x001\x00\x00\x00\x00'], 0x2000, 0x0) msgrcv(r0, &(0x7f0000000100)={0x0, ""/234}, 0xf2, 0x3, 0x1000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) ioctl$RTC_UIE_ON(r2, 0x7003) preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') 10:29:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x1}, 0x401c, 0x0, 0x40, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f00000000c0), &(0x7f0000000240)=0x4) read(r1, &(0x7f0000000140)=""/216, 0xcf4c365e) socket$alg(0x26, 0x5, 0x0) 10:29:10 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9ce", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1303.434097] FAULT_INJECTION: forcing a failure. [ 1303.434097] name failslab, interval 1, probability 0, space 0, times 0 [ 1303.459784] CPU: 0 PID: 31033 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1303.470387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.479823] Call Trace: [ 1303.482396] dump_stack+0x13e/0x194 [ 1303.486021] should_fail.cold+0x10a/0x14b [ 1303.490174] should_failslab+0xd6/0x130 [ 1303.494139] __kmalloc+0x2e9/0x7c0 [ 1303.497738] ? sock_kmalloc+0x75/0xc0 [ 1303.501543] sock_kmalloc+0x75/0xc0 [ 1303.505165] af_alg_get_rsgl+0xcc/0x510 [ 1303.509144] skcipher_recvmsg+0x766/0xcb0 [ 1303.513288] ? skcipher_release+0x40/0x40 [ 1303.517465] ? security_socket_recvmsg+0x8b/0xc0 [ 1303.522208] ? skcipher_release+0x40/0x40 [ 1303.526337] sock_recvmsg+0xc0/0x100 [ 1303.530055] sock_read_iter+0x252/0x360 [ 1303.534017] ? sock_recvmsg+0x100/0x100 [ 1303.537974] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1303.542714] ? iov_iter_init+0xa6/0x1c0 [ 1303.546676] __vfs_read+0x44b/0x610 [ 1303.550285] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1303.554862] ? selinux_file_permission+0x7a/0x440 [ 1303.559714] ? rw_verify_area+0xe1/0x2a0 [ 1303.563774] vfs_read+0x131/0x330 [ 1303.567224] SyS_read+0xf2/0x210 [ 1303.570584] ? kernel_write+0x110/0x110 [ 1303.574580] ? SyS_clock_settime+0x1a0/0x1a0 [ 1303.578971] ? do_syscall_64+0x4c/0x640 [ 1303.582926] ? kernel_write+0x110/0x110 [ 1303.586879] do_syscall_64+0x1d5/0x640 [ 1303.590755] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1303.595931] RIP: 0033:0x45c829 [ 1303.599120] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1303.606818] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1303.614066] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1303.621320] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 10:29:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000280)="baf80c432c9187f01766efbafc0cb8bd00ef0f320f624e10bad104ec26660ff85f50361b0f20c0663502000080f26eb800088ec00fae470b", 0x39}], 0x32, 0x51, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = dup2(r5, r2) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r8, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r8, &(0x7f0000000080)={0x4000201a}) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:10 executing program 4 (fault-call:6 fault-nth:51): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1303.628585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1303.637407] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000780)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000740)={&(0x7f0000000040)={0x58, 0x7, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x9}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x8}]}, 0x58}}, 0x4000) [ 1303.722095] FAULT_INJECTION: forcing a failure. [ 1303.722095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1303.745078] CPU: 1 PID: 31051 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1303.752985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1303.762344] Call Trace: [ 1303.764937] dump_stack+0x13e/0x194 [ 1303.768747] should_fail.cold+0x10a/0x14b [ 1303.772900] __alloc_pages_nodemask+0x1bf/0x700 [ 1303.777582] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1303.782603] ? find_held_lock+0x2d/0x110 [ 1303.786685] alloc_pages_vma+0xc2/0x4a0 [ 1303.790665] __handle_mm_fault+0x17b6/0x3280 [ 1303.795075] ? copy_page_range+0x1d70/0x1d70 [ 1303.799488] ? find_held_lock+0x2d/0x110 [ 1303.806608] handle_mm_fault+0x288/0x7a0 [ 1303.810677] __get_user_pages+0x44d/0x11e0 [ 1303.814925] ? follow_page_mask+0x1580/0x1580 [ 1303.819422] get_user_pages_unlocked+0x1df/0x2e0 [ 1303.824178] ? get_user_pages_locked+0x3d0/0x3d0 [ 1303.828935] ? mark_held_locks+0xa6/0xf0 [ 1303.833001] ? get_user_pages_fast+0x16b/0x2b0 [ 1303.837586] get_user_pages_fast+0x20f/0x2b0 [ 1303.841997] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1303.846732] ? save_trace+0x290/0x290 [ 1303.850560] ? save_trace+0x290/0x290 [ 1303.854343] iov_iter_get_pages+0x203/0xc80 [ 1303.858663] ? __lock_is_held+0xad/0x140 [ 1303.862742] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1303.867662] af_alg_make_sg+0x82/0x3f0 [ 1303.871547] ? sock_kmalloc+0x75/0xc0 [ 1303.875346] ? af_alg_data_wakeup+0x80/0x80 [ 1303.879668] af_alg_get_rsgl+0x1cf/0x510 [ 1303.883730] skcipher_recvmsg+0x766/0xcb0 [ 1303.887881] ? skcipher_release+0x40/0x40 [ 1303.892022] ? security_socket_recvmsg+0x8b/0xc0 [ 1303.896772] ? skcipher_release+0x40/0x40 [ 1303.900910] sock_recvmsg+0xc0/0x100 [ 1303.904618] sock_read_iter+0x252/0x360 [ 1303.908593] ? sock_recvmsg+0x100/0x100 [ 1303.912559] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1303.917294] ? iov_iter_init+0xa6/0x1c0 [ 1303.921267] __vfs_read+0x44b/0x610 [ 1303.924880] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1303.929452] ? selinux_file_permission+0x7a/0x440 [ 1303.934290] ? rw_verify_area+0xe1/0x2a0 [ 1303.938341] vfs_read+0x131/0x330 [ 1303.941789] SyS_read+0xf2/0x210 [ 1303.945159] ? kernel_write+0x110/0x110 [ 1303.949132] ? SyS_clock_settime+0x1a0/0x1a0 [ 1303.953529] ? do_syscall_64+0x4c/0x640 [ 1303.957725] ? kernel_write+0x110/0x110 [ 1303.961695] do_syscall_64+0x1d5/0x640 [ 1303.965596] entry_SYSCALL_64_after_hwframe+0x42/0xb7 10:29:11 executing program 4 (fault-call:6 fault-nth:52): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000340)={{0x3, 0x3, 0x9, 0x5, 'syz1\x00', 0x7ff}, 0x0, 0x20000000, 0x1, r3, 0x3, 0xfb3f, 'syz0\x00', &(0x7f00000001c0)=['-]vmnet1eth0\xa9self]+GPL\x00', 'posix_acl_access:^wlan1\\\\\':GPL^wlan0em0$eth0!\x00', ']&posix_acl_access}wlan0*\x00'], 0x5f, [], [0x2, 0x9, 0x0, 0x2]}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0xc7}, 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) connect$ax25(r4, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1303.970855] RIP: 0033:0x45c829 [ 1303.974025] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1303.981741] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1303.989000] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1303.996258] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.003525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1304.010776] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1304.057254] FAULT_INJECTION: forcing a failure. [ 1304.057254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1304.071046] CPU: 1 PID: 31069 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1304.078942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.088297] Call Trace: [ 1304.090889] dump_stack+0x13e/0x194 [ 1304.094698] should_fail.cold+0x10a/0x14b [ 1304.098850] __alloc_pages_nodemask+0x1bf/0x700 [ 1304.103524] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1304.108532] ? find_held_lock+0x2d/0x110 [ 1304.112588] alloc_pages_vma+0xc2/0x4a0 [ 1304.116566] __handle_mm_fault+0x17b6/0x3280 [ 1304.120968] ? copy_page_range+0x1d70/0x1d70 [ 1304.125361] ? find_held_lock+0x2d/0x110 [ 1304.129420] ? sync_mm_rss+0x10f/0x180 [ 1304.133301] handle_mm_fault+0x288/0x7a0 [ 1304.137345] __get_user_pages+0x44d/0x11e0 [ 1304.141591] ? follow_page_mask+0x1580/0x1580 [ 1304.146101] get_user_pages_unlocked+0x1df/0x2e0 [ 1304.151654] ? get_user_pages_locked+0x3d0/0x3d0 [ 1304.156411] ? mark_held_locks+0xa6/0xf0 [ 1304.160472] ? get_user_pages_fast+0x16b/0x2b0 [ 1304.165056] get_user_pages_fast+0x20f/0x2b0 [ 1304.169461] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1304.174205] ? save_trace+0x290/0x290 [ 1304.177988] ? save_trace+0x290/0x290 [ 1304.181780] iov_iter_get_pages+0x203/0xc80 [ 1304.186192] ? __lock_is_held+0xad/0x140 [ 1304.190252] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1304.195179] af_alg_make_sg+0x82/0x3f0 [ 1304.199066] ? sock_kmalloc+0x75/0xc0 [ 1304.202859] ? af_alg_data_wakeup+0x80/0x80 10:29:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0xa2, 0x7ff, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9a0918, 0x3, [], @p_u32=&(0x7f0000000000)=0x80}}) sendmmsg(r1, &(0x7f0000006bc0)=[{{&(0x7f0000000140)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)="ff8c227a10", 0x5}, {&(0x7f0000000200)="d9327a2409b8bf370ed387480376ac579466561e3d5fde57b7cb3dc753dd2b60b275e156add56426877c322e02e2bacac16658dbdc3d962d52753db360452ef529211b9a9260896d8c2b9fe49caf26b73481d602def675c76748b2eb24d146277b02680b8f72d5dd50127af1c877726cea0eb68c481e7136302c129894b3020e8c5c604d927ec8511533394de1c2", 0x8e}, {&(0x7f00000002c0)="755f337ff53893e685768fa54957098c", 