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"}, {0xf0, 0x114, 0x8001, "8448d7ecfac2478aaa2e88fb8983ef4d9dfcec82db5bd4eda17b217352b741c96a1d6e1a2cacfea6f09674736e3c3cd3a22cc428fdfcca6ee674216c8b434fc824d6857c141ebb60548320b66a7dbbf9b54d56ee17858297e434b21081f25731b320dd941e380faf49b568cb2afe08fd3dab3cb0101c6b9a0808d49fcaabb95d043c29ea49b3e647ea7e1716968f7172b63b970beacd0e52a0d84e74428f6552fd1ef33d8c062047802ed0dd89c785c5b67b00d3133b5a4ab3362acb29b0170c5cb945cbb98cf976a6865b8afab75c4dd39c3f5a1b9c330a8812765261c7"}, {0x98, 0x117, 0x5e763366, "1b7a0d198d4ef9018e22a4edc73bd92fc1b7cc98666a3890755562817fa423b407b43acf720acdeba122524867572db43dfb385a3d03d4a9201f10ddf3f6eba54edd55a1665031896c110c43ba8446c37bc4578e6e96e87ca4424bb59d969b327496aa6c87da394820a8f7e85f32f6d8f45c1582f727e1e398bad89533c07ea93ae169b419f66c"}, {0xb0, 0xbca3711debee5f1c, 0xfffffffd, "dc758630e82493e13e92b31302e6fae52a154d6f8a4d044723e2d7faa5dd30f2ed98401854f3dce65908ad6b9e3486aff157e2a25a92ce19fafe2abb067b49f98edfe615da26bd5eca24c9359a70c88261d4874647be30df5a6e19d8630035856305e3fe4230b6d73f0c3b2be7753601266d89a1a2ba88bdb78374486addd96656620666487464511f50193f494accd0c9f75c5c00fd34e436ad54a8e7b5"}], 0x1350}}], 0x1, 0x20004000) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000040)=0x7f) 10:23:31 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xd68d000000000000}, 0x0) 10:23:31 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:31 executing program 5 (fault-call:2 fault-nth:24): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:31 executing program 2 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6e7d) [ 793.898189] audit: type=1804 audit(1578911011.041:84): pid=17098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir641173920/syzkaller.kORoCJ/1969/bus" dev="sda1" ino=16670 res=1 [ 793.924936] audit: type=1804 audit(1578911011.041:85): pid=17098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir641173920/syzkaller.kORoCJ/1969/bus" dev="sda1" ino=16670 res=1 [ 794.002120] FAULT_INJECTION: forcing a failure. [ 794.002120] name failslab, interval 1, probability 0, space 0, times 0 [ 794.030839] encrypted_key: master key parameter is missing [ 794.044894] FAULT_INJECTION: forcing a failure. 10:23:31 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xde30000000000000}, 0x0) [ 794.044894] name failslab, interval 1, probability 0, space 0, times 0 [ 794.059188] CPU: 0 PID: 17128 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 794.067026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.076398] Call Trace: [ 794.079017] dump_stack+0x197/0x210 [ 794.082685] should_fail.cold+0xa/0x1b [ 794.086600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.091729] ? lock_downgrade+0x880/0x880 [ 794.095914] __should_failslab+0x121/0x190 [ 794.100201] should_failslab+0x9/0x14 [ 794.104020] kmem_cache_alloc_node_trace+0x274/0x720 [ 794.109152] ? __alloc_skb+0xd5/0x5f0 [ 794.112973] __kmalloc_node_track_caller+0x3d/0x80 [ 794.117930] __kmalloc_reserve.isra.0+0x40/0xf0 [ 794.122627] __alloc_skb+0x10b/0x5f0 [ 794.126361] ? skb_trim+0x190/0x190 [ 794.130008] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 794.135038] ? skb_put+0x183/0x1e0 [ 794.138593] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 794.143648] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.148000] ? ip6_setup_cork+0x1860/0x1860 10:23:31 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xe682000000000000}, 0x0) [ 794.152334] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 794.157195] ? lock_downgrade+0x880/0x880 [ 794.161358] ip6_make_skb+0x32f/0x561 [ 794.165166] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.169510] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.173858] ? ip6_push_pending_frames+0xf0/0xf0 [ 794.178632] ? find_held_lock+0x35/0x130 [ 794.182716] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 794.187588] ? ip6_dst_lookup_flow+0x220/0x220 [ 794.192185] udpv6_sendmsg+0x225b/0x2a00 [ 794.196271] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.200604] ? udp_v6_get_port+0x6b0/0x6b0 [ 794.204855] ? __local_bh_enable_ip+0x15a/0x270 [ 794.209528] ? _raw_spin_unlock_bh+0x31/0x40 [ 794.213956] ? __local_bh_enable_ip+0x15a/0x270 [ 794.218815] ? mark_held_locks+0x100/0x100 [ 794.223054] ? mark_held_locks+0x100/0x100 [ 794.227286] ? _raw_spin_unlock_bh+0x31/0x40 [ 794.231718] ? release_sock+0x156/0x1c0 [ 794.235804] ? __local_bh_enable_ip+0x15a/0x270 [ 794.240495] ? _raw_spin_unlock_bh+0x31/0x40 [ 794.244931] inet_sendmsg+0x141/0x5d0 [ 794.248743] ? inet_sendmsg+0x141/0x5d0 [ 794.252825] ? ipip_gro_receive+0x100/0x100 [ 794.257170] sock_sendmsg+0xd7/0x130 [ 794.260902] ___sys_sendmsg+0x803/0x920 [ 794.264893] ? copy_msghdr_from_user+0x430/0x430 [ 794.269781] ? lock_downgrade+0x880/0x880 [ 794.273944] ? kasan_check_read+0x11/0x20 [ 794.278106] ? __fget+0x367/0x540 [ 794.281583] ? __fget_light+0x1a9/0x230 [ 794.285555] ? __fdget+0x1b/0x20 [ 794.288932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 794.294565] __sys_sendmsg+0x105/0x1d0 [ 794.298467] ? __ia32_sys_shutdown+0x80/0x80 [ 794.302896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.307658] ? do_syscall_64+0x26/0x620 [ 794.312350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.317852] ? do_syscall_64+0x26/0x620 [ 794.321848] __x64_sys_sendmsg+0x78/0xb0 [ 794.325923] do_syscall_64+0xfd/0x620 [ 794.329747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.334940] RIP: 0033:0x45af49 [ 794.338149] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.357066] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 794.364786] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 794.372060] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 794.379347] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 794.386626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 794.393899] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 [ 794.401192] CPU: 1 PID: 17139 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 794.409011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.418468] Call Trace: [ 794.421083] dump_stack+0x197/0x210 [ 794.424746] should_fail.cold+0xa/0x1b [ 794.428673] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.433800] ? lock_downgrade+0x880/0x880 [ 794.438073] __should_failslab+0x121/0x190 [ 794.442327] should_failslab+0x9/0x14 [ 794.446142] kmem_cache_alloc_node+0x26c/0x710 [ 794.450747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.455530] __alloc_skb+0xd5/0x5f0 [ 794.459178] ? skb_trim+0x190/0x190 [ 794.462826] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 794.467870] ? skb_put+0x183/0x1e0 [ 794.471440] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 794.476485] ? ip6_mtu+0x3d0/0x460 [ 794.480063] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.484433] ? ip6_setup_cork+0x1860/0x1860 [ 794.485446] encrypted_key: master key parameter is missing [ 794.488774] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 794.488793] ? lock_downgrade+0x880/0x880 [ 794.488814] ip6_make_skb+0x32f/0x561 [ 794.488828] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.488853] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.504886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9413 sclass=netlink_route_socket pig=17153 comm=syz-executor.0 [ 794.507260] ? ip6_push_pending_frames+0xf0/0xf0 [ 794.507281] ? find_held_lock+0x35/0x130 [ 794.507299] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 794.507320] ? ip6_dst_lookup_flow+0x220/0x220 [ 794.546509] udpv6_sendmsg+0x225b/0x2a00 [ 794.550609] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.554965] ? udp_v6_get_port+0x6b0/0x6b0 [ 794.559226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.561995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9413 sclass=netlink_route_socket pig=17155 comm=syz-executor.0 [ 794.564173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.564194] ? trace_hardirqs_on_caller+0x6a/0x220 [ 794.564215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.582623] encrypted_key: master key parameter is missing [ 794.586246] ? retint_kernel+0x2d/0x2d [ 794.586273] ? release_sock+0x156/0x1c0 [ 794.586304] ? __local_bh_enable_ip+0x15a/0x270 [ 794.609217] ? _raw_spin_unlock_bh+0x31/0x40 [ 794.613654] inet_sendmsg+0x141/0x5d0 [ 794.617477] ? inet_sendmsg+0x141/0x5d0 [ 794.621470] ? ipip_gro_receive+0x100/0x100 [ 794.625836] sock_sendmsg+0xd7/0x130 [ 794.629565] ___sys_sendmsg+0x803/0x920 [ 794.633567] ? copy_msghdr_from_user+0x430/0x430 [ 794.638349] ? lock_downgrade+0x880/0x880 [ 794.642783] ? kasan_check_read+0x11/0x20 [ 794.646965] ? __fget+0x367/0x540 [ 794.650468] ? __fget_light+0x1a9/0x230 [ 794.654463] ? __fdget+0x1b/0x20 [ 794.655332] encrypted_key: master key parameter is missing [ 794.657853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 794.657876] __sys_sendmsg+0x105/0x1d0 [ 794.657891] ? __ia32_sys_shutdown+0x80/0x80 [ 794.657909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 794.657937] __x64_sys_sendmsg+0x78/0xb0 [ 794.686232] ? do_syscall_64+0x5b/0x620 [ 794.690582] do_syscall_64+0xfd/0x620 [ 794.694503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.699707] RIP: 0033:0x45af49 10:23:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) tee(0xffffffffffffffff, r4, 0x4, 0xf) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000300)=""/185) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="48075f9cc5243d6ee6000000000000000b000000652465015764ebd8796a40bfe365a9040000009c053d61c041cf76be618dfff145d60e2d62424eb2321235a68ded39cef235776adfd1a95e1d28547dd41ed4c7ccaa66c64408efa4e6fd", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="20001200100001006970366772657461700000000c00020008000100", @ANYRES32=r2, @ANYBLOB], 0x48}, 0x1, 0x3e0}, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x28, r8, 0x1, 0x0, 0x0, {0x6}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv0\x00'}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r8, 0x8, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}}, 0x6a800) sendmsg$L2TP_CMD_TUNNEL_DELETE(r6, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x50, r8, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x7}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xe2}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000891}, 0x4401) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x7, 0x7, 0x0, 0x100, 0x1, 0x5, [], r2, r5, 0x2, 0x3}, 0x3c) r9 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r9, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:31 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x5}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x727e) 10:23:31 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:31 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x7}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xe17) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)={0x10001}) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:31 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x60}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 794.702913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.721835] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 794.729563] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 794.733723] encrypted_key: master key parameter is missing [ 794.736847] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:23:32 executing program 5 (fault-call:2 fault-nth:25): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 794.736858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 794.736868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 794.736877] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:32 executing program 2 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:32 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xee25000000000000}, 0x0) 10:23:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x9, 0x6}, 0x20}, 0x10) 10:23:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7620) [ 794.829311] FAULT_INJECTION: forcing a failure. [ 794.829311] name failslab, interval 1, probability 0, space 0, times 0 [ 794.876388] CPU: 1 PID: 17172 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 794.884248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.893618] Call Trace: [ 794.896254] dump_stack+0x197/0x210 [ 794.899909] should_fail.cold+0xa/0x1b [ 794.903824] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.908950] ? lock_downgrade+0x880/0x880 [ 794.913133] __should_failslab+0x121/0x190 [ 794.917389] should_failslab+0x9/0x14 [ 794.921209] kmem_cache_alloc_node+0x26c/0x710 [ 794.925810] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 794.931373] __alloc_skb+0xd5/0x5f0 [ 794.935034] ? skb_trim+0x190/0x190 [ 794.938691] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 794.943819] ? skb_put+0x183/0x1e0 [ 794.947389] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 794.952437] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.956793] ? ip6_setup_cork+0x1860/0x1860 [ 794.961141] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 794.966026] ? lock_downgrade+0x880/0x880 [ 794.970199] ip6_make_skb+0x32f/0x561 [ 794.974031] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.978392] ? ip_reply_glue_bits+0xc0/0xc0 [ 794.982743] ? ip6_push_pending_frames+0xf0/0xf0 [ 794.987527] ? find_held_lock+0x35/0x130 [ 794.991622] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 794.996497] ? ip6_dst_lookup_flow+0x220/0x220 [ 795.001113] udpv6_sendmsg+0x225b/0x2a00 [ 795.005206] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.009560] ? udp_v6_get_port+0x6b0/0x6b0 [ 795.013836] ? __local_bh_enable_ip+0x15a/0x270 [ 795.018527] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.022961] ? __local_bh_enable_ip+0x15a/0x270 [ 795.027665] ? mark_held_locks+0x100/0x100 [ 795.031930] ? mark_held_locks+0x100/0x100 [ 795.036186] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.040633] ? release_sock+0x156/0x1c0 [ 795.044648] ? __local_bh_enable_ip+0x15a/0x270 [ 795.049477] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.053924] inet_sendmsg+0x141/0x5d0 [ 795.057748] ? inet_sendmsg+0x141/0x5d0 [ 795.061790] ? ipip_gro_receive+0x100/0x100 [ 795.066147] sock_sendmsg+0xd7/0x130 [ 795.069892] ___sys_sendmsg+0x803/0x920 [ 795.073893] ? copy_msghdr_from_user+0x430/0x430 [ 795.078684] ? lock_downgrade+0x880/0x880 [ 795.082858] ? kasan_check_read+0x11/0x20 [ 795.087054] ? __fget+0x367/0x540 [ 795.090549] ? __fget_light+0x1a9/0x230 [ 795.094564] ? __fdget+0x1b/0x20 [ 795.097948] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 795.103686] __sys_sendmsg+0x105/0x1d0 [ 795.107595] ? __ia32_sys_shutdown+0x80/0x80 [ 795.112127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.116901] ? do_syscall_64+0x26/0x620 [ 795.120994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.126748] ? do_syscall_64+0x26/0x620 [ 795.130757] __x64_sys_sendmsg+0x78/0xb0 [ 795.134895] do_syscall_64+0xfd/0x620 [ 795.138783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.144007] RIP: 0033:0x45af49 [ 795.147218] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.166231] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:32 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xeed4000000000000}, 0x0) 10:23:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x76cf) 10:23:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) setfsgid(r3) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) setfsgid(r7) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x1}, [{0x2, 0x3, r1}], {0x4, 0x3}, [{0x8, 0x0, r3}, {0x8, 0x4, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r7}], {0x10, 0x1}, {0x20, 0xd6f85948ae91d0bf}}, 0x4c, 0x2) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:32 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9b, 0x200e01) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x303}, "b56a6a8a0d9e03ef", "b32aeb3ae58beeb74185e373ad040cee4731ca7672b65f0da006f5f244d2f356", "e29008ff", "01293f90d9c45b95"}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:32 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xf5ffffff00000000}, 0x0) 10:23:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x77f6) 10:23:32 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffe) [ 795.173983] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 795.181303] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 795.188880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 795.196777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 795.204071] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 10:23:32 executing program 5 (fault-call:2 fault-nth:26): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 795.296043] FAULT_INJECTION: forcing a failure. [ 795.296043] name failslab, interval 1, probability 0, space 0, times 0 [ 795.362818] CPU: 0 PID: 17201 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 795.370657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.380030] Call Trace: [ 795.382730] dump_stack+0x197/0x210 [ 795.386390] should_fail.cold+0xa/0x1b [ 795.390315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 795.395716] __should_failslab+0x121/0x190 [ 795.399985] should_failslab+0x9/0x14 [ 795.403810] kmem_cache_alloc_node_trace+0x274/0x720 [ 795.408169] FAULT_INJECTION: forcing a failure. [ 795.408169] name failslab, interval 1, probability 0, space 0, times 0 [ 795.408929] ? __alloc_skb+0xd5/0x5f0 [ 795.423920] __kmalloc_node_track_caller+0x3d/0x80 [ 795.428877] __kmalloc_reserve.isra.0+0x40/0xf0 [ 795.433574] __alloc_skb+0x10b/0x5f0 [ 795.437319] ? skb_trim+0x190/0x190 [ 795.440965] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 795.445995] ? skb_put+0x183/0x1e0 [ 795.449557] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 795.454599] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.458941] ? ip6_setup_cork+0x1860/0x1860 [ 795.463271] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 795.468119] ? lock_downgrade+0x880/0x880 [ 795.472284] ip6_make_skb+0x32f/0x561 [ 795.476090] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.480434] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.484776] ? ip6_push_pending_frames+0xf0/0xf0 [ 795.489629] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.494406] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 795.499253] ? retint_kernel+0x2d/0x2d [ 795.503149] ? ip6_dst_lookup_flow+0x220/0x220 [ 795.507751] udpv6_sendmsg+0x225b/0x2a00 [ 795.511822] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.516149] ? udp_v6_get_port+0x6b0/0x6b0 [ 795.520388] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.525147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.529904] ? trace_hardirqs_on_caller+0x6a/0x220 [ 795.534839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.539625] ? retint_kernel+0x2d/0x2d [ 795.543897] ? release_sock+0x156/0x1c0 [ 795.547906] ? __local_bh_enable_ip+0x15a/0x270 [ 795.552615] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.557037] inet_sendmsg+0x141/0x5d0 [ 795.560872] ? inet_sendmsg+0x141/0x5d0 [ 795.564856] ? ipip_gro_receive+0x100/0x100 [ 795.569196] sock_sendmsg+0xd7/0x130 [ 795.572918] ___sys_sendmsg+0x803/0x920 [ 795.576892] ? copy_msghdr_from_user+0x430/0x430 [ 795.581659] ? lock_downgrade+0x880/0x880 [ 795.585838] ? kasan_check_read+0x11/0x20 [ 795.589988] ? __fget+0x367/0x540 [ 795.593447] ? __fget_light+0x1a9/0x230 [ 795.597427] ? __fdget+0x1b/0x20 [ 795.600794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 795.606337] __sys_sendmsg+0x105/0x1d0 [ 795.610411] ? __ia32_sys_shutdown+0x80/0x80 [ 795.614852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.619631] ? do_syscall_64+0x26/0x620 [ 795.623623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.628997] ? do_syscall_64+0x26/0x620 [ 795.632972] __x64_sys_sendmsg+0x78/0xb0 [ 795.637037] do_syscall_64+0xfd/0x620 [ 795.640845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.646049] RIP: 0033:0x45af49 [ 795.649241] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.668416] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 795.676125] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 795.683406] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 795.690699] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 795.697991] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 795.705269] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 795.712569] CPU: 1 PID: 17214 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 795.720389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.729855] Call Trace: [ 795.732463] dump_stack+0x197/0x210 [ 795.736280] should_fail.cold+0xa/0x1b [ 795.740188] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 795.745296] ? lock_downgrade+0x880/0x880 [ 795.749458] __should_failslab+0x121/0x190 [ 795.753817] should_failslab+0x9/0x14 [ 795.757623] kmem_cache_alloc_node_trace+0x274/0x720 [ 795.762725] ? __alloc_skb+0xd5/0x5f0 [ 795.766534] __kmalloc_node_track_caller+0x3d/0x80 [ 795.771460] __kmalloc_reserve.isra.0+0x40/0xf0 [ 795.776123] __alloc_skb+0x10b/0x5f0 [ 795.779827] ? skb_trim+0x190/0x190 [ 795.783445] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 795.788494] ? skb_put+0x183/0x1e0 [ 795.792064] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 795.797255] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.801598] ? ip6_setup_cork+0x1860/0x1860 [ 795.805920] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 795.810763] ? lock_downgrade+0x880/0x880 [ 795.814911] ip6_make_skb+0x32f/0x561 [ 795.818734] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.823066] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.827402] ? ip6_push_pending_frames+0xf0/0xf0 [ 795.832179] ? find_held_lock+0x35/0x130 [ 795.836249] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 795.841088] ? ip6_dst_lookup_flow+0x220/0x220 [ 795.845665] udpv6_sendmsg+0x225b/0x2a00 [ 795.849719] ? ip_reply_glue_bits+0xc0/0xc0 [ 795.854044] ? udp_v6_get_port+0x6b0/0x6b0 [ 795.858268] ? __local_bh_enable_ip+0x15a/0x270 [ 795.862930] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.867326] ? __local_bh_enable_ip+0x15a/0x270 [ 795.872000] ? mark_held_locks+0x100/0x100 [ 795.876238] ? mark_held_locks+0x100/0x100 [ 795.880472] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.884925] ? release_sock+0x156/0x1c0 [ 795.888967] ? __local_bh_enable_ip+0x15a/0x270 [ 795.893643] ? _raw_spin_unlock_bh+0x31/0x40 [ 795.898070] inet_sendmsg+0x141/0x5d0 [ 795.901866] ? inet_sendmsg+0x141/0x5d0 [ 795.905829] ? ipip_gro_receive+0x100/0x100 [ 795.910152] sock_sendmsg+0xd7/0x130 [ 795.913866] ___sys_sendmsg+0x803/0x920 [ 795.917839] ? copy_msghdr_from_user+0x430/0x430 [ 795.922584] ? lock_downgrade+0x880/0x880 [ 795.926720] ? kasan_check_read+0x11/0x20 [ 795.930859] ? __fget+0x367/0x540 [ 795.934319] ? __fget_light+0x1a9/0x230 [ 795.938281] ? __fdget+0x1b/0x20 [ 795.941632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 795.947156] __sys_sendmsg+0x105/0x1d0 [ 795.951030] ? __ia32_sys_shutdown+0x80/0x80 [ 795.955447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 795.960190] ? do_syscall_64+0x26/0x620 [ 795.964151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.969588] ? do_syscall_64+0x26/0x620 [ 795.973559] __x64_sys_sendmsg+0x78/0xb0 [ 795.977626] do_syscall_64+0xfd/0x620 [ 795.981426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.986599] RIP: 0033:0x45af49 [ 795.989785] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 796.008686] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 796.016381] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 796.023638] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 796.030904] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 796.038161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 796.045418] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 10:23:33 executing program 2 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:33 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 10:23:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x2, 0x10000, 0x2e4}, &(0x7f00000002c0)=0xffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x9}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000100)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x3e, &(0x7f0000000000)=[{&(0x7f0000000200)="b15ea83a59e21860fe217039dce237716c4ee2def000f6aaf7020a58d94505d30aa0e5a738520f84ed8aa0da3b205d4599f26c71d3a9abae889738804b73eabe283539911f6063db0c42145d344957304d34e4031e54d8cdb772fa197469d54a9c4dffcb7ac0674d946e08c18a47fb0975d6481e9193c7bb17ffd61722ddf36bac5c0288e43eea93f37e118d6fb355031e4591517a20f9e6c834cd2f3d081d0a", 0xa0}], 0x1, &(0x7f0000000180)}, 0x0) 10:23:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7805) 10:23:33 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xf677000000000000}, 0x0) 10:23:33 executing program 5 (fault-call:2 fault-nth:27): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 796.157192] FAULT_INJECTION: forcing a failure. [ 796.157192] name failslab, interval 1, probability 0, space 0, times 0 [ 796.190361] CPU: 0 PID: 17229 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 796.195094] FAULT_INJECTION: forcing a failure. 10:23:33 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756c7473f88a23514a47517ef44875c64cf573b86560a47412bda51f36ce1b55139f769bb61ed80e7c6e562e4f0bfa7f23eec5da1b5e55c8d65df69589d74e5199c700000a4b728c65dcdf162e5732632b4a671ebdddd75909fadfc0ed94da21875a3a382e0a5b9911b7402a0fb77705cc4dc3e320108df53f9ddcc2783347a0acedacfa4755"], 0x1, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7d6e) [ 796.195094] name failslab, interval 1, probability 0, space 0, times 0 [ 796.198201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.198209] Call Trace: [ 796.198235] dump_stack+0x197/0x210 [ 796.198259] should_fail.cold+0xa/0x1b [ 796.198287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 796.198307] ? lock_downgrade+0x880/0x880 [ 796.198333] __should_failslab+0x121/0x190 [ 796.198358] should_failslab+0x9/0x14 [ 796.246430] kmem_cache_alloc_node+0x26c/0x710 [ 796.251036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.256628] __alloc_skb+0xd5/0x5f0 [ 796.260271] ? skb_trim+0x190/0x190 [ 796.263914] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 796.268973] ? skb_put+0x183/0x1e0 [ 796.272552] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 796.277605] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.281962] ? ip6_setup_cork+0x1860/0x1860 [ 796.286309] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 796.291173] ? lock_downgrade+0x880/0x880 [ 796.295348] ip6_make_skb+0x32f/0x561 [ 796.299169] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.303543] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.307936] ? ip6_push_pending_frames+0xf0/0xf0 [ 796.312728] ? find_held_lock+0x35/0x130 [ 796.316826] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 796.321045] encrypted_key: insufficient parameters specified [ 796.321686] ? ip6_dst_lookup_flow+0x220/0x220 [ 796.321714] udpv6_sendmsg+0x225b/0x2a00 [ 796.336168] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.340516] ? udp_v6_get_port+0x6b0/0x6b0 [ 796.341358] encrypted_key: insufficient parameters specified [ 796.344766] ? __local_bh_enable_ip+0x15a/0x270 10:23:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 796.344779] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.344798] ? __local_bh_enable_ip+0x15a/0x270 [ 796.364326] ? mark_held_locks+0x100/0x100 [ 796.368582] ? mark_held_locks+0x100/0x100 [ 796.372821] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.377247] ? release_sock+0x156/0x1c0 [ 796.381253] ? __local_bh_enable_ip+0x15a/0x270 [ 796.385950] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.390385] inet_sendmsg+0x141/0x5d0 [ 796.394215] ? inet_sendmsg+0x141/0x5d0 [ 796.398208] ? ipip_gro_receive+0x100/0x100 [ 796.402566] sock_sendmsg+0xd7/0x130 10:23:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7e72) [ 796.406292] ___sys_sendmsg+0x803/0x920 [ 796.410290] ? copy_msghdr_from_user+0x430/0x430 [ 796.415070] ? lock_downgrade+0x880/0x880 [ 796.419236] ? kasan_check_read+0x11/0x20 [ 796.423405] ? __fget+0x367/0x540 [ 796.426893] ? __fget_light+0x1a9/0x230 [ 796.430891] ? __fdget+0x1b/0x20 [ 796.434283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.439846] __sys_sendmsg+0x105/0x1d0 [ 796.443753] ? __ia32_sys_shutdown+0x80/0x80 [ 796.448203] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 796.453194] ? do_syscall_64+0x26/0x620 [ 796.457194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.462589] ? do_syscall_64+0x26/0x620 [ 796.466579] __x64_sys_sendmsg+0x78/0xb0 [ 796.470650] do_syscall_64+0xfd/0x620 [ 796.474465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.479671] RIP: 0033:0x45af49 [ 796.482870] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:23:33 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="e18695c73b167948ac3b7066271400a8e1013b9d61cf54cec0d54a686d33648a5c5089d9916bbebc2abd68336c598c712d98a7c73d64fdd2d852a066725bd655790a8d77a48ef944735729a887cf8bb822c2fc2556f1b79567809204db213b4df7ef5c7e0a60048ca477e4daae286a45fc7eda056b8ae198ebe057444a15df4cb7aabaac623586e5cb"], 0x1, 0x0) r0 = request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffa) add_key(&(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="4ca646c8c727f71df4a5a3e94caf6efbf5744663ca566a97beb62783b312001a098af7a1b7f7849504504045cb7816552d0782cdb33fc525e3fcaa94a8ff8427eecc7088e4286ce05b5b", 0xffffff8e, r0) umount2(&(0x7f00000000c0)='./file0\x00', 0x8) [ 796.501776] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 796.509512] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 796.516795] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 796.524072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 796.531348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 796.538636] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 [ 796.548093] CPU: 1 PID: 17233 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 796.556014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.565381] Call Trace: [ 796.567995] dump_stack+0x197/0x210 [ 796.571661] should_fail.cold+0xa/0x1b [ 796.575566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 796.580688] ? lock_downgrade+0x880/0x880 [ 796.584969] __should_failslab+0x121/0x190 [ 796.589240] should_failslab+0x9/0x14 [ 796.593060] kmem_cache_alloc_node+0x26c/0x710 [ 796.597666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.603226] __alloc_skb+0xd5/0x5f0 [ 