0x10}, {&(0x7f0000000300)="1042079a3705226e00bc0d431f7104c08e1994b560fab9ad85837d4cb74ac4baccbb1c69fb4e5f2248566306362fdd685a6e3ce68131cd45fb8419a40a0a41201c8afc4b157db516f0396450b2f4ccd2ccc0ade5bff0ae60bd1520f33a76b290854f6b148e183999fccee52fd9c79557294d5b2d0b991fa1234e24f4352ed1239b94c88070774728a7ed395837509095572e79b2a099236b2f24a567c0a49bf65e266497849fb4e62c2e4a6ed1688abb1b42b585a40013f311ce736487ec0dc5943f8f29994867545bfe15d0ddebbc5d51a4f22e8294a6816ceae3", 0xdb}], 0x4, &(0x7f0000000440)=[{0x90, 0x1, 0x1aa, "1b81cb11e01ade78d9eb2fd9aa601cd37d435cdd056eb02ba97ccb96657ce08092339d9dca017f7e1fff7037fb29e3f7096a90d4be2887da3ad926f743bdca71f0745fd0675ba400b1c7981aabe2240c2f8c14cac15e6b1ffd8cc43d148395f279d7047d822ab303911d9ac7cd8ec1f7c35e398228176d084501"}, {0x88, 0xd, 0x2, "bafe4da8a0add0a780c5e8e35be63b3513762f2d15278b86781ef701dc1acd44f371de5aa5d0d7c4b1e4e23035734736a8d8e65a130d80b5bf553bb30c2b6424a71ac5c9b8bd24a04c8d9473da7ac4582c49176abe2507cade0a4b24729746f5d70fbb31865fc845be416a33b5ca7aabb4c2a964"}, {0x60, 0x112, 0x1, "9455624bedb6d903a33c9d65a340a34b05058b14765a87d407ff1a5ebcfce47892f22fb6bb36c308fc949ba92d3cd75ccf317a62ff729c4fe117201c1ddd9abd0a66ecbf8bf7c0d8fd4dd5ad"}, {0xf0, 0x115, 0x8001, "1da4ec4849b696fe05820254e25edb9f7ef862df8dc4314e3a963f09c88a9c05173463fa1041ac236840bad835be57ed0d4ee287ada06c58d39cd4dd46a40ca6e3ff84e81f571f41686d035972b447b93196c7983b81fe28304afa096218bff683cc9083b0a3dd1a3338e40996fb7a0648f7674fdb8a1e20b97c5e411793afe796ec36a3b7e1cf07855d78cd6c668fb25b369b02a6dfedf308bd3c00b7a86adf9618d6549999ac686b14cf20f1cd098d7648f36a0be16d80d0340a49781c0147d50cc75980e6f629f005197e2644ceeb5cf30cdff3fc8b0d12db598412ba"}], 0x268}}, {{&(0x7f00000006c0)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e20, 0x3}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000740)="b5c8415ffee246bfab47194138217981f2b6fae1407bd01967d1c3df6dd21c962ce10d43514eabce3a32ab81a56fa7092222601cedfc8f37fe95ff3048626d1f4ae352a11e206bb780bf6bb03b33f8ca45478b761cce2cab18dc08a6c191", 0x5e}, {&(0x7f00000007c0)="c3ef858f45cb11c798240f8354bd4fb89b1dab231c5ee81fe338527f2415d74ca0ca626b95747babe9b740808e16b11e8712c80b3d99d4a8fb818d1a39d355920383faba37fb2f1a5b5d", 0x4a}, {&(0x7f0000000840)="47fcb984ce0cf49e13ecb57a04db8a43369d2e1d170cd2a4774fcf1330d926e821995bcd5b60ba821c4e31e9e46ad6b53afe57046693d203eaeb14b5981914d9a429bc2cb09ca9b293258160f49ff9e5df5eb0f55888b4d044efe113439d1519f72e02f56c8d64046d5a3506cfed49373bd83eee9b737433ab87d59e94cbdb026dc5c369b8691282c90dcdadcffa62bd8fc426ffbd56274ce84fc3f556d82e95371a82", 0xa3}, {&(0x7f0000000900)="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", 0x1000}], 0x4, &(0x7f0000006d80)=ANY=[@ANYBLOB="580000000000000017010000020000006c26b055d038301aa6161f205bb4499e1df8a1a230946a6ca6e62c961f4de777b376c025db2a275401f5e74e95fa0e14418a42e67b68e06108490e2554aaa58fa4000000000000005136bd9390d4fd0ad979ddc9c19e2d9b49c3163a11eca7ff665e817fd29e00d0923da04d"], 0x7c}}, {{&(0x7f00000019c0)=@generic={0x1a, "deb2000cc0ca523236ee78070c3485dfb535ceb030d0934a60dd199113e3018fa8f095ea3db4f861e6cefceb38c163e375cdd0b12a654d81a9f8501988f078a8a55c93a67527d096d633539fa5fb394c05dcb98df6458296288c03aa4aec6b553ff9fde9147499c83be02a1c2600b47caff9845feda75de291da2234d8db"}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a40)="9e348d096ebc3e1d8c681af12bfeb40f249aaf8756285811288998862a2710c884f189a8327514a021d5fc3ac3bdac8670eeb6f349251b56f67e01a664b9d7aa563d1996e27f70aa98351c941b4831706c8a7fb5001ddd86f42ed508ec638143ac0e00a7c5d2f1f264490ba287e86970e99e8961742af5b7c812a49ad7f3679c048121", 0x83}, {&(0x7f0000001b00)="7b8a8ea9843d38362698d87c76ff594774e282a342bad2474534fe9edaa4e1822243e88678a6eb0104ccb4f46a4204a994222470af1087a138c57b79a0c4e2539e411cdfa078f657d9761ced6d203ab20f34c3a20e12f6fdbd338499cf37f8f27130724729bb8e", 0x67}, {&(0x7f0000001b80)="0b37b49c56826937466fdd98c869c7eb7ada37def6d3699b85a76153640fc250823b398d66bc834eea9651e0f48fbc8b67762015b7b879b3a0d66a04d8f9869526878bfad02ac7a99ee894189325217b00d3468f5b17c7bd561017b73d30a4ef9a8d39367dae46c8b30be37f69452379b87740f43203ce4039770ef06bc70092ef001b204d548a591ad8a2f78641a099e3b0dccfc68011ec68a06e75b627aee3dd71a8d12c8da0aca435bfa45d93eb7036f575", 0xb3}, {&(0x7f0000001c40)="dbde4f29896e50f2952dabb1149acabcac4a98ea7b5ff481fb13e1f57eac297f1175842dbabd35db4bdd551f68791848a227b8a6286157a958e637e73f9f57292b1640f727edc82bcc6e63542d1998d60c02435549b8637fc3b7f0bf301582247e557008d3c00e95397815e028b988ef238323762009f9c0a368c6aa0bcf649a1023f3e5d09de6d149", 0x89}], 0x4}}, {{&(0x7f0000001d40)=@sco, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001dc0)="42bf44d2f670a99b205336b155e3d09e9d11c88daa8068a73029213539fb96327fe3d441b343242796a7f3bbccd330cdfc0f7e1e54481368fe971d8b14f7c9d2fe38187c90858378a94e9661f5ab2e171265b533c811879aa425f5e1d6086a6947d32e8ed10420f7088a519c3738e1c1cadaec8f0358fab5aa75357f10cf0d253175d1d235423bac59da6dbcaf", 0x8d}], 0x1, &(0x7f0000001ec0)=[{0x1010, 0x101, 0x401, "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"}, {0xa0, 0x101, 0x400, "ae95a02269279858c26f778fc4267251d229d988718754579cb35fe0edbb63da00ec0d7b542ccc9ea6356286f115ec59b383cb3bb66b01f9ba22e15635e1c87574eb97c4c0a25d40677dfcab8daa7a729c01b619c98e81e068f30ab0a2eb5f97886833f605e991591c0a8cd5861ed5f57e640668016994699591ae77d187412f64b4027a3394fcf1f0550d25"}, {0xc8, 0x18, 0xcf, "a1fae7eb1b45b3a8467a1dd971f50e8ab255d093191c24f188be6620fbe76cf922a927b28ad8e741fb4c0cb73fbebe99f6de41d610cf7c3feace8a11cedf1c1c78ddca18d05835f6e05e9169d057802cc515ead33cf45b98f84b697243e73a36e4a2790fb7f894879dbea2a2a0af667c46ee32762475b1610206818b0039dc893b7c862aa260b9cd6eae313e6abafc2d5aaca5741cace912722f770962fe43fabbb432545bdc027a7686cc459a00058636b81e"}], 0x1178}}, {{0x0, 0x0, &(0x7f0000005300)=[{&(0x7f0000003040)="3a07f3dd0550bb70958bf182d4403ab7cc03b5d822e531b20fe1cee188a3c7137c6a9721d390ab3ffbe66b2c69020a0db4e6c97954750de78f74fb36f5ae5245c3fc4708e2b91bf50685", 0x4a}, {&(0x7f0000003180)="0681c1b609e360b37f9c6bc6332c3602d407201c0218e308e0090cb0c2c1db67c7b7afbcd680bf466b1c9f0d29829bffd3539f13e0418bd8bd3d01cab8316722d1fb586b19e591d2f85b5460b6d309db7a0a096fb466788ac2f37a0294d0ff603342acafd17e1f791f471dbc42ab2b443d9198631368df0c2389c0ed2c764014bab0d77c9e873335267213bffcca840857472bdb208f29adbdbcf82790d4694377b881de3b8bfe1a7b091b596672e904d84c5acc81ec3f65119134cc", 0xbc}, {&(0x7f00000030c0)="ecad0788bab297b70377a18e9a6e1463092998d66a2ce4a29486c0319f1d5c230e55416e49def18837c0e95fc3c62122976bfcc430963cff5b1dea81d22739bcd8", 0x41}, {&(0x7f0000003240)="c2c0a8d5b35c2bb8f7bd9ed7df3ee6e9b4c0b9854b131625d4fa293220932d242aa8d89e02ded68770b72ac344fb304c416a4d5146879b81530fa3b52ffcc544f42005f6953bebee1aab2474db1130d4152cf0add2869a553b4cd118bd84c1844d91862a861474494a96aded2352bc0113cfcd668c7341f1446fcc84138638dda41a52279da5216702c43c46bd53a57f618d6d674f529e4fddd7cd22bafe38a6bc45f1e6a9d982d2e2fbcdc9c5db7003ea507f7338505fac94", 0xb9}, {&(0x7f0000003300)="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", 0x1000}, {&(0x7f0000004300)="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", 0x1000}], 0x6}}, {{&(0x7f0000005380)=@vsock={0x28, 0x0, 0xffffd8ef, @local}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005400)="203c6997122ac70fa27b569dc9e87eb4c0618d28c1f26184488aa41624633a17001ef6de261cfef3298673a8ad1004b74793e85136cc327fd5d0f63037f7a4b2941f8b7df20e6eeaa76f0ebc2a338c450a69011344abecf6dc9d7d497a", 0x5d}, {&(0x7f0000005480)="4c948ce508e264dafdafc54e072a251194a183e76eb249c60c8919339a7423f7892fd99a1aa71329bf2d0fae00bc2fa05a3af27343a3bfb162c313755acc75d76d371b9994f023829cb6216a51633b0841664620", 0x54}, {&(0x7f0000005500)="e4c416a2f4cb44e3bb1a3a6b927037c8c845015a6b8523b110940df26005346c32cae05e08b0c45748d6fa6033", 0x2d}, {&(0x7f0000005540)="103c5709db3060cb15f7e1e0608987", 0xf}, {&(0x7f0000005580)="207c2d2918b2b4b29805fd893cc03a8aada1374c70bb0dfe9f49f96de78c7753e857c748fcf15b211739eef7566c6f5672d88479edbf1cbb46d0a648dd4cf1dd24262f6e89cc72aaf0d513e9ad20c7535a04fdd8e26f3de4021258b379d807b142efdc5ad4036473a3e92e0324f67d5f21124915f91b8432bf98ae6b25b5168052c465e4a917279ee41ed1950213c2cf6d442bdf8366da475738c3c79e8c00f24db7aa282a2f933b0b7f2497e70cb6fcde1bec4110274b5e57189cf5e9f8cf6e720c44a885df4fe13e725cf559bb965e58de4b666a2ee84ffccf51ee0abbca2286044a1e6a", 0xe5}], 0x5, &(0x7f0000005700)}}, {{&(0x7f0000005740)=@l2tp={0x2, 0x0, @broadcast, 0x1}, 0x80, &(0x7f0000005900)=[{&(0x7f00000057c0)="9fdb25d9c1402b6dfc1d5b788df11dd0b45ed9a0e1cb01f065af28e6e0d2bf19278e301e74b1264c13bb496226e807ef76dd3866e1f8cadcecf5b78b3e4853de08425269fd343e8183ac240955c9171e54da2a8ca184ed42d31072e3b1636e6dbed811879e86339c2f85b4d83f90794d9a25837b897a8208e0b8c5d988c4c501ccab2165a93e08043837ad50101ca3289dbeca6919de9cf4fb7276e8615ebb8735549dc881e893c69d7c228336fbfad3d52ad136883370000ae1ddb46f3afc3d1ec4d084dee9537a27958bef6574e0ea3c217f5ac3f57e33c0146fce9673f16426e10f3f1fc820778c79c08a62b8172997e9f902337bf731", 0xf8}, {&(0x7f00000058c0)}], 0x2, &(0x7f0000005940)=[{0x70, 0x0, 0x5, "578afb2eafc140cc9233cc495b5ef74dd74e809780ce5763f0e3d70785a6e2a3e430f3ffa1fb0d2bac98c5f8e6bab280b899dffb73bbf6f94f7b12a498acd828e59cba0ed31443b4118164627a398c485cb40cf01f4caaf87fde"}, {0x38, 0x105, 