796.606874] ? skb_trim+0x190/0x190 [ 796.610519] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 796.615550] ? skb_put+0x183/0x1e0 [ 796.619111] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 796.624158] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.628521] ? ip6_setup_cork+0x1860/0x1860 [ 796.632859] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 796.637712] ? lock_downgrade+0x880/0x880 [ 796.641883] ip6_make_skb+0x32f/0x561 [ 796.645706] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.650046] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.651131] FAULT_INJECTION: forcing a failure. [ 796.651131] name failslab, interval 1, probability 0, space 0, times 0 [ 796.654384] ? ip6_push_pending_frames+0xf0/0xf0 [ 796.654409] ? find_held_lock+0x35/0x130 [ 796.674418] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 796.679275] ? ip6_dst_lookup_flow+0x220/0x220 [ 796.683856] udpv6_sendmsg+0x225b/0x2a00 [ 796.687919] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.692250] ? udp_v6_get_port+0x6b0/0x6b0 [ 796.696491] ? __local_bh_enable_ip+0x15a/0x270 [ 796.701173] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.705585] ? __local_bh_enable_ip+0x15a/0x270 [ 796.710264] ? mark_held_locks+0x100/0x100 [ 796.714507] ? mark_held_locks+0x100/0x100 [ 796.718735] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.723162] ? release_sock+0x156/0x1c0 [ 796.727154] ? __local_bh_enable_ip+0x15a/0x270 [ 796.731829] ? _raw_spin_unlock_bh+0x31/0x40 [ 796.736240] inet_sendmsg+0x141/0x5d0 [ 796.740046] ? inet_sendmsg+0x141/0x5d0 [ 796.744022] ? ipip_gro_receive+0x100/0x100 [ 796.748344] sock_sendmsg+0xd7/0x130 [ 796.752056] ___sys_sendmsg+0x803/0x920 [ 796.756027] ? copy_msghdr_from_user+0x430/0x430 [ 796.760806] ? lock_downgrade+0x880/0x880 [ 796.764962] ? kasan_check_read+0x11/0x20 [ 796.769196] ? __fget+0x367/0x540 [ 796.772667] ? __fget_light+0x1a9/0x230 [ 796.776685] ? __fdget+0x1b/0x20 [ 796.780055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.785590] __sys_sendmsg+0x105/0x1d0 [ 796.789477] ? __ia32_sys_shutdown+0x80/0x80 [ 796.793895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 796.798652] ? do_syscall_64+0x26/0x620 [ 796.802665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.808045] ? do_syscall_64+0x26/0x620 [ 796.812046] __x64_sys_sendmsg+0x78/0xb0 [ 796.816120] do_syscall_64+0xfd/0x620 [ 796.819933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.825303] RIP: 0033:0x45af49 [ 796.828497] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 796.847394] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:33 executing program 5 (fault-call:2 fault-nth:28): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 796.855098] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 796.862359] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 796.869620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 796.876887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 796.884159] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 796.891460] CPU: 0 PID: 17252 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 796.899275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.908753] Call Trace: [ 796.911364] dump_stack+0x197/0x210 [ 796.915015] should_fail.cold+0xa/0x1b [ 796.918931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 796.924056] ? lock_downgrade+0x880/0x880 [ 796.928230] __should_failslab+0x121/0x190 [ 796.932491] should_failslab+0x9/0x14 [ 796.936793] kmem_cache_alloc_node_trace+0x274/0x720 [ 796.942036] ? __alloc_skb+0xd5/0x5f0 [ 796.946047] __kmalloc_node_track_caller+0x3d/0x80 [ 796.951013] __kmalloc_reserve.isra.0+0x40/0xf0 [ 796.955710] __alloc_skb+0x10b/0x5f0 10:23:34 executing program 2 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:34 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xfe1a000000000000}, 0x0) 10:23:34 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="de20c65f64656661756c74"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in=@dev={0xac, 0x14, 0x14, 0xd}, 0x4e20, 0x84f1, 0x4e20, 0x5, 0xa, 0x80, 0x80, 0x73, r2, r4}, {0x1a, 0x10000, 0xe79, 0x7ff, 0x4, 0x380, 0x1, 0x7}, {0x40, 0x9, 0x8, 0xff}, 0xffff, 0x6e6bb8, 0x0, 0x2, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d4, 0x2b}, 0x2, @in6=@remote, 0x34ff, 0x2, 0x2, 0x3f, 0x10001, 0xaf1}}, 0xe8) 10:23:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x80fe) 10:23:34 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x2, 0xfd, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 796.959451] ? skb_trim+0x190/0x190 [ 796.963100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 796.968137] ? skb_put+0x183/0x1e0 [ 796.971709] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 796.976754] ? ip_reply_glue_bits+0xc0/0xc0 [ 796.981112] ? ip6_setup_cork+0x1860/0x1860 [ 796.985457] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 796.990319] ? lock_downgrade+0x880/0x880 [ 796.994490] ip6_make_skb+0x32f/0x561 [ 796.998311] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.002671] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.007016] ? ip6_push_pending_frames+0xf0/0xf0 [ 797.011790] ? find_held_lock+0x35/0x130 [ 797.015882] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 797.020748] ? ip6_dst_lookup_flow+0x220/0x220 [ 797.025358] udpv6_sendmsg+0x225b/0x2a00 [ 797.029448] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.033798] ? udp_v6_get_port+0x6b0/0x6b0 [ 797.038081] ? __local_bh_enable_ip+0x15a/0x270 [ 797.042770] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.047224] ? __local_bh_enable_ip+0x15a/0x270 [ 797.053322] ? mark_held_locks+0x100/0x100 [ 797.057582] ? mark_held_locks+0x100/0x100 [ 797.061837] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.065386] FAULT_INJECTION: forcing a failure. [ 797.065386] name failslab, interval 1, probability 0, space 0, times 0 [ 797.066274] ? release_sock+0x156/0x1c0 [ 797.066307] ? __local_bh_enable_ip+0x15a/0x270 [ 797.086107] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.090535] inet_sendmsg+0x141/0x5d0 [ 797.094346] ? inet_sendmsg+0x141/0x5d0 [ 797.098333] ? ipip_gro_receive+0x100/0x100 [ 797.102680] sock_sendmsg+0xd7/0x130 [ 797.106423] ___sys_sendmsg+0x803/0x920 [ 797.110424] ? copy_msghdr_from_user+0x430/0x430 [ 797.115210] ? lock_downgrade+0x880/0x880 [ 797.119379] ? kasan_check_read+0x11/0x20 [ 797.123548] ? __fget+0x367/0x540 [ 797.127032] ? __fget_light+0x1a9/0x230 [ 797.131018] ? __fdget+0x1b/0x20 [ 797.134393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.139965] __sys_sendmsg+0x105/0x1d0 [ 797.144141] ? __ia32_sys_shutdown+0x80/0x80 [ 797.148746] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 797.153508] ? do_syscall_64+0x26/0x620 [ 797.157513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.162904] ? do_syscall_64+0x26/0x620 [ 797.166987] __x64_sys_sendmsg+0x78/0xb0 [ 797.171064] do_syscall_64+0xfd/0x620 [ 797.174877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.180077] RIP: 0033:0x45af49 [ 797.183287] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 797.202200] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 797.209929] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 797.217205] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 797.224486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 797.227842] encrypted_key: master key parameter 'Æ_default' is invalid [ 797.231756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 797.231766] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 [ 797.261765] CPU: 1 PID: 17263 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 797.269612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.279025] Call Trace: [ 797.281679] dump_stack+0x197/0x210 [ 797.285337] should_fail.cold+0xa/0x1b [ 797.285567] encrypted_key: master key parameter 'Æ_default' is invalid [ 797.289255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 797.289275] ? lock_downgrade+0x880/0x880 [ 797.289299] __should_failslab+0x121/0x190 [ 797.289314] should_failslab+0x9/0x14 [ 797.289334] kmem_cache_alloc_node_trace+0x274/0x720 [ 797.318360] ? __alloc_skb+0xd5/0x5f0 [ 797.322197] __kmalloc_node_track_caller+0x3d/0x80 [ 797.327160] __kmalloc_reserve.isra.0+0x40/0xf0 [ 797.331866] __alloc_skb+0x10b/0x5f0 [ 797.335735] ? skb_trim+0x190/0x190 [ 797.339378] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 797.339609] FAULT_INJECTION: forcing a failure. [ 797.339609] name failslab, interval 1, probability 0, space 0, times 0 [ 797.344407] ? skb_put+0x183/0x1e0 [ 797.344429] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 797.344456] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.368487] ? ip6_setup_cork+0x1860/0x1860 [ 797.372811] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 797.377647] ? lock_downgrade+0x880/0x880 [ 797.381815] ip6_make_skb+0x32f/0x561 [ 797.385632] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.389956] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.394273] ? ip6_push_pending_frames+0xf0/0xf0 [ 797.399036] ? find_held_lock+0x35/0x130 [ 797.403103] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 797.407951] ? ip6_dst_lookup_flow+0x220/0x220 [ 797.412536] udpv6_sendmsg+0x225b/0x2a00 [ 797.416596] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.420929] ? udp_v6_get_port+0x6b0/0x6b0 [ 797.425159] ? __local_bh_enable_ip+0x15a/0x270 [ 797.429821] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.434230] ? __local_bh_enable_ip+0x15a/0x270 [ 797.438916] ? mark_held_locks+0x100/0x100 [ 797.443146] ? mark_held_locks+0x100/0x100 [ 797.447373] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.451788] ? release_sock+0x156/0x1c0 [ 797.455795] ? __local_bh_enable_ip+0x15a/0x270 [ 797.460462] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.464880] inet_sendmsg+0x141/0x5d0 [ 797.468688] ? inet_sendmsg+0x141/0x5d0 [ 797.472658] ? ipip_gro_receive+0x100/0x100 [ 797.476974] sock_sendmsg+0xd7/0x130 [ 797.480692] ___sys_sendmsg+0x803/0x920 [ 797.484662] ? copy_msghdr_from_user+0x430/0x430 [ 797.489416] ? lock_downgrade+0x880/0x880 [ 797.493559] ? kasan_check_read+0x11/0x20 [ 797.497705] ? __fget+0x367/0x540 [ 797.501164] ? __fget_light+0x1a9/0x230 [ 797.505143] ? __fdget+0x1b/0x20 [ 797.508514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.514065] __sys_sendmsg+0x105/0x1d0 [ 797.518011] ? __ia32_sys_shutdown+0x80/0x80 [ 797.522450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 797.527400] ? do_syscall_64+0x26/0x620 [ 797.531375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.536744] ? do_syscall_64+0x26/0x620 [ 797.540717] __x64_sys_sendmsg+0x78/0xb0 [ 797.544772] do_syscall_64+0xfd/0x620 [ 797.548580] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.553767] RIP: 0033:0x45af49 [ 797.556956] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 797.575847] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 797.583561] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 797.590829] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 797.598091] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 797.605351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:23:34 executing program 5 (fault-call:2 fault-nth:29): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 797.612623] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 797.619904] CPU: 0 PID: 17274 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 797.627892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.637256] Call Trace: [ 797.639868] dump_stack+0x197/0x210 [ 797.643525] should_fail.cold+0xa/0x1b [ 797.647445] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 797.652570] ? lock_downgrade+0x880/0x880 [ 797.656750] __should_failslab+0x121/0x190 10:23:34 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$bt_cmtp(0x1f, 0x3, 0x5) 10:23:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x82e6) 10:23:34 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xfe80000000000000}, 0x0) 10:23:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000200)={0x1, "fe74778a2295102a1e4d40773e602b6608a421104b7ab9bcfb04dc9a0c70ff1b3e3634cbdf358a74924bdb6d73acc633460b964c4fbd9e80e26c74b2c924b8a6b77c0f08a740b58e61b8bcd9b6bbaedf7a83c1f8ac613e96941ef3cfefce84a2d06ec6300f4178930e70577710eca7bc97e76d8b094a26b351cd2ffa2fe8344b"}) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 797.661013] should_failslab+0x9/0x14 [ 797.664832] kmem_cache_alloc_node+0x26c/0x710 [ 797.669444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.675012] __alloc_skb+0xd5/0x5f0 [ 797.678664] ? skb_trim+0x190/0x190 [ 797.682310] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 797.687341] ? skb_put+0x183/0x1e0 [ 797.690902] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 797.695943] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.700302] ? ip6_setup_cork+0x1860/0x1860 [ 797.704651] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 797.709514] ? lock_downgrade+0x880/0x880 [ 797.713685] ip6_make_skb+0x32f/0x561 [ 797.717503] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.721854] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.726205] ? ip6_push_pending_frames+0xf0/0xf0 [ 797.730977] ? find_held_lock+0x35/0x130 [ 797.735063] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 797.735678] encrypted_key: master key parameter is missing [ 797.739918] ? ip6_dst_lookup_flow+0x220/0x220 [ 797.739943] udpv6_sendmsg+0x225b/0x2a00 [ 797.739966] ? ip_reply_glue_bits+0xc0/0xc0 [ 797.739987] ? udp_v6_get_port+0x6b0/0x6b0 10:23:35 executing program 2 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:35 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xfec9000000000000}, 0x0) [ 797.740008] ? __local_bh_enable_ip+0x15a/0x270 [ 797.740026] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.766653] encrypted_key: master key parameter is missing [ 797.767576] ? __local_bh_enable_ip+0x15a/0x270 [ 797.767604] ? mark_held_locks+0x100/0x100 [ 797.767621] ? mark_held_locks+0x100/0x100 [ 797.767636] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.767665] ? release_sock+0x156/0x1c0 [ 797.767697] ? __local_bh_enable_ip+0x15a/0x270 [ 797.767713] ? _raw_spin_unlock_bh+0x31/0x40 [ 797.767734] inet_sendmsg+0x141/0x5d0 [ 797.812111] ? inet_sendmsg+0x141/0x5d0 [ 797.816106] ? ipip_gro_receive+0x100/0x100 [ 797.820453] sock_sendmsg+0xd7/0x130 [ 797.824190] ___sys_sendmsg+0x803/0x920 [ 797.828193] ? copy_msghdr_from_user+0x430/0x430 [ 797.832977] ? lock_downgrade+0x880/0x880 [ 797.837160] ? kasan_check_read+0x11/0x20 [ 797.841323] ? __fget+0x367/0x540 [ 797.844871] ? __fget_light+0x1a9/0x230 [ 797.848865] ? __fdget+0x1b/0x20 [ 797.852249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.857812] __sys_sendmsg+0x105/0x1d0 [ 797.861714] ? __ia32_sys_shutdown+0x80/0x80 [ 797.866152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 797.870933] ? do_syscall_64+0x26/0x620 [ 797.874926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.880312] ? do_syscall_64+0x26/0x620 [ 797.884315] __x64_sys_sendmsg+0x78/0xb0 [ 797.888405] do_syscall_64+0xfd/0x620 [ 797.890589] FAULT_INJECTION: forcing a failure. [ 797.890589] name failslab, interval 1, probability 0, space 0, times 0 [ 797.892225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.892239] RIP: 0033:0x45af49 10:23:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1, @ANYRESDEC], 0x2, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 797.892253] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 797.892270] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 797.938451] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 797.945741] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 797.953027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 797.960932] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 [ 797.968230] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 [ 797.979331] CPU: 1 PID: 17289 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 797.987162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.996529] Call Trace: [ 797.999146] dump_stack+0x197/0x210 [ 798.002805] should_fail.cold+0xa/0x1b [ 798.006732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 798.012436] ? lock_downgrade+0x880/0x880 [ 798.016620] __should_failslab+0x121/0x190 [ 798.020876] should_failslab+0x9/0x14 [ 798.024690] kmem_cache_alloc_node+0x26c/0x710 [ 798.029294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 798.034865] __alloc_skb+0xd5/0x5f0 [ 798.038519] ? skb_trim+0x190/0x190 [ 798.042169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 798.047203] ? skb_put+0x183/0x1e0 [ 798.050774] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 798.055910] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.060260] ? ip6_setup_cork+0x1860/0x1860 [ 798.064612] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 798.069472] ? lock_downgrade+0x880/0x880 [ 798.073634] ip6_make_skb+0x32f/0x561 [ 798.077443] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.081788] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.086143] ? ip6_push_pending_frames+0xf0/0xf0 [ 798.090922] ? find_held_lock+0x35/0x130 [ 798.095015] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 798.099909] ? ip6_dst_lookup_flow+0x220/0x220 [ 798.104524] udpv6_sendmsg+0x225b/0x2a00 [ 798.108617] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.112966] ? udp_v6_get_port+0x6b0/0x6b0 [ 798.117212] ? __local_bh_enable_ip+0x15a/0x270 [ 798.121899] ? _raw_spin_unlock_bh+0x31/0x40 [ 798.126329] ? __local_bh_enable_ip+0x15a/0x270 [ 798.131034] ? mark_held_locks+0x100/0x100 [ 798.135293] ? mark_held_locks+0x100/0x100 [ 798.139551] ? _raw_spin_unlock_bh+0x31/0x40 [ 798.144003] ? release_sock+0x156/0x1c0 [ 798.148017] ? __local_bh_enable_ip+0x15a/0x270 [ 798.152720] ? _raw_spin_unlock_bh+0x31/0x40 [ 798.157150] inet_sendmsg+0x141/0x5d0 [ 798.160972] ? inet_sendmsg+0x141/0x5d0 [ 798.164973] ? ipip_gro_receive+0x100/0x100 [ 798.167391] encrypted_key: insufficient parameters specified [ 798.169315] sock_sendmsg+0xd7/0x130 [ 798.169337] ___sys_sendmsg+0x803/0x920 [ 798.169360] ? copy_msghdr_from_user+0x430/0x430 [ 798.169382] ? lock_downgrade+0x880/0x880 [ 798.169403] ? kasan_check_read+0x11/0x20 [ 798.195899] ? __fget+0x367/0x540 [ 798.199391] ? __fget_light+0x1a9/0x230 [ 798.203399] ? __fdget+0x1b/0x20 [ 798.206793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 798.212352] __sys_sendmsg+0x105/0x1d0 [ 798.216268] ? __ia32_sys_shutdown+0x80/0x80 [ 798.220714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 798.225616] ? do_syscall_64+0x26/0x620 [ 798.229622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.235017] ? do_syscall_64+0x26/0x620 [ 798.239208] __x64_sys_sendmsg+0x78/0xb0 [ 798.243293] do_syscall_64+0xfd/0x620 [ 798.247132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.252781] RIP: 0033:0x45af49 10:23:35 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xff020300a0000000}, 0x0) 10:23:35 executing program 5 (fault-call:2 fault-nth:30): recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:35 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e46d879de20807c4e451da34adff20e200800d74ba64ab0362932bc07e2858f3700"/44], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r4, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={r4, 0xd7, "1d4ae97930a4e5e2be31c99d24dd4d76c3cd209dc2cd04a1a8e83a829d0cf7b8371298d5f03f24ff83046c13bbab3a6a2f31b5fa8b24d7832675bf80e397f337cc6297e3fba594a7c03789ef9b052d762624e8595c6007c08061c9c8b485586954cb10f2e778c1e74bf129e5b72d34f223293164d1a367d8ed421cba77314eeb6d7fc01125c7047e20905b51c3db56ef09cdf18e5ea919e0368b06801beae7415b5dc7d4c243a29d85b242f4df564346bd21a3527427bdcf54e15aedd1ef4222718c9b5ac7fe3508fe5fcdc06a78c1fad4bc6b04b9cb5c"}, &(0x7f00000001c0)=0xdf) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 798.255992] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.267050] encrypted_key: insufficient parameters specified [ 798.275345] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 798.275361] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 798.275369] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 798.275377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:23:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8615) 10:23:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @remote, 0xd}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x0) 10:23:35 executing program 2 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 798.275384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 798.275393] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 798.287781] FAULT_INJECTION: forcing a failure. [ 798.287781] name failslab, interval 1, probability 0, space 0, times 0 10:23:35 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xffffff7f00000000}, 0x0) 10:23:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x86c4) 10:23:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x18040, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x109000, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000200)=0x200, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0xd1d}, @window={0x3, 0x9, 0x6}, @window={0x3, 0x101, 0x1ff}, @mss={0x2, 0x4283b519}, @mss={0x2, 0x1}, @mss={0x2, 0x7c}, @sack_perm, @timestamp, @timestamp], 0x9) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000002c0)={0xffff, '1~\v'}, 0x6) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r0, 0x40044104, &(0x7f0000000240)=0xaf13) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x10000, @remote, 0xd}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180)}, 0x0) [ 798.477005] encrypted_key: insufficient parameters specified [ 798.486836] FAULT_INJECTION: forcing a failure. [ 798.486836] name failslab, interval 1, probability 0, space 0, times 0 [ 798.517330] CPU: 0 PID: 17325 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 798.525207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.534572] Call Trace: [ 798.537181] dump_stack+0x197/0x210 [ 798.540833] should_fail.cold+0xa/0x1b [ 798.544800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 798.544821] ? lock_downgrade+0x880/0x880 [ 798.554083] __should_failslab+0x121/0x190 [ 798.558342] should_failslab+0x9/0x14 [ 798.562153] kmem_cache_alloc_node_trace+0x274/0x720 10:23:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8001, 0x7}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) statx(r3, &(0x7f0000000280)='./file0\x00', 0xe00b679c81db71fc, 0x7ff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000003c0)=[r1, r4, 0xee00]) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000140)={0x11, @multicast1, 0x4e24, 0x1, 'none\x00', 0x8, 0x400, 0x78}, 0x2c) preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$P9_RMKDIR(r6, &(0x7f0000000440)={0x14, 0x49, 0x2, {0x20, 0x1}}, 0x14) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r7, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r8, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 798.567294] ? __alloc_skb+0xd5/0x5f0 [ 798.567319] __kmalloc_node_track_caller+0x3d/0x80 [ 798.567336] __kmalloc_reserve.isra.0+0x40/0xf0 [ 798.567350] __alloc_skb+0x10b/0x5f0 [ 798.567375] ? skb_trim+0x190/0x190 [ 798.567392] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 798.567403] ? skb_put+0x183/0x1e0 [ 798.567426] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 798.567452] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.567478] ? ip6_setup_cork+0x1860/0x1860 [ 798.567496] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 798.567512] ? lock_downgrade+0x880/0x880 [ 798.567531] ip6_make_skb+0x32f/0x561 [ 798.567545] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.567565] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.567584] ? ip6_push_pending_frames+0xf0/0xf0 [ 798.567607] ? retint_kernel+0x2d/0x2d [ 798.567633] udpv6_sendmsg+0x225b/0x2a00 [ 798.567656] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.567680] ? udp_v6_get_port+0x6b0/0x6b0 [ 798.567697] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 798.567714] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:23:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x885e) [ 798.567733] ? trace_hardirqs_on_caller+0x6a/0x220 [ 798.567754] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 798.673352] ? release_sock+0x156/0x1c0 [ 798.677339] ? __local_bh_enable_ip+0x15a/0x270 [ 798.682024] ? _raw_spin_unlock_bh+0x31/0x40 [ 798.686467] inet_sendmsg+0x141/0x5d0 [ 798.690292] ? inet_sendmsg+0x141/0x5d0 [ 798.694284] ? ipip_gro_receive+0x100/0x100 [ 798.698615] sock_sendmsg+0xd7/0x130 [ 798.702364] ___sys_sendmsg+0x803/0x920 [ 798.706368] ? copy_msghdr_from_user+0x430/0x430 [ 798.711150] ? lock_downgrade+0x880/0x880 [ 798.715313] ? kasan_check_read+0x11/0x20 [ 798.719464] ? __fget+0x367/0x540 [ 798.722941] ? __fget_light+0x1a9/0x230 [ 798.726912] ? __fdget+0x1b/0x20 [ 798.730277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 798.735825] __sys_sendmsg+0x105/0x1d0 [ 798.739718] ? __ia32_sys_shutdown+0x80/0x80 [ 798.744130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 798.748913] __x64_sys_sendmsg+0x78/0xb0 [ 798.753005] do_syscall_64+0xfd/0x620 [ 798.756807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.761987] RIP: 0033:0x45af49 [ 798.765176] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.784073] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 798.791778] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 798.799057] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 798.806335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 798.813602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 798.820984] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 798.831239] CPU: 1 PID: 17310 Comm: syz-executor.5 Not tainted 4.19.95-syzkaller #0 [ 798.839079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 798.848447] Call Trace: [ 798.851037] dump_stack+0x197/0x210 [ 798.854679] should_fail.cold+0xa/0x1b [ 798.858589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 798.863705] ? lock_downgrade+0x880/0x880 [ 798.867871] __should_failslab+0x121/0x190 [ 798.872132] should_failslab+0x9/0x14 [ 798.875963] kmem_cache_alloc_node_trace+0x274/0x720 [ 798.881075] ? __alloc_skb+0xd5/0x5f0 [ 798.884940] __kmalloc_node_track_caller+0x3d/0x80 [ 798.889890] __kmalloc_reserve.isra.0+0x40/0xf0 [ 798.894580] __alloc_skb+0x10b/0x5f0 [ 798.898322] ? skb_trim+0x190/0x190 [ 798.902077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 798.907095] ? skb_put+0x183/0x1e0 [ 798.910655] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 798.915834] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.920184] ? ip6_setup_cork+0x1860/0x1860 [ 798.924533] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 798.929393] ? lock_downgrade+0x880/0x880 [ 798.933557] ip6_make_skb+0x32f/0x561 [ 798.937390] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.941740] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.946076] ? ip6_push_pending_frames+0xf0/0xf0 [ 798.950840] ? find_held_lock+0x35/0x130 [ 798.954938] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 798.959807] ? ip6_dst_lookup_flow+0x220/0x220 [ 798.964390] udpv6_sendmsg+0x225b/0x2a00 [ 798.968464] ? ip_reply_glue_bits+0xc0/0xc0 [ 798.972803] ? udp_v6_get_port+0x6b0/0x6b0 [ 798.977042] ? __local_bh_enable_ip+0x15a/0x270 [ 798.981701] ? _raw_spin_unlock_bh+0x31/0x40 [ 798.986113] ? __local_bh_enable_ip+0x15a/0x270 [ 798.990787] ? mark_held_locks+0x100/0x100 [ 798.995017] ? mark_held_locks+0x100/0x100 [ 798.999245] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.003656] ? release_sock+0x156/0x1c0 [ 799.007635] ? __local_bh_enable_ip+0x15a/0x270 [ 799.012297] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.016793] inet_sendmsg+0x141/0x5d0 [ 799.020671] ? inet_sendmsg+0x141/0x5d0 [ 799.024636] ? ipip_gro_receive+0x100/0x100 [ 799.028961] sock_sendmsg+0xd7/0x130 [ 799.033016] ___sys_sendmsg+0x803/0x920 [ 799.036993] ? copy_msghdr_from_user+0x430/0x430 [ 799.041772] ? lock_downgrade+0x880/0x880 [ 799.045919] ? kasan_check_read+0x11/0x20 [ 799.050075] ? __fget+0x367/0x540 [ 799.053543] ? __fget_light+0x1a9/0x230 [ 799.057513] ? __fdget+0x1b/0x20 [ 799.060869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 799.066422] __sys_sendmsg+0x105/0x1d0 [ 799.070700] ? __ia32_sys_shutdown+0x80/0x80 [ 799.075115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 799.079882] ? do_syscall_64+0x26/0x620 [ 799.083857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.089233] ? do_syscall_64+0x26/0x620 [ 799.093208] __x64_sys_sendmsg+0x78/0xb0 [ 799.097283] do_syscall_64+0xfd/0x620 [ 799.101086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.106277] RIP: 0033:0x45af49 [ 799.109466] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 799.128466] RSP: 002b:00007f3d002c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 799.136173] RAX: ffffffffffffffda RBX: 00007f3d002c9c90 RCX: 000000000045af49 [ 799.143541] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 799.150820] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 799.158165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d002ca6d4 10:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xffffffff00000000}, 0x0) 10:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8dd6) [ 799.165425] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 10:23:36 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:36 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756c746f3f500f346c3acc8517e400191851483a00fd9a19a9896d5f94b820b59d5204d76a7312cab2c8de000000000000002ef2731053aef23c6b7199e95b540db0ed785e60fa904989b8ecf00fdbf15f18a5d5bb93360c701f4fdec38dd449049c79ff46f5c57305c63bf8a00c8a22e7ac6884ed8732ac97f789ea33fe1a078d9843004fab5f5e99"], 0x1, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8e67) 10:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:36 executing program 2 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2}, 0x0) [ 799.321726] encrypted_key: insufficient parameters specified 10:23:36 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x934e) [ 799.455327] FAULT_INJECTION: forcing a failure. [ 799.455327] name failslab, interval 1, probability 0, space 0, times 0 [ 799.523370] CPU: 0 PID: 17372 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 799.531233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 799.540610] Call Trace: [ 799.543226] dump_stack+0x197/0x210 [ 799.546900] should_fail.cold+0xa/0x1b [ 799.550829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 