0x7, "9864fc736b4715d1c12933d5d37bf670e63e2fc246080c10f2dc63dacf28b4b734aadcfeef"}, {0x1010, 0x107, 0x5907, "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"}, {0x10, 0x3a}, {0x78, 0x147, 0xf03, "ca747fe554dbddfb347d23009ee71df40220a659ba7c48d227ffa79cc61f6c80a19bdb9661baa143b104531814f6471821ff0bb755e4b036d94595ff5a963c417d7860e3899fd2eae3faf4322b02f47260d588ce6d23b03e99bfb4dc6702140f43ca71d7"}, {0x110, 0x109, 0xcff6, "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"}], 0x1250}}], 0x7, 0x40) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001940)='/dev/video2\x00', 0x2, 0x0) [ 1304.207177] af_alg_get_rsgl+0x1cf/0x510 [ 1304.211251] skcipher_recvmsg+0x766/0xcb0 [ 1304.215408] ? skcipher_release+0x40/0x40 [ 1304.219557] ? security_socket_recvmsg+0x8b/0xc0 [ 1304.224313] ? skcipher_release+0x40/0x40 [ 1304.228463] sock_recvmsg+0xc0/0x100 [ 1304.232178] sock_read_iter+0x252/0x360 [ 1304.236168] ? sock_recvmsg+0x100/0x100 [ 1304.240153] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1304.244907] ? iov_iter_init+0xa6/0x1c0 [ 1304.248884] __vfs_read+0x44b/0x610 [ 1304.252505] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1304.257090] ? selinux_file_permission+0x7a/0x440 [ 1304.261930] ? rw_verify_area+0xe1/0x2a0 [ 1304.265983] vfs_read+0x131/0x330 [ 1304.269430] SyS_read+0xf2/0x210 [ 1304.272786] ? kernel_write+0x110/0x110 [ 1304.276745] ? SyS_clock_settime+0x1a0/0x1a0 [ 1304.281154] ? do_syscall_64+0x4c/0x640 [ 1304.285117] ? kernel_write+0x110/0x110 [ 1304.289079] do_syscall_64+0x1d5/0x640 [ 1304.292970] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1304.298148] RIP: 0033:0x45c829 [ 1304.301316] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1304.309008] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1304.316269] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1304.323523] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.330787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1304.338044] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:11 executing program 4 (fault-call:6 fault-nth:53): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:11 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9ce", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x114) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000140)=0x3000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1304.453837] FAULT_INJECTION: forcing a failure. [ 1304.453837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1304.466392] CPU: 1 PID: 31089 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1304.474294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.483645] Call Trace: [ 1304.486241] dump_stack+0x13e/0x194 [ 1304.489881] should_fail.cold+0x10a/0x14b [ 1304.494029] __alloc_pages_nodemask+0x1bf/0x700 [ 1304.498705] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1304.503717] ? find_held_lock+0x2d/0x110 [ 1304.507792] alloc_pages_vma+0xc2/0x4a0 [ 1304.511766] __handle_mm_fault+0x17b6/0x3280 [ 1304.516174] ? copy_page_range+0x1d70/0x1d70 [ 1304.520581] ? find_held_lock+0x2d/0x110 [ 1304.524650] handle_mm_fault+0x288/0x7a0 [ 1304.528713] __get_user_pages+0x44d/0x11e0 [ 1304.532964] ? follow_page_mask+0x1580/0x1580 [ 1304.537470] get_user_pages_unlocked+0x1df/0x2e0 [ 1304.542314] ? get_user_pages_locked+0x3d0/0x3d0 [ 1304.547074] ? mark_held_locks+0xa6/0xf0 [ 1304.551134] ? get_user_pages_fast+0x16b/0x2b0 [ 1304.555719] get_user_pages_fast+0x20f/0x2b0 [ 1304.560125] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1304.564874] ? save_trace+0x290/0x290 [ 1304.568677] ? save_trace+0x290/0x290 [ 1304.572567] iov_iter_get_pages+0x203/0xc80 [ 1304.576995] ? __lock_is_held+0xad/0x140 [ 1304.581053] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1304.586080] af_alg_make_sg+0x82/0x3f0 [ 1304.589971] ? sock_kmalloc+0x75/0xc0 [ 1304.593778] ? af_alg_data_wakeup+0x80/0x80 [ 1304.598107] af_alg_get_rsgl+0x1cf/0x510 10:29:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0xe, &(0x7f000059aff8)={r3}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={r3, 0x4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r3, 0x4e, "707b1defa34be6ffdaffd7fccb828ccd8e8dc86c710c3ea7379eb25eee20c006600b9ebda4c5508f27cc4ba11c7d82d9b3d20cc97bcc9de4a32ada180f87cb5f6a2917b81afd079f7533ef920aae"}, &(0x7f00000000c0)=0x56) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1304.602175] skcipher_recvmsg+0x766/0xcb0 [ 1304.606330] ? skcipher_release+0x40/0x40 [ 1304.610487] ? security_socket_recvmsg+0x8b/0xc0 [ 1304.615240] ? skcipher_release+0x40/0x40 [ 1304.619390] sock_recvmsg+0xc0/0x100 [ 1304.623104] sock_read_iter+0x252/0x360 [ 1304.627079] ? sock_recvmsg+0x100/0x100 [ 1304.631064] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1304.635818] ? iov_iter_init+0xa6/0x1c0 [ 1304.639797] __vfs_read+0x44b/0x610 [ 1304.643427] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1304.648019] ? selinux_file_permission+0x7a/0x440 [ 1304.652856] ? rw_verify_area+0xe1/0x2a0 [ 1304.656900] vfs_read+0x131/0x330 [ 1304.660343] SyS_read+0xf2/0x210 [ 1304.663710] ? kernel_write+0x110/0x110 [ 1304.667664] ? SyS_clock_settime+0x1a0/0x1a0 [ 1304.672054] ? do_syscall_64+0x4c/0x640 [ 1304.676007] ? kernel_write+0x110/0x110 [ 1304.679972] do_syscall_64+0x1d5/0x640 [ 1304.683866] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1304.689051] RIP: 0033:0x45c829 [ 1304.692258] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:12 executing program 4 (fault-call:6 fault-nth:54): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1304.699964] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1304.707232] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1304.714521] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1304.721772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1304.729470] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 [ 1304.828222] FAULT_INJECTION: forcing a failure. [ 1304.828222] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1304.846534] CPU: 0 PID: 31098 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1304.854440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1304.863795] Call Trace: [ 1304.866390] dump_stack+0x13e/0x194 [ 1304.870027] should_fail.cold+0x10a/0x14b [ 1304.874267] __alloc_pages_nodemask+0x1bf/0x700 [ 1304.878951] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1304.883967] ? find_held_lock+0x2d/0x110 [ 1304.888044] alloc_pages_vma+0xc2/0x4a0 [ 1304.892021] __handle_mm_fault+0x17b6/0x3280 [ 1304.896437] ? copy_page_range+0x1d70/0x1d70 [ 1304.900849] ? find_held_lock+0x2d/0x110 [ 1304.904924] handle_mm_fault+0x288/0x7a0 [ 1304.908990] __get_user_pages+0x44d/0x11e0 [ 1304.913233] ? follow_page_mask+0x1580/0x1580 [ 1304.917740] get_user_pages_unlocked+0x1df/0x2e0 [ 1304.922499] ? get_user_pages_locked+0x3d0/0x3d0 10:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x24, r3, 0x2, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000740)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r3, 0x800, 0x70bd28, 0x25dfdbff, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x18}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4011) [ 1304.927253] ? mark_held_locks+0xa6/0xf0 [ 1304.931311] ? get_user_pages_fast+0x16b/0x2b0 [ 1304.935897] get_user_pages_fast+0x20f/0x2b0 [ 1304.940310] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1304.945069] ? save_trace+0x290/0x290 [ 1304.948875] iov_iter_get_pages+0x203/0xc80 [ 1304.953204] ? __lock_is_held+0xad/0x140 [ 1304.957460] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1304.962400] af_alg_make_sg+0x82/0x3f0 [ 1304.966296] ? sock_kmalloc+0x75/0xc0 [ 1304.970113] ? af_alg_data_wakeup+0x80/0x80 [ 1304.974432] af_alg_get_rsgl+0x1cf/0x510 [ 1304.978506] skcipher_recvmsg+0x766/0xcb0 [ 1304.982638] ? skcipher_release+0x40/0x40 [ 1304.986767] ? skcipher_release+0x40/0x40 [ 1304.990895] sock_recvmsg+0xc0/0x100 [ 1304.994596] sock_read_iter+0x252/0x360 [ 1304.998556] ? sock_recvmsg+0x100/0x100 [ 1305.002574] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1305.007333] ? iov_iter_init+0xa6/0x1c0 [ 1305.011294] __vfs_read+0x44b/0x610 [ 1305.014906] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1305.019476] ? selinux_file_permission+0x7a/0x440 [ 1305.024354] ? rw_verify_area+0xe1/0x2a0 [ 1305.028442] vfs_read+0x131/0x330 [ 1305.031878] SyS_read+0xf2/0x210 [ 1305.035269] ? kernel_write+0x110/0x110 [ 1305.039223] ? SyS_clock_settime+0x1a0/0x1a0 [ 1305.043613] ? do_syscall_64+0x4c/0x640 [ 1305.047564] ? kernel_write+0x110/0x110 [ 1305.051534] do_syscall_64+0x1d5/0x640 [ 1305.055449] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1305.060675] RIP: 0033:0x45c829 [ 1305.063848] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1305.071549] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 10:29:12 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) 10:29:12 executing program 4 (fault-call:6 fault-nth:55): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1305.079145] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1305.086841] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1305.094097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1305.101394] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup(r0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfb5) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1305.197383] FAULT_INJECTION: forcing a failure. [ 1305.197383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1305.215318] CPU: 0 PID: 31102 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1305.223389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.232789] Call Trace: [ 1305.235430] dump_stack+0x13e/0x194 [ 1305.239058] should_fail.cold+0x10a/0x14b [ 1305.243197] __alloc_pages_nodemask+0x1bf/0x700 [ 1305.247878] ? retint_kernel+0x2d/0x2d [ 1305.251853] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1305.256853] ? __handle_mm_fault+0x682/0x3280 [ 1305.261340] alloc_pages_vma+0xc2/0x4a0 [ 1305.265314] __handle_mm_fault+0x17b6/0x3280 [ 1305.269721] ? copy_page_range+0x1d70/0x1d70 [ 1305.274130] ? find_held_lock+0x2d/0x110 [ 1305.278202] handle_mm_fault+0x288/0x7a0 [ 1305.282262] __get_user_pages+0x44d/0x11e0 [ 1305.286504] ? follow_page_mask+0x1580/0x1580 [ 1305.290996] get_user_pages_unlocked+0x1df/0x2e0 [ 1305.295737] ? get_user_pages_locked+0x3d0/0x3d0 [ 1305.300499] ? mark_held_locks+0xa6/0xf0 [ 1305.304547] ? get_user_pages_fast+0x16b/0x2b0 [ 1305.309127] get_user_pages_fast+0x20f/0x2b0 [ 1305.313517] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1305.318254] ? save_trace+0x290/0x290 [ 1305.322033] ? save_trace+0x290/0x290 [ 1305.325813] iov_iter_get_pages+0x203/0xc80 [ 1305.330121] ? __lock_is_held+0xad/0x140 [ 1305.334159] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1305.339085] af_alg_make_sg+0x82/0x3f0 [ 1305.342957] ? sock_kmalloc+0x75/0xc0 [ 1305.346752] ? af_alg_data_wakeup+0x80/0x80 [ 1305.351068] af_alg_get_rsgl+0x1cf/0x510 [ 1305.355208] skcipher_recvmsg+0x766/0xcb0 [ 1305.359342] ? skcipher_release+0x40/0x40 [ 1305.363480] ? security_socket_recvmsg+0x8b/0xc0 [ 1305.368319] ? skcipher_release+0x40/0x40 [ 1305.372468] sock_recvmsg+0xc0/0x100 [ 1305.376174] sock_read_iter+0x252/0x360 [ 1305.380135] ? sock_recvmsg+0x100/0x100 [ 1305.384099] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1305.388839] ? iov_iter_init+0xa6/0x1c0 [ 1305.392803] __vfs_read+0x44b/0x610 [ 1305.396452] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1305.401034] ? selinux_file_permission+0x7a/0x440 [ 1305.405870] ? rw_verify_area+0xe1/0x2a0 [ 1305.409920] vfs_read+0x131/0x330 [ 1305.413355] SyS_read+0xf2/0x210 [ 1305.416716] ? kernel_write+0x110/0x110 [ 1305.420671] ? do_syscall_64+0x4c/0x640 [ 1305.424623] ? kernel_write+0x110/0x110 [ 1305.428593] do_syscall_64+0x1d5/0x640 [ 1305.432465] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1305.437648] RIP: 0033:0x45c829 [ 1305.440818] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:29:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) write$selinux_attr(r3, &(0x7f00000000c0)='system_u:object_r:udev_var_run_t:s0\x00', 0x24) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1305.448514] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1305.455809] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1305.463068] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1305.470335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1305.477589] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:12 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9ce", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:12 executing program 4 (fault-call:6 fault-nth:56): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x401}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x4, 0xfff, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x3, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}}, 0x4000004) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000100)=""/208) preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) [ 1305.629170] FAULT_INJECTION: forcing a failure. [ 1305.629170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1305.641847] CPU: 1 PID: 31122 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1305.649738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.659095] Call Trace: [ 1305.661682] dump_stack+0x13e/0x194 [ 1305.665319] should_fail.cold+0x10a/0x14b [ 1305.669469] __alloc_pages_nodemask+0x1bf/0x700 [ 1305.674138] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1305.679151] ? find_held_lock+0x2d/0x110 [ 1305.683224] alloc_pages_vma+0xc2/0x4a0 [ 1305.687201] __handle_mm_fault+0x17b6/0x3280 [ 1305.691611] ? copy_page_range+0x1d70/0x1d70 [ 1305.696021] ? find_held_lock+0x2d/0x110 [ 1305.700091] handle_mm_fault+0x288/0x7a0 [ 1305.704156] __get_user_pages+0x44d/0x11e0 [ 1305.708398] ? follow_page_mask+0x1580/0x1580 [ 1305.712910] get_user_pages_unlocked+0x1df/0x2e0 [ 1305.717672] ? get_user_pages_locked+0x3d0/0x3d0 [ 1305.722426] ? mark_held_locks+0xa6/0xf0 10:29:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 10:29:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) [ 1305.726491] ? get_user_pages_fast+0x16b/0x2b0 [ 1305.731079] get_user_pages_fast+0x20f/0x2b0 [ 1305.735492] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1305.740249] iov_iter_get_pages+0x203/0xc80 [ 1305.744573] ? __lock_is_held+0xad/0x140 [ 1305.748635] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1305.753566] af_alg_make_sg+0x82/0x3f0 [ 1305.757451] ? sock_kmalloc+0x75/0xc0 [ 1305.761257] ? af_alg_data_wakeup+0x80/0x80 [ 1305.765590] af_alg_get_rsgl+0x1cf/0x510 [ 1305.769661] skcipher_recvmsg+0x766/0xcb0 [ 1305.773817] ? skcipher_release+0x40/0x40 [ 1305.777967] ? security_socket_recvmsg+0x8b/0xc0 [ 1305.782719] ? skcipher_release+0x40/0x40 [ 1305.786864] sock_recvmsg+0xc0/0x100 [ 1305.790584] sock_read_iter+0x252/0x360 [ 1305.794613] ? sock_recvmsg+0x100/0x100 [ 1305.798591] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1305.803338] ? iov_iter_init+0xa6/0x1c0 [ 1305.807313] __vfs_read+0x44b/0x610 [ 1305.810948] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1305.815538] ? selinux_file_permission+0x7a/0x440 [ 1305.820388] ? rw_verify_area+0xe1/0x2a0 [ 1305.824485] vfs_read+0x131/0x330 [ 1305.827917] SyS_read+0xf2/0x210 [ 1305.831273] ? kernel_write+0x110/0x110 [ 1305.835244] ? SyS_clock_settime+0x1a0/0x1a0 [ 1305.839645] ? do_syscall_64+0x4c/0x640 [ 1305.843692] ? kernel_write+0x110/0x110 [ 1305.847655] do_syscall_64+0x1d5/0x640 [ 1305.851539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1305.856722] RIP: 0033:0x45c829 [ 1305.859899] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1305.867607] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 10:29:13 executing program 4 (fault-call:6 fault-nth:57): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1305.874869] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1305.882163] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1305.889527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1305.896788] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"/1694], 0xc4}}, 0x0) [ 1305.963927] FAULT_INJECTION: forcing a failure. [ 1305.963927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1305.976420] CPU: 0 PID: 31139 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1305.984304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1305.993665] Call Trace: [ 1305.996239] dump_stack+0x13e/0x194 [ 1305.999872] should_fail.cold+0x10a/0x14b [ 1306.004048] __alloc_pages_nodemask+0x1bf/0x700 [ 1306.008702] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1306.013446] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1306.018459] alloc_pages_vma+0xc2/0x4a0 [ 1306.022428] __handle_mm_fault+0x17b6/0x3280 [ 1306.026830] ? copy_page_range+0x1d70/0x1d70 [ 1306.031248] ? find_held_lock+0x2d/0x110 [ 1306.035314] handle_mm_fault+0x288/0x7a0 [ 1306.039368] __get_user_pages+0x44d/0x11e0 [ 1306.043597] ? follow_page_mask+0x1580/0x1580 [ 1306.048104] get_user_pages_unlocked+0x1df/0x2e0 [ 1306.052850] ? get_user_pages_locked+0x3d0/0x3d0 [ 1306.057586] ? get_user_pages_fast+0x19d/0x2b0 [ 1306.062150] get_user_pages_fast+0x20f/0x2b0 [ 1306.066661] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1306.071403] ? save_trace+0x290/0x290 [ 1306.075193] ? save_trace+0x290/0x290 [ 1306.078982] iov_iter_get_pages+0x203/0xc80 [ 1306.083381] ? __lock_is_held+0xad/0x140 [ 1306.087430] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1306.092361] af_alg_make_sg+0x82/0x3f0 [ 1306.096243] ? sock_kmalloc+0x75/0xc0 [ 1306.100047] ? af_alg_data_wakeup+0x80/0x80 [ 1306.104480] af_alg_get_rsgl+0x1cf/0x510 [ 1306.108529] skcipher_recvmsg+0x766/0xcb0 [ 1306.112663] ? skcipher_release+0x40/0x40 [ 1306.116793] ? security_socket_recvmsg+0x8b/0xc0 [ 1306.121529] ? skcipher_release+0x40/0x40 [ 1306.125665] sock_recvmsg+0xc0/0x100 [ 1306.129386] sock_read_iter+0x252/0x360 [ 1306.133348] ? sock_recvmsg+0x100/0x100 [ 1306.137316] ? iov_iter_init+0xa6/0x1c0 [ 1306.141277] __vfs_read+0x44b/0x610 [ 1306.144888] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1306.149455] ? selinux_file_permission+0x7a/0x440 [ 1306.154280] ? rw_verify_area+0xe1/0x2a0 [ 1306.158365] vfs_read+0x131/0x330 [ 1306.161799] SyS_read+0xf2/0x210 [ 1306.165715] ? kernel_write+0x110/0x110 [ 1306.169684] ? do_syscall_64+0x4c/0x640 [ 1306.173648] ? kernel_write+0x110/0x110 [ 1306.177610] do_syscall_64+0x1d5/0x640 [ 1306.181496] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1306.186690] RIP: 0033:0x45c829 [ 1306.189859] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1306.197560] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1306.204816] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1306.212510] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1306.219765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1306.227023] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:29:13 executing program 4 (fault-call:6 fault-nth:58): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev\x00') r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x280, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x3, r2, 0x1}) 10:29:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x6, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={&(0x7f0000000080)="5f29871ac71e5824efbce92d4c79aa5459290d51865239b7b3cdbd290a3de06ab8a596938eab5eb270a1cb032a1cb36b12cd7ab21366c9b0a79149946397bc7d7b586ef545e4b081bc2fe2aed8fa7077c5", &(0x7f0000000180)=""/84, &(0x7f0000000200)="8da8485652b41139ca41747a2b945dcf10da061c549546dc4b37e3c12487656f52a3cedd2e1a368f0d72fba723a4cad25af0a6131613ebfb9c4a9ff6f5e04edacdb04231c4", &(0x7f0000000280)="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", 0x1, r3}, 0x38) 10:29:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x30040, 0x0) r3 = geteuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e489af81690d90890a0c4dd9f64f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07", @ANYRESHEX, @ANYRESDEC, @ANYBLOB="2c27726f757036a7aeaab788765f69643d08e8af42572ee4c690cc24e3b7c33e23333d48010400000000000043c859cf76e963547629164f261bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d8d89799b8c8bb6f931c7204ecfb72223e584921270bfdb079355a193a86e814fe95d28f2adfbc481ba57ad9a3feba948c712dae4d9f1f72e530fc6a06db8f8899f59c6230acab0d99b42d1199eff2c124039e96b272e61a86a06f415efd08cafa9e2f06c7320b0f8ffffffffffffff42fef3d2ed979a947cdc7fe3b5e474c6", @ANYRESDEC=r4, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2ca3d526c246b71b73723d7b6261630000000072616e736d7574753d2f6465762f6b766d002c00ae3ad4bce20971cc0567d813ecfd861a6120e4dab49e2f919dd8aa9aef019450a3b04f977ee65f01000000f061bf91999b942e04792d53cc636019e31925132a5ccab623b1cb6347369444bc39a00634820a70faa90697774515ddbfe72bcd34488b253bee7101ca59d6fb269f597cf6eeb09a10c4c41e85f2ba912153b8"]) setgid(r4) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, r3, r4}, 0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1306.338206] FAULT_INJECTION: forcing a failure. [ 1306.338206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1306.363837] CPU: 1 PID: 31146 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1306.371747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.381116] Call Trace: [ 1306.383706] dump_stack+0x13e/0x194 [ 1306.387340] should_fail.cold+0x10a/0x14b [ 1306.391496] __alloc_pages_nodemask+0x1bf/0x700 [ 1306.396157] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1306.401170] ? find_held_lock+0x2d/0x110 [ 1306.405243] alloc_pages_vma+0xc2/0x4a0 [ 1306.409224] __handle_mm_fault+0x17b6/0x3280 [ 1306.413635] ? copy_page_range+0x1d70/0x1d70 [ 1306.418037] ? find_held_lock+0x2d/0x110 [ 1306.422107] handle_mm_fault+0x288/0x7a0 [ 1306.426176] __get_user_pages+0x44d/0x11e0 [ 1306.430420] ? follow_page_mask+0x1580/0x1580 [ 1306.434929] get_user_pages_unlocked+0x1df/0x2e0 [ 1306.439692] ? get_user_pages_locked+0x3d0/0x3d0 [ 1306.444448] ? mark_held_locks+0xa6/0xf0 [ 1306.448512] ? get_user_pages_fast+0x16b/0x2b0 [ 1306.453098] get_user_pages_fast+0x20f/0x2b0 [ 1306.457506] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1306.462259] ? save_trace+0x290/0x290 [ 1306.466060] ? save_trace+0x290/0x290 [ 1306.469860] iov_iter_get_pages+0x203/0xc80 [ 1306.474180] ? __lock_is_held+0xad/0x140 [ 1306.478241] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1306.483177] af_alg_make_sg+0x82/0x3f0 [ 1306.487064] ? sock_kmalloc+0x75/0xc0 [ 1306.490870] ? af_alg_data_wakeup+0x80/0x80 [ 1306.495206] af_alg_get_rsgl+0x1cf/0x510 [ 1306.499276] skcipher_recvmsg+0x766/0xcb0 [ 1306.503429] ? skcipher_release+0x40/0x40 [ 1306.507578] ? security_socket_recvmsg+0x8b/0xc0 [ 1306.512333] ? skcipher_release+0x40/0x40 [ 1306.516474] sock_recvmsg+0xc0/0x100 [ 1306.520181] sock_read_iter+0x252/0x360 [ 1306.524155] ? sock_recvmsg+0x100/0x100 [ 1306.528137] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1306.532889] ? iov_iter_init+0xa6/0x1c0 [ 1306.536863] __vfs_read+0x44b/0x610 [ 1306.540491] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1306.545081] ? selinux_file_permission+0x7a/0x440 [ 1306.549932] ? rw_verify_area+0xe1/0x2a0 [ 1306.553998] vfs_read+0x131/0x330 [ 1306.557447] SyS_read+0xf2/0x210 [ 1306.560798] ? kernel_write+0x110/0x110 [ 1306.564752] ? SyS_clock_settime+0x1a0/0x1a0 [ 1306.569145] ? do_syscall_64+0x4c/0x640 [ 1306.573104] ? kernel_write+0x110/0x110 [ 1306.577067] do_syscall_64+0x1d5/0x640 [ 1306.580950] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1306.586131] RIP: 0033:0x45c829 [ 1306.589308] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1306.597010] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1306.604347] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1306.611597] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1306.618852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1306.626110] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:13 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) 10:29:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) r3 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x1, @private1}], 0x3c) 10:29:13 executing program 4 (fault-call:6 fault-nth:59): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:13 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f00000000c0)=@usbdevfs_disconnect={0x3}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x2, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x0, 0x8, 0x4, 0x40000, 0x3, {0x77359400}, {0x5, 0x0, 0x2, 0x7f, 0x9, 0x40, "1c4035f1"}, 0xff, 0x4, @offset=0x4, 0x5, 0x0, 0xffffffffffffffff}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @private1, 0xb43f}, r3}}, 0x30) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1306.757880] FAULT_INJECTION: forcing a failure. [ 1306.757880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1306.770952] CPU: 1 PID: 31164 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1306.778863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1306.788217] Call Trace: [ 1306.790810] dump_stack+0x13e/0x194 [ 1306.794446] should_fail.cold+0x10a/0x14b [ 1306.798648] __alloc_pages_nodemask+0x1bf/0x700 [ 1306.803331] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1306.808486] ? find_held_lock+0x2d/0x110 [ 1306.812585] alloc_pages_vma+0xc2/0x4a0 [ 1306.816570] __handle_mm_fault+0x17b6/0x3280 [ 1306.820985] ? copy_page_range+0x1d70/0x1d70 [ 1306.825398] ? find_held_lock+0x2d/0x110 [ 1306.829474] handle_mm_fault+0x288/0x7a0 [ 1306.833632] __get_user_pages+0x44d/0x11e0 [ 1306.837882] ? follow_page_mask+0x1580/0x1580 [ 1306.842750] get_user_pages_unlocked+0x1df/0x2e0 [ 1306.847953] ? get_user_pages_locked+0x3d0/0x3d0 [ 1306.852707] ? mark_held_locks+0xa6/0xf0 10:29:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) [ 1306.856776] ? get_user_pages_fast+0x16b/0x2b0 [ 1306.861365] get_user_pages_fast+0x20f/0x2b0 [ 1306.865779] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1306.870548] ? save_trace+0x290/0x290 [ 1306.874351] ? save_trace+0x290/0x290 [ 1306.878256] iov_iter_get_pages+0x203/0xc80 [ 1306.886803] ? __lock_is_held+0xad/0x140 [ 1306.890866] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1306.895805] af_alg_make_sg+0x82/0x3f0 [ 1306.903340] ? sock_kmalloc+0x75/0xc0 10:29:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x300}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x50}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000500)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000600)=0xe8) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x80000002, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="8ca793db3d78e5b6c1d0ed24a1ca0f359996f9545d3623d9bd99bae6f5364f1d4f76b9adb1f7a4c7967c5334de2ac5a33e898b6c9808747215b57426f5dcea55e8506b8b", 0x44, 0x9}, {&(0x7f0000000400)="48602637b053169a6bf12450419035bac32bade64a14f5d1a5271bb0bc17419563d4ad293e1b3938ebe363f94d913857c83c99f485f8e0308ab6ba3e71c52c34d00985dd55dd5560bd7bf51ac6c194cd87a256ce9110f51e35666b2fd840fbabb076c1cb1bc1244c4cf1f5298fd2ab76325cc4f0ee408a869da10f7d3aff504228a495c883efc9fdc044916f5437", 0x8e, 0x8}], 0x2a0b400, &(0x7f0000000840)={[], [{@fowner_gt={'fowner>', r8}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x23}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_role={'obj_role'}}, {@hash='hash'}]}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@empty, @in6=@dev={0xfe, 0x80, [], 0x2e}, 0x4e23, 0x3, 