799.555962] ? lock_downgrade+0x880/0x880 [ 799.560144] __should_failslab+0x121/0x190 [ 799.564404] should_failslab+0x9/0x14 [ 799.568227] kmem_cache_alloc_node+0x26c/0x710 [ 799.572840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 799.578408] __alloc_skb+0xd5/0x5f0 [ 799.582147] ? skb_trim+0x190/0x190 [ 799.585798] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 799.590842] ? skb_put+0x183/0x1e0 [ 799.594399] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 799.599460] ? ip_reply_glue_bits+0xc0/0xc0 [ 799.603821] ? ip6_setup_cork+0x1860/0x1860 [ 799.608174] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 799.613037] ? lock_downgrade+0x880/0x880 [ 799.617211] ip6_make_skb+0x32f/0x561 [ 799.621032] ? ip_reply_glue_bits+0xc0/0xc0 [ 799.625382] ? ip_reply_glue_bits+0xc0/0xc0 [ 799.629825] ? ip6_push_pending_frames+0xf0/0xf0 [ 799.634605] ? find_held_lock+0x35/0x130 [ 799.638799] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 799.643668] ? ip6_dst_lookup_flow+0x220/0x220 [ 799.648342] udpv6_sendmsg+0x225b/0x2a00 [ 799.652453] ? ip_reply_glue_bits+0xc0/0xc0 [ 799.656805] ? udp_v6_get_port+0x6b0/0x6b0 [ 799.661063] ? __local_bh_enable_ip+0x15a/0x270 [ 799.665756] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.670186] ? __local_bh_enable_ip+0x15a/0x270 [ 799.674892] ? mark_held_locks+0x100/0x100 [ 799.679162] ? mark_held_locks+0x100/0x100 [ 799.683431] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.687870] ? release_sock+0x156/0x1c0 [ 799.691882] ? __local_bh_enable_ip+0x15a/0x270 [ 799.696571] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.701005] inet_sendmsg+0x141/0x5d0 [ 799.704822] ? inet_sendmsg+0x141/0x5d0 [ 799.708814] ? ipip_gro_receive+0x100/0x100 [ 799.713159] sock_sendmsg+0xd7/0x130 [ 799.716899] ___sys_sendmsg+0x803/0x920 [ 799.720908] ? copy_msghdr_from_user+0x430/0x430 [ 799.725694] ? lock_downgrade+0x880/0x880 [ 799.729869] ? kasan_check_read+0x11/0x20 [ 799.734042] ? __fget+0x367/0x540 [ 799.737532] ? __fget_light+0x1a9/0x230 [ 799.741527] ? __fdget+0x1b/0x20 [ 799.744917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 799.750483] __sys_sendmsg+0x105/0x1d0 [ 799.754386] ? __ia32_sys_shutdown+0x80/0x80 [ 799.758826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 799.763603] ? do_syscall_64+0x26/0x620 [ 799.767595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.773106] ? do_syscall_64+0x26/0x620 [ 799.777107] __x64_sys_sendmsg+0x78/0xb0 [ 799.781189] do_syscall_64+0xfd/0x620 [ 799.785009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 799.790206] RIP: 0033:0x45af49 [ 799.793420] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 799.812357] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$9p(r1, &(0x7f0000000000)="bfd80c435252999bcb4acb69b1c657f920519fdc88fe40d161790bd9512dca1f03b651ba65d5aa2ba5cad45865dd0649325ab9525b462d4bf164095032ecb0810069b1888bf6024453b1492df9dcfdea14ef02c56bc7ea13240164c81b37b281", 0x60) 10:23:36 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r1) r2 = getegid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0xc, 0x0, 0xffffffffffffffff, r5) setfsgid(r5) r6 = gettid() ptrace$setopts(0xffffffffffffffff, r6, 0x0, 0x0) r7 = creat(&(0x7f00000007c0)='./file0\x00', 0x4) getsockopt$bt_BT_SECURITY(r7, 0x112, 0x4, &(0x7f0000000800), 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r7, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x3, r1, r2, r3, r5, 0x40, 0x9}, 0x42, 0x8001, 0x7fffffff, 0xa3e2, r6, r8, 0xe74}) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 10:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3}, 0x0) 10:23:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x24ca5043e41be605}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x5, 0x4000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000180)={0x1000, 0x0, 0x0, 0xbae7, 0x3, {0x8, 0x3}}) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x40, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x21}, 0xac1c87b568bac078) 10:23:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x960a) 10:23:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4}, 0x0) 10:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x96b9) 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5}, 0x0) [ 799.820095] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 799.827385] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 799.834676] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 799.841966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 799.849258] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:37 executing program 2 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x98c6) [ 799.876962] encrypted_key: master key parameter is missing 10:23:37 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x3, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) lseek(0xffffffffffffffff, 0x81, 0x1) 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6}, 0x0) [ 799.980130] encrypted_key: master key parameter is missing [ 800.005937] FAULT_INJECTION: forcing a failure. [ 800.005937] name failslab, interval 1, probability 0, space 0, times 0 [ 800.027859] CPU: 1 PID: 17413 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 800.035709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.045174] Call Trace: [ 800.047792] dump_stack+0x197/0x210 [ 800.051449] should_fail.cold+0xa/0x1b [ 800.055369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.060495] ? __lock_is_held+0x140/0x140 [ 800.064673] __should_failslab+0x121/0x190 [ 800.068955] should_failslab+0x9/0x14 [ 800.072771] kmem_cache_alloc_node_trace+0x274/0x720 10:23:37 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000080)="1cfe2e50a12ab1dfa092255a03a1c508bf4704c5f207a01ab286114cd11517dca7aba24bfcc86193fa63461d79544e0c7bfa38439f8818e1ea", 0x39, 0xfffffffffffffff8) keyctl$instantiate(0xc, r0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 800.077897] ? __alloc_skb+0xd5/0x5f0 [ 800.081738] __kmalloc_node_track_caller+0x3d/0x80 [ 800.086697] __kmalloc_reserve.isra.0+0x40/0xf0 [ 800.091419] __alloc_skb+0x10b/0x5f0 [ 800.095151] ? skb_trim+0x190/0x190 [ 800.098803] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 800.103840] ? skb_put+0x183/0x1e0 [ 800.107402] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 800.112446] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.116809] ? ip6_setup_cork+0x1860/0x1860 [ 800.121289] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 800.126180] ip6_make_skb+0x32f/0x561 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7}, 0x0) 10:23:37 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000000)=""/203) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 800.130004] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.134373] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.138837] ? ip6_push_pending_frames+0xf0/0xf0 [ 800.143622] ? __ip6_append_data.isra.0+0x1d61/0x2fc0 [ 800.148848] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 800.153717] ? ip6_dst_lookup_flow+0x220/0x220 [ 800.158326] udpv6_sendmsg+0x225b/0x2a00 [ 800.162417] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.166828] ? udp_v6_get_port+0x6b0/0x6b0 [ 800.171089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.175868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.180739] ? trace_hardirqs_on_caller+0x6a/0x220 [ 800.185698] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.190481] ? retint_kernel+0x2d/0x2d [ 800.194399] ? release_sock+0x156/0x1c0 [ 800.198413] ? __local_bh_enable_ip+0x15a/0x270 [ 800.203107] ? _raw_spin_unlock_bh+0x31/0x40 [ 800.207542] inet_sendmsg+0x141/0x5d0 [ 800.211360] ? inet_sendmsg+0x141/0x5d0 [ 800.215360] ? ipip_gro_receive+0x100/0x100 [ 800.219709] sock_sendmsg+0xd7/0x130 [ 800.223796] ___sys_sendmsg+0x803/0x920 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8}, 0x0) [ 800.227795] ? copy_msghdr_from_user+0x430/0x430 [ 800.232572] ? lock_downgrade+0x880/0x880 [ 800.234737] encrypted_key: master key parameter is missing [ 800.236736] ? kasan_check_read+0x11/0x20 [ 800.236759] ? __fget+0x367/0x540 [ 800.236793] ? __fget_light+0x1a9/0x230 [ 800.254007] ? __fdget+0x1b/0x20 [ 800.255168] encrypted_key: master key parameter is missing [ 800.257387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 800.257411] __sys_sendmsg+0x105/0x1d0 [ 800.257425] ? __ia32_sys_shutdown+0x80/0x80 10:23:37 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x40800000000}) [ 800.257446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.282359] __x64_sys_sendmsg+0x78/0xb0 [ 800.286447] do_syscall_64+0xfd/0x620 [ 800.290275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 800.295481] RIP: 0033:0x45af49 [ 800.298716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 800.317630] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x9}, 0x0) [ 800.325386] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 800.332675] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 800.339961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 800.347256] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 800.354544] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 800.360039] encrypted_key: master key parameter is missing 10:23:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = accept4(r0, &(0x7f0000000100), &(0x7f0000000200)=0x80, 0x180000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00') getsockopt$inet_buf(r2, 0x0, 0x30, &(0x7f0000000240)=""/195, &(0x7f0000000340)=0xc3) timer_gettime(r1, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 800.396242] encrypted_key: master key parameter is missing 10:23:37 executing program 2 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:37 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x4, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9e3e) 10:23:37 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6a65772064846661756c74"], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$P9_RRENAME(r0, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:37 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa}, 0x0) 10:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9e5c) 10:23:37 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x5, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 800.572181] encrypted_key: master key parameter 'd„fault' is invalid [ 800.634628] encrypted_key: master key parameter 'd„fault' is invalid [ 800.645200] FAULT_INJECTION: forcing a failure. [ 800.645200] name failslab, interval 1, probability 0, space 0, times 0 [ 800.688960] CPU: 0 PID: 17467 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 800.696801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.706693] Call Trace: [ 800.709437] dump_stack+0x197/0x210 [ 800.713103] should_fail.cold+0xa/0x1b [ 800.717025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.722239] ? lock_downgrade+0x880/0x880 [ 800.726433] __should_failslab+0x121/0x190 [ 800.730779] should_failslab+0x9/0x14 [ 800.734601] kmem_cache_alloc_node+0x26c/0x710 [ 800.739206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 800.744771] __alloc_skb+0xd5/0x5f0 [ 800.748510] ? skb_trim+0x190/0x190 [ 800.752164] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 800.757200] ? skb_put+0x183/0x1e0 [ 800.760769] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 800.765817] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.770364] ? ip6_setup_cork+0x1860/0x1860 [ 800.774994] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 800.779855] ? lock_downgrade+0x880/0x880 [ 800.784019] ip6_make_skb+0x32f/0x561 10:23:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa3b6) 10:23:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa6ae) 10:23:38 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="6e657720646566fb5db50b4d599e6962a4342aa891a17473758d74306011c7cc46d1011dbf40af6eb3c6bb404b0e2f366a5055a3a6e02ab4f5a6f897f7764d8fedc1d1988d053646eb2f80e40bdd6bae3e8ae1f1900f04f836fb4558e2946c82de24b604398580c8ba8547ad839dd61871c4a1bd366081900dfd9f713f93390cbe2ddb8b77779fa544c05b0b3528f2290184c7d7c9f5d9e86da427a0851d699411d7c865d2af3370fb0b4661534ff9b7e4e404ad040000003749368c7f322c688e74a1b252b94b3e5dfaee8b4be7"], 0x1, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000001c0)=""/4096) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x5, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 800.787837] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.792195] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.796532] ? ip6_push_pending_frames+0xf0/0xf0 [ 800.801305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.806091] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 800.810956] ? retint_kernel+0x2d/0x2d [ 800.814869] ? ip6_dst_lookup_flow+0x220/0x220 [ 800.819473] udpv6_sendmsg+0x225b/0x2a00 [ 800.823555] ? ip_reply_glue_bits+0xc0/0xc0 [ 800.827906] ? udp_v6_get_port+0x6b0/0x6b0 [ 800.832248] ? udp_lib_get_port+0x871/0x19f0 [ 800.836682] ? mark_held_locks+0xb1/0x100 [ 800.840855] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.843632] encrypted_key: insufficient parameters specified [ 800.845636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.845657] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 800.845672] ? retint_kernel+0x2d/0x2d [ 800.845699] ? release_sock+0x156/0x1c0 [ 800.868884] ? __local_bh_enable_ip+0x15a/0x270 [ 800.873575] ? _raw_spin_unlock_bh+0x31/0x40 [ 800.878006] inet_sendmsg+0x141/0x5d0 [ 800.881834] ? inet_sendmsg+0x141/0x5d0 [ 800.885824] ? ipip_gro_receive+0x100/0x100 10:23:38 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x6, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 800.890167] sock_sendmsg+0xd7/0x130 [ 800.893901] ___sys_sendmsg+0x803/0x920 [ 800.898331] ? copy_msghdr_from_user+0x430/0x430 [ 800.903108] ? lock_downgrade+0x880/0x880 [ 800.907303] ? kasan_check_read+0x11/0x20 [ 800.911918] ? __fget+0x367/0x540 [ 800.915409] ? retint_kernel+0x2d/0x2d [ 800.919321] ? __fget_light+0x1a9/0x230 [ 800.923317] ? __fdget+0x1b/0x20 [ 800.926698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 800.932262] __sys_sendmsg+0x105/0x1d0 [ 800.936170] ? __ia32_sys_shutdown+0x80/0x80 [ 800.940615] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 800.945393] ? do_syscall_64+0x26/0x620 [ 800.949384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 800.954777] ? do_syscall_64+0x26/0x620 [ 800.958781] __x64_sys_sendmsg+0x78/0xb0 [ 800.962876] do_syscall_64+0xfd/0x620 [ 800.966708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 800.972087] RIP: 0033:0x45af49 [ 800.975300] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 800.994311] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 801.002044] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 801.009338] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 801.016627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 801.023921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 801.031232] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:40 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x7, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:40 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x5000, 