0x4e23, 0x0, 0xa, 0xa0, 0x20, 0x8, r4, r8}, {0x1, 0x8001, 0x400, 0x401, 0x5, 0x2, 0x3, 0x100000000}, {0x1f, 0x8, 0x0, 0x4ac}, 0x8000, 0x0, 0x3, 0x0, 0x2, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x40}, 0x4d6, 0x2b}, 0xa, @in=@rand_addr=0x64010102, 0x3504, 0x0, 0x1, 0x20, 0x0, 0x3913, 0x4f}}, 0xe8) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r10 = inotify_add_watch(r9, &(0x7f0000000000)='./file0\x00', 0x14e) inotify_rm_watch(r1, r10) [ 1306.907145] ? af_alg_data_wakeup+0x80/0x80 [ 1306.911481] af_alg_get_rsgl+0x1cf/0x510 [ 1306.915559] skcipher_recvmsg+0x766/0xcb0 [ 1306.919718] ? skcipher_release+0x40/0x40 [ 1306.923871] ? security_socket_recvmsg+0x8b/0xc0 [ 1306.928631] ? skcipher_release+0x40/0x40 [ 1306.932786] sock_recvmsg+0xc0/0x100 [ 1306.936498] sock_read_iter+0x252/0x360 [ 1306.940467] ? sock_recvmsg+0x100/0x100 [ 1306.944459] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1306.949214] ? iov_iter_init+0xa6/0x1c0 [ 1306.953280] __vfs_read+0x44b/0x610 [ 1306.956909] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1306.963520] ? selinux_file_permission+0x7a/0x440 [ 1306.968370] ? rw_verify_area+0xe1/0x2a0 [ 1306.972442] vfs_read+0x131/0x330 [ 1306.975895] SyS_read+0xf2/0x210 [ 1306.979261] ? kernel_write+0x110/0x110 [ 1306.983236] ? SyS_clock_settime+0x1a0/0x1a0 [ 1306.987646] ? do_syscall_64+0x4c/0x640 [ 1306.991614] ? kernel_write+0x110/0x110 [ 1306.995595] do_syscall_64+0x1d5/0x640 [ 1306.999489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1307.004678] RIP: 0033:0x45c829 [ 1307.007867] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1307.015572] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1307.022839] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1307.030452] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1307.037808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1307.045079] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:14 executing program 4 (fault-call:6 fault-nth:60): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:14 executing program 1: syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r0 = memfd_create(&(0x7f0000000000)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x5) ftruncate(r0, 0x1000000) sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x200f18001, 0xeefffdef) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000001c80)="f5f822a023ec1429a1c06e2907787f8b35b04ca213645128645bc1684d0135c46a30f48733b5963fb3720dbc8d9b8d78e797f88da119711fc8b5b3ceb1ac3de78fb98c7f30f30375fc35d84132cfb4dfc42fe4e5ab68cf594bf670232994066ce4022eec26d5017ab8ffb7a44cf50cf49910644d080783be4b12f25a066eaed1628fbcaac3a73cf9734b16c117ed00"/155, 0x9b) write$FUSE_STATFS(r3, &(0x7f0000001900)={0x60, 0x0, 0x8, {{0x0, 0x8, 0x1, 0xa2, 0xb2d, 0x2, 0x2, 0x800}}}, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x10, 0x3, 0xc) r7 = socket$inet6(0xa, 0x3, 0x7) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000001c00)=0x886, &(0x7f0000001c40)=0x2) recvmmsg(r7, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001980)=""/215, 0xd7}, {&(0x7f0000001880)=""/59, 0x3b}, {&(0x7f0000001a80)=""/76, 0x4c}], 0x3, &(0x7f0000001b40)=""/100, 0x64}, 0x3}], 0x1, 0x20, 0x0) recvmsg(r7, &(0x7f0000000100)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000180)=""/180, 0xb4}, {&(0x7f0000000240)=""/247, 0xf7}, {&(0x7f0000000340)=""/203, 0xcb}, {&(0x7f0000000440)=""/160, 0xa0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/115, 0x73}, {&(0x7f0000001580)=""/222, 0xde}, {&(0x7f0000001680)=""/154, 0x9a}], 0x8, &(0x7f00000017c0)=""/174, 0xae}, 0x40012042) sendmsg(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1307.205406] FAULT_INJECTION: forcing a failure. [ 1307.205406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1307.240738] CPU: 1 PID: 31189 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1307.248656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.258013] Call Trace: [ 1307.261567] dump_stack+0x13e/0x194 [ 1307.265205] should_fail.cold+0x10a/0x14b [ 1307.269358] __alloc_pages_nodemask+0x1bf/0x700 [ 1307.274030] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1307.279060] ? find_held_lock+0x2d/0x110 [ 1307.283132] alloc_pages_vma+0xc2/0x4a0 [ 1307.287205] __handle_mm_fault+0x17b6/0x3280 [ 1307.291619] ? copy_page_range+0x1d70/0x1d70 [ 1307.296732] ? find_held_lock+0x2d/0x110 [ 1307.301781] handle_mm_fault+0x288/0x7a0 [ 1307.305879] __get_user_pages+0x44d/0x11e0 [ 1307.310212] ? follow_page_mask+0x1580/0x1580 [ 1307.314716] get_user_pages_unlocked+0x1df/0x2e0 [ 1307.319529] ? get_user_pages_locked+0x3d0/0x3d0 [ 1307.324285] ? mark_held_locks+0xa6/0xf0 [ 1307.328348] ? get_user_pages_fast+0x16b/0x2b0 [ 1307.333128] get_user_pages_fast+0x20f/0x2b0 [ 1307.337542] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1307.342293] ? save_trace+0x290/0x290 [ 1307.346090] ? save_trace+0x290/0x290 [ 1307.349895] iov_iter_get_pages+0x203/0xc80 [ 1307.354218] ? __lock_is_held+0xad/0x140 [ 1307.358279] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1307.363212] af_alg_make_sg+0x82/0x3f0 [ 1307.367099] ? sock_kmalloc+0x75/0xc0 [ 1307.370900] ? af_alg_data_wakeup+0x80/0x80 [ 1307.375223] af_alg_get_rsgl+0x1cf/0x510 [ 1307.379292] skcipher_recvmsg+0x766/0xcb0 [ 1307.383533] ? skcipher_release+0x40/0x40 [ 1307.387683] ? security_socket_recvmsg+0x8b/0xc0 [ 1307.392437] ? skcipher_release+0x40/0x40 [ 1307.396581] sock_recvmsg+0xc0/0x100 [ 1307.400299] sock_read_iter+0x252/0x360 [ 1307.404278] ? sock_recvmsg+0x100/0x100 [ 1307.408261] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1307.413014] ? iov_iter_init+0xa6/0x1c0 [ 1307.416992] __vfs_read+0x44b/0x610 [ 1307.420623] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1307.425222] ? selinux_file_permission+0x7a/0x440 [ 1307.430070] ? rw_verify_area+0xe1/0x2a0 [ 1307.434145] vfs_read+0x131/0x330 [ 1307.437599] SyS_read+0xf2/0x210 [ 1307.440964] ? kernel_write+0x110/0x110 [ 1307.444936] ? SyS_clock_settime+0x1a0/0x1a0 [ 1307.450300] ? do_syscall_64+0x4c/0x640 [ 1307.454271] ? kernel_write+0x110/0x110 [ 1307.458244] do_syscall_64+0x1d5/0x640 [ 1307.462140] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1307.467326] RIP: 0033:0x45c829 [ 1307.470509] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1307.478214] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1307.487649] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1307.494914] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1307.502182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1307.509450] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x40000000d917) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:14 executing program 4 (fault-call:6 fault-nth:61): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) [ 1307.654494] FAULT_INJECTION: forcing a failure. [ 1307.654494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1307.669720] CPU: 0 PID: 31200 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1307.677619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1307.686969] Call Trace: [ 1307.689566] dump_stack+0x13e/0x194 [ 1307.693731] should_fail.cold+0x10a/0x14b [ 1307.697892] __alloc_pages_nodemask+0x1bf/0x700 [ 1307.702566] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1307.707578] ? find_held_lock+0x2d/0x110 [ 1307.711648] alloc_pages_vma+0xc2/0x4a0 [ 1307.715632] __handle_mm_fault+0x17b6/0x3280 [ 1307.720393] ? copy_page_range+0x1d70/0x1d70 [ 1307.725410] ? find_held_lock+0x2d/0x110 [ 1307.730181] handle_mm_fault+0x288/0x7a0 [ 1307.734255] __get_user_pages+0x44d/0x11e0 [ 1307.738530] ? follow_page_mask+0x1580/0x1580 [ 1307.743037] get_user_pages_unlocked+0x1df/0x2e0 [ 1307.747824] ? get_user_pages_locked+0x3d0/0x3d0 [ 1307.752575] ? mark_held_locks+0xa6/0xf0 [ 1307.756636] ? get_user_pages_fast+0x16b/0x2b0 [ 1307.761221] get_user_pages_fast+0x20f/0x2b0 [ 1307.765655] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1307.770408] ? save_trace+0x290/0x290 [ 1307.774213] ? save_trace+0x290/0x290 [ 1307.778037] iov_iter_get_pages+0x203/0xc80 [ 1307.782359] ? __lock_is_held+0xad/0x140 [ 1307.786418] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1307.791355] af_alg_make_sg+0x82/0x3f0 [ 1307.795244] ? sock_kmalloc+0x75/0xc0 [ 1307.799045] ? af_alg_data_wakeup+0x80/0x80 [ 1307.803372] af_alg_get_rsgl+0x1cf/0x510 [ 1307.807442] skcipher_recvmsg+0x766/0xcb0 [ 1307.811592] ? skcipher_release+0x40/0x40 [ 1307.815739] ? skcipher_release+0x40/0x40 [ 1307.820318] sock_recvmsg+0xc0/0x100 [ 1307.824030] sock_read_iter+0x252/0x360 [ 1307.828029] ? sock_recvmsg+0x100/0x100 [ 1307.832017] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1307.836773] ? iov_iter_init+0xa6/0x1c0 [ 1307.840752] __vfs_read+0x44b/0x610 [ 1307.844378] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1307.848963] ? selinux_file_permission+0x7a/0x440 [ 1307.853894] ? rw_verify_area+0xe1/0x2a0 [ 1307.857956] vfs_read+0x131/0x330 [ 1307.861407] SyS_read+0xf2/0x210 [ 1307.864773] ? kernel_write+0x110/0x110 [ 1307.868744] ? SyS_clock_settime+0x1a0/0x1a0 [ 1307.873239] ? do_syscall_64+0x4c/0x640 [ 1307.877205] ? kernel_write+0x110/0x110 [ 