0x0) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000000c0)}, {&(0x7f00000001c0)="1b697e182103552b27611bd660b89c8a52d31a7b7283ddf2c91fbcf20476e8fbe2b43c76881f4b00c69d0f2247692081e2d03707486cb91158a6ebaab8ea8a08d6183fb4127dd5c8469c3c222bb40af104c0b583049ba8277984ed2f0f4d2ee86dce637d895a1f40adfec0adee20347ad709d7e0590cfac73f24be79cd31284a4fca5534162c637eb14a21fb9ba1ea71319b8620f87d4bf8eeec947778fe785dbbb86667187228ffbcb019e7dac14acaa308b140c51ee7f9a17267cb3a44cf", 0xbf}, {&(0x7f0000000280)="ea82b45c9bb39adf8788e67d9b7f17d8b2df3df6b552dce421bc5e6d173af311d923c4506440051cd4505abe0cbfd29ba21ef6826ed88d103cae367d85550286a8756b99a9350b537ceb9da74faa645d533a9024e415c00e501571e942645da67c6560d54778b113dd4f81032026cdaca8cf95451b5d8a0de7dcd9facde95ef21ec426deea557f42521c48b7673070e6befdbda77cc098462ea82b8eccba9493a01c19df0f97fd48ba55daf33d96bb1babba366ef82eb0e3070420060169063d5395568da84818cb5ce6", 0xca}, {&(0x7f0000000380)="a9dea5f46e7df185eb310c7a2642a3aa725543b45e570808a346e7caf5af863626a75ce82b38cf0b0112c1859804c4d6a9ba88fc1fcc7557e8253089562ccc28d85d523b7c113c38c36ce518e950ec12150866adc92d32667aa95f6853dbb1", 0x5f}, {&(0x7f00000004c0)="6aaa6ea47006a52328df15fa7cf44dab3e324a42e4cb363be5b8a53040ce0045790855c6d5fec1e9fc5750baa3143f8ff262b31352cf0765a5a3017b95bdc7cbaddf12b33f3ea95b293d3424c9e00d03b8ea57463f9b014335a0ffc326191662ff0846a9712f10e1ac0652fcc6768299effee00012d2a422", 0x78}], 0x5) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 10:23:40 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x10}, 0x0) 10:23:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa92e) 10:23:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfff) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:40 executing program 2 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 803.558445] FAULT_INJECTION: forcing a failure. [ 803.558445] name failslab, interval 1, probability 0, space 0, times 0 [ 803.570537] encrypted_key: master key parameter is missing [ 803.579877] CPU: 1 PID: 17499 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 803.587729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.597096] Call Trace: [ 803.599714] dump_stack+0x197/0x210 [ 803.603371] should_fail.cold+0xa/0x1b [ 803.607283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 803.612413] ? lock_downgrade+0x880/0x880 [ 803.616592] __should_failslab+0x121/0x190 [ 803.620848] should_failslab+0x9/0x14 [ 803.624663] kmem_cache_alloc_node_trace+0x274/0x720 [ 803.629786] ? __alloc_skb+0xd5/0x5f0 [ 803.633621] __kmalloc_node_track_caller+0x3d/0x80 [ 803.638571] __kmalloc_reserve.isra.0+0x40/0xf0 [ 803.643268] __alloc_skb+0x10b/0x5f0 [ 803.643532] encrypted_key: master key parameter is missing [ 803.647012] ? skb_trim+0x190/0x190 [ 803.647031] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 803.647050] ? skb_put+0x183/0x1e0 [ 803.665086] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 803.670145] ? ip_reply_glue_bits+0xc0/0xc0 [ 803.674519] ? ip6_setup_cork+0x1860/0x1860 [ 803.678872] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 803.683740] ? lock_downgrade+0x880/0x880 [ 803.687917] ip6_make_skb+0x32f/0x561 [ 803.691737] ? ip_reply_glue_bits+0xc0/0xc0 [ 803.696077] ? ip_reply_glue_bits+0xc0/0xc0 [ 803.700421] ? ip6_push_pending_frames+0xf0/0xf0 [ 803.705199] ? find_held_lock+0x35/0x130 10:23:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x6, 0x6, 0x400, 0x70bd28, 0x25dfdbfd, {0x7, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x10000041) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:40 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c741f8daf0f139ff6d1d9b7b93abeccc2ee204af79234d9816fbeccc0064f6d4087e43a3d449b020f9f01ee037614d09e7a36c11d5906eb53b9cb876e2fa6db4c95ae320bc7b8f9ff3082283317da43de6fa3f50ad97186570fb9ffd36e74b8383eadb39268552bc63d960de4aa"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000756c74"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x10802, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$P9_RREAD(r0, &(0x7f0000000040)={0x29, 0x75, 0x2, {0x1e, "90a2f925d2b97b4a7c3dbce19e61225b3b8a1908274344d9849ad52bee88"}}, 0x29) [ 803.709286] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 803.714151] ? ip6_dst_lookup_flow+0x220/0x220 [ 803.718757] udpv6_sendmsg+0x225b/0x2a00 [ 803.719724] encrypted_key: insufficient parameters specified [ 803.723534] ? ip_reply_glue_bits+0xc0/0xc0 [ 803.723558] ? udp_v6_get_port+0x6b0/0x6b0 [ 803.723578] ? __local_bh_enable_ip+0x15a/0x270 [ 803.742620] ? _raw_spin_unlock_bh+0x31/0x40 [ 803.747051] ? __local_bh_enable_ip+0x15a/0x270 [ 803.751752] ? mark_held_locks+0x100/0x100 [ 803.756010] ? mark_held_locks+0x100/0x100 [ 803.760264] ? _raw_spin_unlock_bh+0x31/0x40 [ 803.763725] encrypted_key: insufficient parameters specified [ 803.764712] ? release_sock+0x156/0x1c0 [ 803.764746] ? __local_bh_enable_ip+0x15a/0x270 [ 803.772625] encrypted_key: insufficient parameters specified [ 803.774601] ? _raw_spin_unlock_bh+0x31/0x40 [ 803.774626] inet_sendmsg+0x141/0x5d0 [ 803.774644] ? inet_sendmsg+0x141/0x5d0 [ 803.797333] ? ipip_gro_receive+0x100/0x100 [ 803.801683] sock_sendmsg+0xd7/0x130 [ 803.805421] ___sys_sendmsg+0x803/0x920 10:23:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6577536465b61b7c65213771f46661356474"], 0x1, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000000c0)="ab79369d3e330187e12b12cbfcb372961012d7916c11cda0a626c09b3a54f5f6010000000000000082a9f9a8d0e80e2255d88d78dd4ca1e6cb7f95456ec5150000000000000000000000562eb3405c04481f6521cf370a715752173275a46ac4640698383f7e4057", 0x35, r0) [ 803.809426] ? copy_msghdr_from_user+0x430/0x430 [ 803.814225] ? lock_downgrade+0x880/0x880 [ 803.818395] ? kasan_check_read+0x11/0x20 [ 803.822581] ? __fget+0x367/0x540 [ 803.826077] ? __fget_light+0x1a9/0x230 [ 803.830074] ? __fdget+0x1b/0x20 [ 803.833458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.839020] __sys_sendmsg+0x105/0x1d0 [ 803.842924] ? __ia32_sys_shutdown+0x80/0x80 [ 803.847364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 803.852143] ? do_syscall_64+0x26/0x620 10:23:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4000, 0xffffffffffffffff, 0x2) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x753ff271a95f0778) [ 803.856149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.861528] ? do_syscall_64+0x26/0x620 [ 803.865522] __x64_sys_sendmsg+0x78/0xb0 [ 803.869617] do_syscall_64+0xfd/0x620 [ 803.873441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.878643] RIP: 0033:0x45af49 [ 803.881851] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 803.900767] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8010000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xd4, r0, 0x204, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9f1, @mcast1, 0x8001}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x754, @ipv4={[], [], @loopback}, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x44001}, 0x4040000) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = getpid() r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r3, r2, 0x1b, &(0x7f00000002c0)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r5 = getpgid(0xffffffffffffffff) newfstatat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r8, 0x0) setfsgid(r8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r11, 0x0) setfsgid(r11) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r12, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) r14 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dsp\x00', 0x2000, 0x0) r15 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/nvme-fabrics\x00', 0x200c0, 0x0) r16 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000800)) r17 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r17, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r18 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r18, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r19 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/loop-control\x00', 0x10000, 0x0) r20 = socket$phonet(0x23, 0x2, 0x1) r21 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r21, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r22 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x557341, 0x0) r23 = gettid() r24 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r25) r26 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r27, 0x0) setfsgid(r27) sendmsg$netlink(r1, &(0x7f00000009c0)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000640)=[{&(0x7f0000000300)={0x308, 0x20, 0x200, 0x70bd27, 0x25dfdbfb, "", [@nested={0x2f7, 0x83, 0x0, 0x1, [@generic="48bf47a27f7554eb62adbbd189b5eafc860ee45e9fada33d4fe3467f46987c92617e4d694d8aee1f749b921faf00a109203878bccd8789eb75e98410176fac04272dadcd0fe67d7e2d28cfc7387466c5acb4155b6fa96997cdfb6c8f7d844c0812afe85a7aeb999093d2c406942ccdefc54687101605923eb79fe427a2099ac2e447f40cc06bc1b593c94eea34f18056798539451dafbc35472e0d56e8cca1d31646d9c993f3482e728bbbc0913d073c87a3ded3abb0637e23c90b33725f15f140905ea564e19375531fd161a5945773d3faa0b3565aa8ec09aea5384aa1e6531347377f48a70d5ef97ebcbe14814f93f60300ee67b4eb7bda", @generic="31a4b9c68e9896b0b2bd9bd5363439d4fbf8270f64615e9baf785d795414cca48d60c2f4aca90b0d565778e5a80de0a263b36c40c7a4fba707fe56ab8ec69210ffc847f72092fc1e17ec5a91c0b49f33162eeddb29ab18fa90c8dd362410fbb5d56f9fd1918c8fceb7673432760fe70ed3b62a69f3559ec04f2c60338dcb27c1b20ceba322f074da067876e4dcd61c54499643", @generic="f1fb0f5ef4d391783bf93edd21b809fccf525fcd07957d2fdf416fdbd519154f90e8f8c8ee1dca18b98184de65f2b8e2dfd2bb6541059ea1cbb1d52de84c57893e3c5055d5cc50f6401dce55a34966d93c9309136ae7639a733bd58839e8dffa15453254b85113200725785e75b4470382eb1d3163910e9a85774e88b4c56cc1d0d4484c0c8fc2186d03f0e585e17a4f523389d6a05cf78ec6c6d715b141f6ccdba46116e132f4", @generic="9062f114f450ed611ae47849ffbe847f53596d6ddfcf553e5809189754f603681e8128369a714e9770e5b340e3dfe2846bc06c25df76ea2f7b5ba58315bd8e2ea64f498be740bfec4a3e4bd5cf1febd6c253150bdb9aad41628f64ebcd60e634c3f69a6bd4157401e28cdc22fb6040746ea4a2ce6d1e583ffcc865d490e9bf5dc5bce3e8c8fda90ad3925881ef8e1f4dad51cd2b3840f3f5d74ea4f8a583c96ebb70f0cd944c96", @generic="0b68969fe0750f4eac1ccfa01f5a42c649", @typed={0x8, 0x7b, 0x0, 0x0, @pid=r3}]}]}, 0x308}], 0x1, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r8}}}, @cred={{0x1c, 0x1, 0x2, {r9, 0xee00, r11}}}, @rights={{0x18, 0x1, 0x1, [r12, r13]}}, @rights={{0x28, 0x1, 0x1, [r14, r15, r16, r17, r18, r19]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r20, r21, r22]}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}], 0xd8, 0x800}, 0x4) 10:23:41 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x8, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xaa05) [ 803.908506] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 803.915824] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 803.923481] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 803.930766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 803.938053] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:41 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x11}, 0x0) [ 803.967226] encrypted_key: master key parameter is missing 10:23:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r1, 0xc1004111, &(0x7f0000000200)={0xef15, [0x20, 0x5, 0x4], [{0x6846, 0xbd2, 0x0, 0x0, 0x1}, {0xfca4, 0x49f1}, {0x1, 0x4000000, 0x1, 0x0, 0x1, 0x1}, {0xff, 0x393c, 0x1, 0x0, 0x1, 0x1}, {0x6, 0x3, 0x1}, {0x5a, 0x3, 0x0, 0x0, 0x1}, {0x8, 0x0, 0x0, 0x1}, {0x0, 0x996d, 0x0, 0x1}, {0x0, 0x80000000, 0x0, 0x1, 0x1}, {0xfffffffc, 0xffffffe3, 0x1}, {0x7, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x9, 0xff, 0x0, 0x1}], 0xc804}) 10:23:41 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x9, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:41 executing program 2 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:41 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x60}, 0x0) [ 804.090831] encrypted_key: master key parameter is missing 10:23:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xae51) [ 804.213299] FAULT_INJECTION: forcing a failure. [ 804.213299] name failslab, interval 1, probability 0, space 0, times 0 [ 804.248437] CPU: 0 PID: 17555 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 804.256298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.265797] Call Trace: [ 804.268423] dump_stack+0x197/0x210 [ 804.272085] should_fail.cold+0xa/0x1b [ 804.276105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 804.281228] ? lock_downgrade+0x880/0x880 [ 804.285410] __should_failslab+0x121/0x190 [ 804.289664] should_failslab+0x9/0x14 [ 804.293476] kmem_cache_alloc_node+0x26c/0x710 [ 804.299041] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.303814] __alloc_skb+0xd5/0x5f0 [ 804.307454] ? skb_trim+0x190/0x190 [ 804.311095] ? __ip6_append_data.isra.0+0x180e/0x2fc0 [ 804.316304] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 804.321343] ? ip_reply_glue_bits+0xc0/0xc0 [ 804.325690] ? ip6_setup_cork+0x1860/0x1860 [ 804.330035] ip6_make_skb+0x32f/0x561 [ 804.333856] ? ip_reply_glue_bits+0xc0/0xc0 [ 804.338190] ? ip_reply_glue_bits+0xc0/0xc0 [ 804.342541] ? ip6_push_pending_frames+0xf0/0xf0 [ 804.347316] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 804.352181] ? __sanitizer_cov_trace_pc+0x32/0x50 [ 804.357048] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 804.361910] ? retint_kernel+0x2d/0x2d [ 804.365822] ? ip6_dst_lookup_flow+0x220/0x220 [ 804.370452] udpv6_sendmsg+0x225b/0x2a00 [ 804.374540] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 804.379141] ? ip_reply_glue_bits+0xc0/0xc0 [ 804.383498] ? udp_v6_get_port+0x6b0/0x6b0 [ 804.387760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.392540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.397345] ? trace_hardirqs_on_caller+0x6a/0x220 [ 804.402303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.407097] ? release_sock+0x156/0x1c0 10:23:41 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xb, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 804.411107] ? __local_bh_enable_ip+0x15a/0x270 [ 804.415796] ? _raw_spin_unlock_bh+0x31/0x40 [ 804.420234] inet_sendmsg+0x141/0x5d0 [ 804.424053] ? inet_sendmsg+0x141/0x5d0 [ 804.428053] ? ipip_gro_receive+0x100/0x100 [ 804.432397] sock_sendmsg+0xd7/0x130 [ 804.436132] ___sys_sendmsg+0x803/0x920 [ 804.440127] ? copy_msghdr_from_user+0x430/0x430 [ 804.445011] ? lock_downgrade+0x880/0x880 [ 804.449182] ? kasan_check_read+0x11/0x20 [ 804.453346] ? __fget+0x367/0x540 [ 804.456840] ? __fget_light+0x1a9/0x230 [ 804.460852] ? __fdget+0x1b/0x20 [ 804.464232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 804.469895] __sys_sendmsg+0x105/0x1d0 [ 804.473805] ? __ia32_sys_shutdown+0x80/0x80 [ 804.478236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 804.483028] __x64_sys_sendmsg+0x78/0xb0 [ 804.487121] ? do_syscall_64+0x5b/0x620 [ 804.491116] do_syscall_64+0xfd/0x620 [ 804.494939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.500226] RIP: 0033:0x45af49 10:23:41 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x300}, 0x0) 10:23:41 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xc, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 804.503468] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 804.522399] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 804.530131] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 804.537420] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 804.544706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 804.551993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:23:41 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661758ef2"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000080)=""/121) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) 10:23:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xaea6) 10:23:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 804.559714] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 804.615676] encrypted_key: master key parameter 'defauŽò' is invalid 10:23:42 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xd, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 804.683499] encrypted_key: master key parameter 'defauŽò' is invalid 10:23:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000040)={0x3c, 0x7d, 0x2, {0x0, 0x35, 0xb53c, 0x5, {0x40, 0x1, 0x7}, 0x80000000, 0x4, 0x101, 0x9, 0x0, '', 0x0, '', 0x0, '', 0x2, '&!'