1307.881206] do_syscall_64+0x1d5/0x640 [ 1307.885099] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1307.890484] RIP: 0033:0x45c829 [ 1307.893666] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1307.901373] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1307.908638] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1307.915963] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1307.923671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1307.930940] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:15 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0xc5, 0x29, 0x2, {0x0, [{{0x8, 0x4, 0x2}, 0x1, 0x0, 0x7, './file0'}, {{0x10, 0x1, 0x6}, 0xfe, 0x60, 0x7, './file0'}, {{0x0, 0x0, 0x7}, 0xc41, 0x1, 0x7, './file0'}, {{0x4, 0x2, 0x3}, 0x11800, 0x3f, 0x7, './file0'}, {{0x0, 0x1, 0x8}, 0xb0f, 0x0, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x4, 0x7, 0x7, './file0'}]}}, 0xc5) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfe08) r3 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x7, &(0x7f00000000c0)=[{0x5, 0x8b, 0x4, 0x1ff}, {0x5, 0x1, 0x5, 0x6}, {0x6, 0x9, 0x7, 0x8}, {0x4, 0x81, 0x81, 0x527}, {0x9, 0x8, 0x20, 0xa253}, {0x4abd, 0xff, 0x4, 0xd2ab}, {0x3f, 0x8, 0x1, 0x6}]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:29:15 executing program 4 (fault-call:6 fault-nth:62): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000240)={0xffffffff, 0x6, 0x7f, 0xf460}, 0x10) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}, 0x40000}], 0x1, 0x20, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000000), 0x0) recvmmsg(r2, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x4}], 0x1, 0x121, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r5, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x7a1c}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3f}, @NL80211_ATTR_WIPHY_ANTENNA_RX={0x8, 0x6a, 0x101}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x3ff}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000) preadv(r4, &(0x7f00000017c0), 0x315, 0x800000) 10:29:15 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x3, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r1, &(0x7f0000000100)={0x0, 0x62, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0xc4}}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000780)='/dev/vcsa#\x00', 0x7fffffff, 0x90000) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x7c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x9}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) sendto$x25(r0, &(0x7f0000000040)="23b21f7f5a8e61d818e9727699f35c6c897058cd4338325fe2775b28ad8410fb3f1329d3c18726d4f199bda8f51e9fac6c17e8e60742d8bf632c8e7113f5192896fd29f18e54c00d4c0354ca97a8c2bf6108932b63d0e8c564caa0853d32", 0x5e, 0x800, &(0x7f0000000740)={0x9, @remote={[], 0x3}}, 0x12) [ 1308.154807] FAULT_INJECTION: forcing a failure. [ 1308.154807] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1308.170177] CPU: 1 PID: 31223 Comm: syz-executor.4 Not tainted 4.14.177-syzkaller #0 [ 1308.178076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1308.187446] Call Trace: [ 1308.190040] dump_stack+0x13e/0x194 [ 1308.193672] should_fail.cold+0x10a/0x14b [ 1308.197823] __alloc_pages_nodemask+0x1bf/0x700 [ 1308.202494] ? __alloc_pages_slowpath+0x26c0/0x26c0 [ 1308.207507] ? find_held_lock+0x2d/0x110 [ 1308.211578] alloc_pages_vma+0xc2/0x4a0 [ 1308.215557] __handle_mm_fault+0x17b6/0x3280 [ 1308.219967] ? copy_page_range+0x1d70/0x1d70 [ 1308.224377] ? find_held_lock+0x2d/0x110 [ 1308.228449] handle_mm_fault+0x288/0x7a0 [ 1308.232513] __get_user_pages+0x44d/0x11e0 [ 1308.236770] ? follow_page_mask+0x1580/0x1580 [ 1308.241277] get_user_pages_unlocked+0x1df/0x2e0 [ 1308.246037] ? get_user_pages_locked+0x3d0/0x3d0 [ 1308.250791] ? mark_held_locks+0xa6/0xf0 [ 1308.254848] ? get_user_pages_fast+0x16b/0x2b0 [ 1308.259433] get_user_pages_fast+0x20f/0x2b0 [ 1308.263843] ? __get_user_pages_fast+0x2d0/0x2d0 [ 1308.268595] ? save_trace+0x290/0x290 [ 1308.272396] ? save_trace+0x290/0x290 [ 1308.276201] iov_iter_get_pages+0x203/0xc80 [ 1308.280525] ? __lock_is_held+0xad/0x140 [ 1308.284604] ? csum_and_copy_from_iter+0xcb0/0xcb0 [ 1308.289538] af_alg_make_sg+0x82/0x3f0 [ 1308.293424] ? sock_kmalloc+0x75/0xc0 [ 1308.297228] ? af_alg_data_wakeup+0x80/0x80 [ 1308.301562] af_alg_get_rsgl+0x1cf/0x510 [ 1308.305636] skcipher_recvmsg+0x766/0xcb0 [ 1308.309795] ? skcipher_release+0x40/0x40 [ 1308.313946] ? security_socket_recvmsg+0x8b/0xc0 [ 1308.318704] ? skcipher_release+0x40/0x40 [ 1308.322851] sock_recvmsg+0xc0/0x100 [ 1308.326564] sock_read_iter+0x252/0x360 [ 1308.330536] ? sock_recvmsg+0x100/0x100 [ 1308.334520] ? inode_has_perm.isra.0+0x153/0x1d0 [ 1308.339272] ? iov_iter_init+0xa6/0x1c0 [ 1308.343254] __vfs_read+0x44b/0x610 [ 1308.346864] ? vfs_copy_file_range+0x9a0/0x9a0 [ 1308.351446] ? selinux_file_permission+0x7a/0x440 [ 1308.356291] ? rw_verify_area+0xe1/0x2a0 [ 1308.360351] vfs_read+0x131/0x330 [ 1308.363798] SyS_read+0xf2/0x210 [ 1308.367161] ? kernel_write+0x110/0x110 [ 1308.371134] ? SyS_clock_settime+0x1a0/0x1a0 [ 1308.375540] ? do_syscall_64+0x4c/0x640 [ 1308.379683] ? kernel_write+0x110/0x110 [ 1308.383654] do_syscall_64+0x1d5/0x640 [ 1308.388153] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1308.393510] RIP: 0033:0x45c829 [ 1308.396708] RSP: 002b:00007f0d5e28ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1308.404415] RAX: ffffffffffffffda RBX: 00000000004fa800 RCX: 000000000045c829 [ 1308.411682] RDX: 00000000fffffd0d RSI: 0000000020000380 RDI: 0000000000000004 [ 1308.419050] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1308.426315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1308.433584] R13: 0000000000000875 R14: 00000000004c9d3f R15: 00007f0d5e28b6d4 10:29:15 executing program 4 (fault-call:6 fault-nth:63): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x9, &(0x7f00000000c0)=""/43, 0x2b) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) rt_tgsigqueueinfo(r1, r2, 0x13, &(0x7f0000000140)={0x12, 0x7, 0x3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r3, 0xc01064ab, &(0x7f00000000c0)={0x6, 0x800, 0x760}) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r4, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80000001}, 0x80002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) prctl$PR_SET_UNALIGN(0x6, 0x0) 10:29:16 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @broadcast}}) write$tun(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaaaa810000dd6000282a001506030001000000000000000000000000000100000000000000000000000000000001080000000000618f1994705eb74c84cfbebebe9f0316cd8f6b98bef13b9cc9eea43b51e77d41884cb4555c9a957fede9e4f8b146572e83786a98efe0fb8e0a86cdbf3f3f459e441219e1acb3a6bf9b3274e5714aae7d9c9791c3d97d59770cf2e258b03abae62998ab7b3e818336e59b1fdc44caccd249abfb3c0700000000000000b4f42c103ac5ccc1ab2964a212a824a533364d512adf51608e8915d6dd04bd2bf32a645db3d4167509b9cedf07", @ANYRES32=0x41424344, @ANYRES32, @ANYBLOB="5090ffab73147220c197eb001c0d89b9780000ec00000010893bf8f849a301a05ce46c736ab2967fce2bab0adbc8956b0e65cc4de6bc5161a9ee3d"], 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:29:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RSYMLINK(r1, &(0x7f00000000c0)={0x14, 0x11, 0x2, {0x1, 0x0, 0x1}}, 0x14) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfe08) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000380)=""/225, 0xfffffd0d) 10:29:16 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="c40000000906010100000000000000000000000005000100060000009c0007801800018014000240fe809afb72f17095ded4be6c62000000000000000000000000d20006000440000000000c00160508000140acdc14aa1400170076657468315f766c616e000000000000050007008800000014001800767863616e3100000000001b000000000900120000007a32000000000c001b4000000000000080000c00148008000140ac14142b0c001b4000000000000000070c0016805f740140ac14143d0900020073797a30005fc562103afc6e9550d1ae3db7527c34dadf9ccbe09353405e8722523799779e8fcb876023755bba88091fda918e3d0000000086a552d64bb0eef7f2e9f90f04fd73bdf33b7c2c54345b96009436fc638ebc780fb49e7b2009006679aab200987a7ed28bfb3e524cf8de1939dcefa6c2a665d871fa6bf8b89f0e5d104db899a89e3919003d729ed216ccbdddd8935299072d3644bbc1df2587887c906c39f9ec8109142aba7782607972c56934f7feaf36358037852468ffc14235839eea9c93e93a06f71f8a53790accf023e200ae7c31afb43e403080000000009aeefd6dcd1e20325184b27f5eb414656e114e80b6ed86b740c3671682bee2151b4345ee49421b6c62093a7b9f061921a34c4068c500e54610210900000038eae991472fb1a4722db0a36330c904f9b5fa115f80df1b79391fa1f5abe4a96c58b6018bd08fa615a1e2a7ddcd8b3e319c71566e927da630a1d2333604c8bc7961b5f648210694304085fafc05000000a8e575ee2bc5fac7f2cb25c0a24fe09e157dce225e1a90ed1c1b7032380840460ee321559dbf68e7caff6d3c6bbb2fe544860bcbd7f794e4124f0965087fa651957929d6ce1fb8df61ba42cbbf5053562e1e35880b9bf1cb39f2f488a647357947a4bfab41a152f90b14d7f1ca4e0580b453744aae92c9088d1e5fb432da66ce6c2679396d88b4910400d796b2a4ab957156b0a6ce351abbe9e5420f1097c25b41c3baec81b5ec663e35f9072f5bf3854263e0cff3de7acf9049a616591ee492959aa71f51db230054e57340141dab693f0014a386a201d3199f039fc08f9d48529acf6826d5c7bd3bf6fb99e20f54610d74a15a4c96c9b029c9df8b6fd488267814a8a4e92b17efb1cdfee52195e39a47ee04ab93422b204620ea04f33281d09c37c71c0967b49669fddc33305a87ec4830f804191fcf11a4dc4300adf9915d4b5bf3773b99b2fce4d0e750d2b89a1edede4054c86507781bc4c003671d2e3eeea9ea5a6985312901b84920dd426d665502db376336173be732bba42b11ae39f71f4752ab3c76daf750bfcb7efb7e9cc5a69a28404d7f2eaa002b3b5c0e49bc99dbce19eb54da1a8941320302beb160546ae153db382840b547837b82ac7f5ca814eb779721e04277f16f3ab15d5ccdc2110a7e36ae29d878f66a427496022f7febae83396c295761e5cf840000000000000f4410a8d2cb7791e6a132c10a000080000039c85015dbbeb8e0eb2786517e38ebadfa5cd10b92352dab204942efc9e4fc7b4c6c83799ec3a0644d7dfa3caece0b417256efbd48c9d02871f357a3ad143675d184184d9e717f95aee90823f2594a1adce821342a8ff870a572b052408178cbb812adbc67a671e71ffa03584715ec80cbeeb1f36c1bc8e4f417a7c83e3df14f27b69c53bc2d6aa9645a87bf86a8d7254aacafc3471cbe9e5a890ae042335f80fd6a9c983eb24f65fc3de4ab4c6742c54221ae4db8cd8600434e38bdc2b1e12163f473122952526dde415d5fdb5ff00e0200bab0d0814130e4df29365c14fee71ab968ed0ab0124596f82fb28cccae353d96365ae5dc23cf121c6250d1fe8fedd463b79fa0e733c0a7898e57ece9e70e5a9ccfe75b009c561ad68066ef18ec600fad5aa5e9626fcc9d7dd0b42bccff4585aca066b5ebb5dd85115be58a85eb712aee87bf75d30d2f13b292da5a77e86b06025c37a5eaa2f218d4c0b66b0f0f89d35170018a205f17edf62cef0c5011fd890caf880c037dbd75935ba000ed4e578b8acfa9b184a570704c66285dffaa027a2b444a779c1903306985d43ade7ade07096869004821462a224a4e54ceb250705c5109ff7d3d7ebcd6f07998a27e49d7b4cdc616c57aa380cff2eb7d94695cf0b9b396245e93803cc1af2be54b69bedff3836845637a57f6233132accdc1c19064106bd421bbb40f8d3489c4bdfad1618a92efdb89947b45fc75fde82c313596d8b5735ed0d41bc3619b77829e85cf9b5853fcb109acda12f64fec6872124f56c87ef4016c0a41e5cce4295a4d5a35e82c16c865"], 0x1}}, 0x20004030) [ 1309.140552] NOHZ: local_softirq_pending 08 10:29:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000045c0)=[{{&(0x7f0000000000)=@phonet, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/21}, {&(0x7f0000000100)=""/188}, {&(0x7f00000001c0)=""/238}, {&(0x7f00000002c0)=""/229}], 0x0, &(0x7f0000000400)=""/166}, 0x6}, {{&(0x7f00000004c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000540)=""/180}, {&(0x7f0000000640)=""/197}, {&(0x7f0000000740)=""/4096}, {&(0x7f0000001740)=""/63}, {&(0x7f0000001780)=""/205}, {&(0x7f0000001880)=""/106}, {&(0x7f0000001900)=""/154}, {&(0x7f00000019c0)=""/252}, {&(0x7f0000001ac0)=""/158}], 0x0, &(0x7f0000001c40)=""/157}, 0x8}, {{&(0x7f0000001d00)=@vsock={0x28, 0x0, 0x0, @my}, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001d80)=""/18}], 0x0, &(0x7f0000001e00)=""/204}, 0x9}, {{&(0x7f0000001f00)=@l2tp6={0xa, 0x0, 0x0, @private1}, 0x0, &(0x7f0000003240), 0x0, &(0x7f00000032c0)=""/143}, 0x9}, {{&(0x7f0000003380)=@nfc_llcp, 0x0, &(0x7f0000004500)=[{&(0x7f0000003400)=""/21}, {&(0x7f0000003440)=""/4096}, {&(0x7f0000004440)=""/137}], 0x0, &(0x7f0000004540)=""/119}, 0x401}], 0x1, 0x40000003, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) socketpair(0x3, 0x2, 0x1, &(0x7f0000000600)) [ 1309.299198] device bridge_slave_0 left promiscuous mode [ 1309.308157] bridge5: port 1(bridge_slave_0) entered disabled state [ 1309.365107] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1309.372295] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1309.381206] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1309.387935] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1309.400475] batman_adv: batadv0: Removing interface: ipvlan1 [ 1309.411557] device bridge_slave_1 left promiscuous mode [ 1309.417110] bridge0: port 2(bridge_slave_1) entered disabled state [ 1309.463685] device veth1_macvtap left promiscuous mode [ 1309.469874] device veth0_macvtap left promiscuous mode [ 1309.475183] device veth1_vlan left promiscuous mode [ 1309.482770] device veth0_vlan left promiscuous mode [ 1309.702991] bond3 (unregistering): Released all slaves [ 1309.765841] bond2 (unregistering): Released all slaves [ 1309.773752] bond1 (unregistering): Released all slaves [ 1309.861539] device hsr_slave_1 left promiscuous mode [ 1309.903009] device hsr_slave_0 left promiscuous mode [ 1309.958414] team0 (unregistering): Port device team_slave_1 removed [ 1309.970202] team0 (unregistering): Port device team_slave_0 removed [ 1309.980003] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1310.014040] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1310.080734] bond0 (unregistering): Released all slaves [ 1311.939023] ================================================================== [ 1311.946733] BUG: KASAN: use-after-free in xfrm6_tunnel_destroy+0x502/0x5c0 [ 1311.953733] Read of size 8 at addr ffff888089e55c48 by task kworker/0:3/7258 [ 1311.960903] [ 1311.962518] CPU: 0 PID: 7258 Comm: kworker/0:3 Not tainted 4.14.177-syzkaller #0 [ 1311.970033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.979381] Workqueue: events xfrm_state_gc_task [ 1311.984120] Call Trace: [ 1311.986685] dump_stack+0x13e/0x194 [ 1311.990298] ? xfrm6_tunnel_destroy+0x502/0x5c0 [ 1311.994941] print_address_description.cold+0x7c/0x1e2 [ 1312.000211] ? xfrm6_tunnel_destroy+0x502/0x5c0 [ 1312.004857] kasan_report.cold+0xa9/0x2ae [ 1312.009001] xfrm6_tunnel_destroy+0x502/0x5c0 [ 1312.013485] xfrm_state_gc_task+0x4ad/0x7d0 [ 1312.017795] ? xfrm_state_unregister_afinfo+0x190/0x190 [ 1312.023152] process_one_work+0x813/0x1540 [ 1312.027372] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 1312.032132] ? worker_thread+0x15d/0x1070 [ 1312.036260] ? _raw_spin_unlock_irq+0x24/0x80 [ 1312.040735] worker_thread+0x5d1/0x1070 [ 1312.044692] ? process_one_work+0x1540/0x1540 [ 1312.049165] kthread+0x30d/0x420 [ 1312.052514] ? kthread_create_on_node+0xd0/0xd0 [ 1312.057264] ret_from_fork+0x24/0x30 [ 1312.060964] [ 1312.062569] Allocated by task 6364: [ 1312.066217] save_stack+0x32/0xa0 [ 1312.069646] kasan_kmalloc+0xbf/0xe0 [ 1312.073345] kmem_cache_alloc+0x127/0x770 [ 1312.077469] copy_net_ns+0xf7/0x440 [ 1312.081072] create_new_namespaces+0x375/0x730 [ 1312.085626] unshare_nsproxy_namespaces+0xa5/0x1e0 [ 1312.090547] SyS_unshare+0x2ea/0x740 [ 1312.094233] do_syscall_64+0x1d5/0x640 [ 1312.098094] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1312.103253] [ 1312.104855] Freed by task 5: [ 1312.116806] save_stack+0x32/0xa0 [ 1312.120231] kasan_slab_free+0x75/0xc0 [ 1312.124090] kmem_cache_free+0x7c/0x2b0 [ 1312.128047] net_drop_ns+0x63/0x70 [ 1312.131564] cleanup_net+0x4e4/0x820 [ 1312.135250] process_one_work+0x813/0x1540 [ 1312.139564] worker_thread+0x5d1/0x1070 [ 1312.149675] kthread+0x30d/0x420 [ 1312.153016] ret_from_fork+0x24/0x30 [ 1312.156697] [ 1312.158299] The buggy address belongs to the object at ffff888089e54040 [ 1312.158299] which belongs to the cache net_namespace of size 8832 [ 1312.171194] The buggy address is located 7176 bytes inside of [ 1312.171194] 8832-byte region [ffff888089e54040, ffff888089e562c0) [ 1312.183261] The buggy address belongs to the page: [ 1312.188170] page:ffffea0002279500 count:1 mapcount:0 mapping:ffff888089e54040 index:0x0 compound_mapcount: 0 [ 1312.198113] flags: 0xfffe0000008100(slab|head) [ 1312.202675] raw: 00fffe0000008100 ffff888089e54040 0000000000000000 0000000100000001 [ 1312.210536] raw: ffff8880a99ecf48 ffffea00014a3520 ffff8880aa5873c0 0000000000000000 [ 1312.218397] page dumped because: kasan: bad access detected [ 1312.224090] [ 1312.225689] Memory state around the buggy address: [ 1312.230590] ffff888089e55b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1312.237921] ffff888089e55b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1312.245252] >ffff888089e55c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1312.252582] ^ [ 1312.258263] ffff888089e55c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1312.265605] ffff888089e55d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1312.272934] ================================================================== [ 1312.280263] Disabling lock debugging due to kernel taint [ 1312.285925] Kernel panic - not syncing: panic_on_warn set ... [ 1312.285925] [ 1312.293283] CPU: 0 PID: 7258 Comm: kworker/0:3 Tainted: G B 4.14.177-syzkaller #0 [ 1312.302021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.311381] Workqueue: events xfrm_state_gc_task [ 1312.316118] Call Trace: [ 1312.318682] dump_stack+0x13e/0x194 [ 1312.322294] panic+0x1f9/0x42d [ 1312.325456] ? add_taint.cold+0x16/0x16 [ 1312.329407] ? xfrm6_tunnel_destroy+0x502/0x5c0 [ 1312.334047] kasan_end_report+0x43/0x49 [ 1312.337994] kasan_report.cold+0x12f/0x2ae [ 1312.342216] xfrm6_tunnel_destroy+0x502/0x5c0 [ 1312.346684] xfrm_state_gc_task+0x4ad/0x7d0 [ 1312.350991] ? xfrm_state_unregister_afinfo+0x190/0x190 [ 1312.356435] process_one_work+0x813/0x1540 [ 1312.360661] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 1312.365302] ? worker_thread+0x15d/0x1070 [ 1312.369424] ? _raw_spin_unlock_irq+0x24/0x80 [ 1312.373904] worker_thread+0x5d1/0x1070 [ 1312.377871] ? process_one_work+0x1540/0x1540 [ 1312.382337] kthread+0x30d/0x420 [ 1312.385673] ? kthread_create_on_node+0xd0/0xd0 [ 1312.390315] ret_from_fork+0x24/0x30 [ 1312.397369] Kernel Offset: disabled [ 1312.400991] Rebooting in 86400 seconds..