}}, 0x3c) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) setfsgid(r2) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, r2, 0x1000) 10:23:42 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x500}, 0x0) 10:23:42 executing program 2 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xb41e) 10:23:42 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) capget(&(0x7f0000000000)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000040)={0x6, 0x0, 0x81, 0x1d, 0x100, 0x4}) 10:23:42 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xf, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x51e}, 0x0) [ 804.912176] encrypted_key: master key parameter is missing [ 804.947900] encrypted_key: master key parameter is missing 10:23:42 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x10, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xb6a3) [ 804.983749] FAULT_INJECTION: forcing a failure. [ 804.983749] name failslab, interval 1, probability 0, space 0, times 0 [ 805.051960] CPU: 1 PID: 17615 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 805.059803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.069173] Call Trace: [ 805.071784] dump_stack+0x197/0x210 [ 805.075447] should_fail.cold+0xa/0x1b [ 805.079451] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 805.084564] ? lock_downgrade+0x880/0x880 [ 805.088734] __should_failslab+0x121/0x190 [ 805.092988] should_failslab+0x9/0x14 [ 805.096995] kmem_cache_alloc_node_trace+0x274/0x720 [ 805.102117] ? __alloc_skb+0xd5/0x5f0 [ 805.105946] __kmalloc_node_track_caller+0x3d/0x80 [ 805.110899] __kmalloc_reserve.isra.0+0x40/0xf0 [ 805.113072] encrypted_key: insufficient parameters specified [ 805.115607] __alloc_skb+0x10b/0x5f0 [ 805.115628] ? skb_trim+0x190/0x190 [ 805.115659] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 805.133800] ? skb_put+0x183/0x1e0 [ 805.137365] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 805.142415] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.146775] ? ip6_setup_cork+0x1860/0x1860 [ 805.151121] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 805.155983] ? lock_downgrade+0x880/0x880 [ 805.160164] ip6_make_skb+0x32f/0x561 [ 805.164002] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.168351] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.172704] ? ip6_push_pending_frames+0xf0/0xf0 [ 805.177486] ? find_held_lock+0x35/0x130 [ 805.181579] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 805.181596] encrypted_key: insufficient parameters specified [ 805.186438] ? ip6_dst_lookup_flow+0x220/0x220 [ 805.186460] udpv6_sendmsg+0x225b/0x2a00 [ 805.186490] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.208282] ? udp_v6_get_port+0x6b0/0x6b0 [ 805.212550] ? __local_bh_enable_ip+0x15a/0x270 [ 805.217237] ? _raw_spin_unlock_bh+0x31/0x40 [ 805.221662] ? __local_bh_enable_ip+0x15a/0x270 [ 805.226384] ? mark_held_locks+0x100/0x100 [ 805.230702] ? mark_held_locks+0x100/0x100 [ 805.234973] ? _raw_spin_unlock_bh+0x31/0x40 [ 805.239416] ? release_sock+0x156/0x1c0 [ 805.243428] ? __local_bh_enable_ip+0x15a/0x270 [ 805.248120] ? _raw_spin_unlock_bh+0x31/0x40 [ 805.252553] inet_sendmsg+0x141/0x5d0 [ 805.256381] ? inet_sendmsg+0x141/0x5d0 [ 805.260376] ? ipip_gro_receive+0x100/0x100 [ 805.264726] sock_sendmsg+0xd7/0x130 [ 805.268461] ___sys_sendmsg+0x803/0x920 [ 805.272552] ? copy_msghdr_from_user+0x430/0x430 [ 805.277330] ? lock_downgrade+0x880/0x880 [ 805.281504] ? kasan_check_read+0x11/0x20 [ 805.285676] ? __fget+0x367/0x540 [ 805.289164] ? __fget_light+0x1a9/0x230 [ 805.293155] ? __fdget+0x1b/0x20 [ 805.296541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.302100] __sys_sendmsg+0x105/0x1d0 [ 805.306003] ? __ia32_sys_shutdown+0x80/0x80 [ 805.310439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 805.315242] ? do_syscall_64+0x26/0x620 [ 805.319251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.324633] ? do_syscall_64+0x26/0x620 [ 805.328632] __x64_sys_sendmsg+0x78/0xb0 [ 805.332830] do_syscall_64+0xfd/0x620 [ 805.336659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.341864] RIP: 0033:0x45af49 [ 805.345070] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 805.364072] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 805.371802] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 805.379086] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 805.386366] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 805.393651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:23:42 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c740a47439406158dcb7653f0118121accf1254b0f34a27fc7f02d726a8bf5bbedf8b69b17728ac855692c96e4dd691cecc4510cd9a159786025e7baf7eecd737f816eb694f069db4b87d028331c141c7c38a997d15610be28178"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xb996) 10:23:42 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x600842, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r0, 0x8004500b, &(0x7f0000000040)=0x9) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xbe46) [ 805.400938] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xbf0e) 10:23:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000200)={0xffffffff, 0x4e37, 0x800}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40080, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000280)={{0x10000, 0x1, 0xf, 0x9, 0x0, 0x4, 0x1f, 0x2, 0x87, 0x4, 0x80, 0x3f}, {0x1, 0xa004, 0xc, 0xfa, 0xf6, 0xf, 0x7, 0x9, 0x8, 0x9, 0x9, 0x1}, {0x4, 0x3000, 0x0, 0x9, 0x3, 0x20, 0x6, 0x3, 0x5, 0x9, 0x5, 0x40}, {0x2, 0x802, 0x8, 0x40, 0xc2, 0x80, 0x20, 0x1, 0x1, 0x20, 0x8, 0x3}, {0x2, 0x10000, 0xb, 0xea, 0x1, 0x9, 0x6, 0x20, 0x7, 0x1, 0x95, 0xff}, {0xd001, 0x1, 0x0, 0x40, 0x7, 0x0, 0x20, 0xd5, 0x40, 0x81, 0x6, 0x9}, {0x5000, 0x0, 0x9, 0x80, 0x53, 0x7, 0x81, 0x3, 0x3, 0x6, 0x40, 0x1}, {0x2, 0x10000, 0xd, 0x3, 0x2, 0x2, 0xc0, 0x68, 0x1, 0xff, 0x80, 0x1}, {0x14000}, {0x3000, 0x1}, 0x20000000, 0x0, 0x100000, 0x100000, 0x3, 0x1000, 0x6000, [0x1, 0x2, 0x0, 0x6]}) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000100)={0x18, 0x2, 0x1000, 0x7f}) fsetxattr$security_selinux(r1, &(0x7f0000000140)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:audisp_var_run_t:s0\x00', 0x26, 0x0) 10:23:42 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x600001, 0x0) r1 = gettid() r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fcntl$dupfd(r0, 0x406, r2) getpriority(0x0, r1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x6, 0x3, 0x33fa, 0x4}, 0x10) 10:23:42 executing program 2 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x11, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:42 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x578}, 0x0) [ 805.460914] encrypted_key: master key parameter is missing [ 805.496714] encrypted_key: master key parameter is missing 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xc486) 10:23:42 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5a8}, 0x0) 10:23:42 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x14, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 805.519894] audit: type=1400 audit(1578911022.781:86): avc: denied { relabelto } for pid=17648 comm="syz-executor.0" name="UDPv6" dev="sockfs" ino=165390 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:audisp_var_run_t:s0 tclass=udp_socket permissive=1 10:23:42 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16], 0x1, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 10:23:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xc698) 10:23:43 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65770b64650600000074"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 805.721525] FAULT_INJECTION: forcing a failure. [ 805.721525] name failslab, interval 1, probability 0, space 0, times 0 [ 805.772715] CPU: 0 PID: 17672 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 805.780574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.789945] Call Trace: [ 805.792555] dump_stack+0x197/0x210 [ 805.796220] should_fail.cold+0xa/0x1b [ 805.800140] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 805.805374] ? lock_downgrade+0x880/0x880 [ 805.809548] __should_failslab+0x121/0x190 [ 805.813801] should_failslab+0x9/0x14 [ 805.817625] kmem_cache_alloc_node+0x26c/0x710 [ 805.822261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.827824] __alloc_skb+0xd5/0x5f0 [ 805.833908] ? skb_trim+0x190/0x190 [ 805.837556] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 805.842418] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 805.847452] ? skb_put+0x183/0x1e0 [ 805.851018] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 805.856061] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.860411] ? ip6_setup_cork+0x1860/0x1860 [ 805.864757] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 805.869622] ip6_make_skb+0x32f/0x561 [ 805.873442] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.877793] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.882139] ? ip6_push_pending_frames+0xf0/0xf0 [ 805.886914] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 805.891778] ? ip6_dst_lookup_flow+0x220/0x220 [ 805.896221] encrypted_key: insufficient parameters specified [ 805.896400] ? fl6_update_dst+0x19/0x2c0 [ 805.906280] udpv6_sendmsg+0x225b/0x2a00 [ 805.910361] ? retint_kernel+0x2d/0x2d [ 805.914264] ? ip_reply_glue_bits+0xc0/0xc0 [ 805.918614] ? udp_v6_get_port+0x6b0/0x6b0 [ 805.922871] ? __local_bh_enable_ip+0x15a/0x270 [ 805.927561] ? _raw_spin_unlock_bh+0x31/0x40 [ 805.931986] ? __local_bh_enable_ip+0x15a/0x270 [ 805.936707] ? mark_held_locks+0x100/0x100 [ 805.940966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 805.945738] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 805.950467] ? retint_kernel+0x2d/0x2d [ 805.954397] ? release_sock+0x156/0x1c0 [ 805.958407] ? __local_bh_enable_ip+0x15a/0x270 [ 805.963105] ? _raw_spin_unlock_bh+0x31/0x40 [ 805.967530] inet_sendmsg+0x141/0x5d0 [ 805.971346] ? inet_sendmsg+0x141/0x5d0 [ 805.975355] ? ipip_gro_receive+0x100/0x100 [ 805.979700] sock_sendmsg+0xd7/0x130 [ 805.983432] ___sys_sendmsg+0x803/0x920 [ 805.987427] ? copy_msghdr_from_user+0x430/0x430 [ 805.992204] ? lock_downgrade+0x880/0x880 [ 805.996375] ? kasan_check_read+0x11/0x20 [ 806.000546] ? __fget+0x367/0x540 [ 806.004038] ? __fget_light+0x1a9/0x230 [ 806.008028] ? __fdget+0x1b/0x20 [ 806.011439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 806.017017] __sys_sendmsg+0x105/0x1d0 [ 806.020918] ? __ia32_sys_shutdown+0x80/0x80 [ 806.025360] __x64_sys_sendmsg+0x78/0xb0 [ 806.029463] do_syscall_64+0xfd/0x620 [ 806.033306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.038530] RIP: 0033:0x45af49 [ 806.041747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.060685] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 806.068415] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 806.075703] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 806.082992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 806.090281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 806.097602] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:43 executing program 2 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xc9fe) 10:23:43 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x17, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:43 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00 \x00\x00\x00'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) 10:23:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x70e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000080)={r1, 0x4}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000040)={r1, 0x3}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="8600000056d9fafe35a7d169e253ad113dfcbddad52701b947d15defe62f696234eacfcb1eaec2fe181cbc71a7f49c4c9b87d71fd0ac07b3044e51deec0c4cb6ae60d5bf587342f12c58d14b69cadedce7727a5540d3b42243bd3fd4638b55c736a406bdf204cba531af8ad20913c242ea4dc48c3fe4ef68d949f14d2e58f0e851737da50bc40f58b0f4"], &(0x7f0000000100)=0x8e) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r3, 0x7ff, 0x100, 0x4dc0, 0xfffffffa}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x26, &(0x7f0000000340), 0x13, &(0x7f0000000180)}, 0x0) 10:23:43 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x600}, 0x0) 10:23:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xce3b) 10:23:43 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x18, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:43 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x66d}, 0x0) 10:23:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) accept4$alg(r1, 0x0, 0x0, 0x800) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xf) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 806.327460] FAULT_INJECTION: forcing a failure. [ 806.327460] name failslab, interval 1, probability 0, space 0, times 0 10:23:43 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000080)=0x80, 0x800) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80008000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x480c0}, 0x8002) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x1000, @loopback, 0x1f}, 0x1c) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r2, r3, 0x0) socketpair(0x6, 0x4, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r6, r7, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={r8, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000340)={0x452, 0xf9af, 0xa, 0x2, 0xffffffff, 0xfff, 0x3, 0x687, r8}, &(0x7f0000000500)=0x20) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[]], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000100)="b73a0826b5d173a0895796521a6cc579e14bc9b4dc879bfc", 0x18, 0xfffffffffffffff9) [ 806.416775] CPU: 0 PID: 17707 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 806.424626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.434256] Call Trace: [ 806.436865] dump_stack+0x197/0x210 [ 806.440520] should_fail.cold+0xa/0x1b [ 806.444436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 806.449564] ? __should_failslab+0x67/0x190 [ 806.453912] __should_failslab+0x121/0x190 [ 806.458168] should_failslab+0x9/0x14 [ 806.461988] kmem_cache_alloc_node_trace+0x274/0x720 10:23:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xcf76) [ 806.467107] ? __alloc_skb+0xd5/0x5f0 [ 806.470931] __kmalloc_node_track_caller+0x3d/0x80 [ 806.475884] __kmalloc_reserve.isra.0+0x40/0xf0 [ 806.480577] __alloc_skb+0x10b/0x5f0 [ 806.484310] ? skb_trim+0x190/0x190 [ 806.487957] ? __ip6_append_data.isra.0+0x1b66/0x2fc0 [ 806.493163] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 806.498194] ? skb_put+0x183/0x1e0 [ 806.501754] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 806.506794] ? ip_reply_glue_bits+0xc0/0xc0 [ 806.511133] ? ip6_setup_cork+0xd71/0x1860 [ 806.515397] ? ip6_setup_cork+0x1860/0x1860 [ 806.519738] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 806.524594] ? lock_downgrade+0x880/0x880 [ 806.528785] ip6_make_skb+0x32f/0x561 [ 806.532600] ? ip_reply_glue_bits+0xc0/0xc0 [ 806.536941] ? ip_reply_glue_bits+0xc0/0xc0 [ 806.541288] ? ip6_push_pending_frames+0xf0/0xf0 [ 806.546078] ? ip_reply_glue_bits+0xc0/0xc0 [ 806.550418] udpv6_sendmsg+0x225b/0x2a00 [ 806.554500] ? ip_reply_glue_bits+0xc0/0xc0 [ 806.558850] ? udp_v6_get_port+0x6b0/0x6b0 [ 806.563214] ? trace_hardirqs_on+0x67/0x220 [ 806.567575] ? mark_held_locks+0x100/0x100 [ 806.571835] ? mark_held_locks+0x100/0x100 [ 806.576085] ? mark_held_locks+0xb1/0x100 [ 806.580265] ? release_sock+0x156/0x1c0 [ 806.584264] ? __local_bh_enable_ip+0x15a/0x270 [ 806.588950] ? _raw_spin_unlock_bh+0x31/0x40 [ 806.593394] inet_sendmsg+0x141/0x5d0 [ 806.597310] ? inet_sendmsg+0x141/0x5d0 [ 806.601300] ? ipip_gro_receive+0x100/0x100 [ 806.605637] sock_sendmsg+0xd7/0x130 [ 806.609380] ___sys_sendmsg+0x803/0x920 [ 806.613370] ? copy_msghdr_from_user+0x430/0x430 [ 806.618157] ? lock_downgrade+0x880/0x880 [ 806.622322] ? kasan_check_read+0x11/0x20 [ 806.626487] ? __fget+0x367/0x540 [ 806.629969] ? retint_kernel+0x2d/0x2d [ 806.633877] ? __fget_light+0x1a9/0x230 [ 806.637867] ? __fdget+0x1b/0x20 [ 806.641246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 806.646810] __sys_sendmsg+0x105/0x1d0 [ 806.650713] ? __ia32_sys_shutdown+0x80/0x80 [ 806.655135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 806.659926] __x64_sys_sendmsg+0x78/0xb0 [ 806.664005] do_syscall_64+0xfd/0x620 [ 806.667825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.673022] RIP: 0033:0x45af49 [ 806.676226] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.695154] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 806.702884] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 806.710169] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 806.717490] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 806.724779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 806.732064] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:44 executing program 2 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:44 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x19, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:44 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x700}, 0x0) 10:23:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xd4ee) 10:23:44 executing program 0: getrlimit(0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000200)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)="bbe1e8b4ab634d30c52ccb0bb9f264d38aed87afd50bd25a7b0300513ed445461333ab8cb4e1cf432a0f5d1de998276dcb13eb9ae0c14633bf5869876ba2a80bfc2014595af70a6aa462b66bafde5e1480816fdbb84d28f8351076376952d8a1a66a0283a40bda35b826ac8f927bc55054bfa40ddf96c443190a9aafeb479f5c509809eb57f4424ba0b243252d10330fa919c1787af7cba2ebc402792437fdf3cd9a18f132cfb5983dd694c8effb667173feca1a41c202b5ffb958a5bafebcb7fdc0eb918d42fb2d0338f0824c3cc118127692", 0xd3}], 0x1, &(0x7f0000000180)}, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) 10:23:44 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='rxrpc\x00', r0) keyctl$instantiate(0xc, r2, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 10:23:44 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1b, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:44 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='efauY@'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'xfrm0\x00', {0x2, 0x4e21, @empty}}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 807.141800] encrypted_key: insufficient parameters specified [ 807.162883] FAULT_INJECTION: forcing a failure. [ 807.162883] name failslab, interval 1, probability 0, space 0, times 0 [ 807.187952] CPU: 1 PID: 17760 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 807.195796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.205166] Call Trace: [ 807.207769] dump_stack+0x197/0x210 [ 807.211410] should_fail.cold+0xa/0x1b [ 807.215307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 807.220464] ? lock_downgrade+0x880/0x880 [ 807.224648] __should_failslab+0x121/0x190 [ 807.228901] should_failslab+0x9/0x14 [ 807.232716] kmem_cache_alloc_node+0x26c/0x710 [ 807.237491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.242268] __alloc_skb+0xd5/0x5f0 [ 807.245910] ? skb_trim+0x190/0x190 [ 807.249585] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.253938] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 807.258979] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.263334] ? ip6_setup_cork+0x1860/0x1860 [ 807.267687] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 807.272547] ip6_make_skb+0x32f/0x561 [ 807.276358] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.280701] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.285046] ? ip6_push_pending_frames+0xf0/0xf0 [ 807.289818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.294599] ? retint_kernel+0x2d/0x2d [ 807.298511] udpv6_sendmsg+0x225b/0x2a00 [ 807.302612] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.306957] ? udp_v6_get_port+0x6b0/0x6b0 [ 807.311206] ? finish_task_switch+0x118/0x7c0 [ 807.315714] ? switch_mm_irqs_off+0x7fa/0x1360 [ 807.320315] ? __schedule+0x86e/0x1dc0 [ 807.324213] ? mark_held_locks+0xb1/0x100 [ 807.328389] ? preempt_schedule+0x4b/0x60 [ 807.332572] ? __local_bh_enable_ip+0x21d/0x270 [ 807.338139] ? _raw_spin_unlock_bh+0x31/0x40 [ 807.342598] inet_sendmsg+0x141/0x5d0 [ 807.346417] ? inet_sendmsg+0x141/0x5d0 [ 807.350414] ? ipip_gro_receive+0x100/0x100 [ 807.354758] sock_sendmsg+0xd7/0x130 [ 807.358492] ___sys_sendmsg+0x803/0x920 [ 807.362490] ? copy_msghdr_from_user+0x430/0x430 [ 807.367267] ? lock_downgrade+0x880/0x880 [ 807.371437] ? kasan_check_read+0x11/0x20 [ 807.375609] ? __fget+0x367/0x540 [ 807.379088] ? __fget_light+0x1a9/0x230 [ 807.383079] ? __fdget+0x1b/0x20 [ 807.386455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 807.392188] __sys_sendmsg+0x105/0x1d0 [ 807.396087] ? __ia32_sys_shutdown+0x80/0x80 [ 807.400531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.405305] ? do_syscall_64+0x26/0x620 [ 807.409290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.414659] ? do_syscall_64+0x26/0x620 [ 807.418650] __x64_sys_sendmsg+0x78/0xb0 [ 807.422729] do_syscall_64+0xfd/0x620 [ 807.426549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.431757] RIP: 0033:0x45af49 10:23:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xd68d) 10:23:44 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x900}, 0x0) 10:23:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xde30) [ 807.434963] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 807.453881] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 807.461612] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 807.468899] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 807.476186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 807.483475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 807.490760] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:44 executing program 2 (fault-call:3 fault-nth:22): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:44 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa00}, 0x0) 10:23:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe682) 10:23:44 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1c, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:44 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000080), 0x4) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x5f, 0x10, 0x4}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fcntl$setsig(r1, 0xa, 0x3) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000200)="d8dbbdd864072dcbc7fcafa3ff200df3ee5637d0e9111dc50ed817b5ef64158d77efd2e79060221df4e4a93767afdfade68d874397bd2c0b6871d5ed14a19d2efbaae03ef6e2ce726f53f35b796e7d4bd1931e16e97c2de6cc4623f5d67d87edd32fd17f11f581ff1fe0452728672f4ce2999f16abf93f17af207753556885e1ee26f45e4ede87bbb0420cf86bda91f54011aa387f901c77c0982e75dd28c8ea02a25e1edbfec9636a3a7bede49261b0e68c5e25f8095969d3196c79b0870b81929cbb79667c87f9ada378760798e30bed1c09be", 0xd4, r0) keyctl$instantiate(0xc, r2, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '', 0x20, 0x7}, 0x28, 0xfffffffffffffff8) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 807.623068] encrypted_key: master key parameter is missing [ 807.683887] encrypted_key: master key parameter is missing [ 807.687028] FAULT_INJECTION: forcing a failure. [ 807.687028] name failslab, interval 1, probability 0, space 0, times 0 [ 807.707279] CPU: 0 PID: 17795 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 807.715115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.724517] Call Trace: [ 807.727129] dump_stack+0x197/0x210 [ 807.730783] should_fail.cold+0xa/0x1b [ 807.734697] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 807.739833] ? lock_downgrade+0x880/0x880 [ 807.744021] __should_failslab+0x121/0x190 [ 807.748282] should_failslab+0x9/0x14 [ 807.752114] kmem_cache_alloc_node_trace+0x274/0x720 [ 807.757238] ? __alloc_skb+0xd5/0x5f0 [ 807.761088] __kmalloc_node_track_caller+0x3d/0x80 [ 807.766042] __kmalloc_reserve.isra.0+0x40/0xf0 [ 807.770743] __alloc_skb+0x10b/0x5f0 [ 807.774476] ? skb_trim+0x190/0x190 [ 807.778157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 807.783202] ? skb_put+0x183/0x1e0 [ 807.786768] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 807.791811] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.796174] ? ip6_setup_cork+0x1860/0x1860 [ 807.801324] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 807.806184] ? lock_downgrade+0x880/0x880 [ 807.810357] ip6_make_skb+0x32f/0x561 [ 807.814178] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.818531] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.822875] ? ip6_push_pending_frames+0xf0/0xf0 [ 807.827650] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xee25) 10:23:45 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYRES64], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:45 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1d, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 807.832436] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 807.837304] ? retint_kernel+0x2d/0x2d [ 807.841328] ? ip6_dst_lookup_flow+0x220/0x220 [ 807.845944] udpv6_sendmsg+0x225b/0x2a00 [ 807.850031] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 807.854635] ? ip_reply_glue_bits+0xc0/0xc0 [ 807.858979] ? udp_v6_get_port+0x6b0/0x6b0 [ 807.863234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.868009] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.872790] ? trace_hardirqs_on_caller+0x6a/0x220 [ 807.875832] encrypted_key: insufficient parameters specified 10:23:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x20400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:45 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1e, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 807.877739] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.877761] ? retint_kernel+0x2d/0x2d [ 807.877786] ? release_sock+0x156/0x1c0 [ 807.877818] ? __local_bh_enable_ip+0x15a/0x270 [ 807.877834] ? _raw_spin_unlock_bh+0x31/0x40 [ 807.877855] inet_sendmsg+0x141/0x5d0 [ 807.877874] ? inet_sendmsg+0x141/0x5d0 [ 807.913472] ? ipip_gro_receive+0x100/0x100 [ 807.917831] sock_sendmsg+0xd7/0x130 [ 807.921585] ___sys_sendmsg+0x803/0x920 [ 807.925594] ? copy_msghdr_from_user+0x430/0x430 [ 807.930383] ? lock_downgrade+0x880/0x880 [ 807.934567] ? kasan_check_read+0x11/0x20 [ 807.938833] ? __fget+0x367/0x540 [ 807.942325] ? __fget_light+0x1a9/0x230 [ 807.946318] ? __fdget+0x1b/0x20 [ 807.949710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 807.955273] __sys_sendmsg+0x105/0x1d0 [ 807.959179] ? __ia32_sys_shutdown+0x80/0x80 [ 807.963645] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 807.968425] ? do_syscall_64+0x26/0x620 [ 807.972410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.977795] ? do_syscall_64+0x26/0x620 10:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xeed4) [ 807.981799] __x64_sys_sendmsg+0x78/0xb0 [ 807.986175] do_syscall_64+0xfd/0x620 [ 807.990122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.995323] RIP: 0033:0x45af49 [ 807.998535] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 808.017461] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 808.025194] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 808.032514] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 808.039928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 808.047217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 808.054507] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:45 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa96}, 0x0) 10:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf677) 10:23:45 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x21, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:45 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) keyctl$revoke(0x3, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:45 executing program 2 (fault-call:3 fault-nth:23): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x389000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x89000010}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, r2, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffffffff, 0x3}}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x1e}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0xabdfdb06c585a0d2) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 808.162427] encrypted_key: master key parameter is missing [ 808.200743] encrypted_key: master key parameter is missing 10:23:45 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x23, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:45 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r2, r1, 0x1b, &(0x7f00000002c0)) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r2}) 10:23:45 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xe10}, 0x0) 10:23:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe1a) 10:23:45 executing program 0: r0 = getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r1, r0, 0x1b, &(0x7f00000002c0)) ptrace(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12626acdc76ddfa1, @perf_config_ext={0xfffffffffffffc9b, 0x2}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0x2000000}, r0, 0x3, 0xffffffffffffffff, 0x1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 808.374692] FAULT_INJECTION: forcing a failure. [ 808.374692] name failslab, interval 1, probability 0, space 0, times 0 10:23:45 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000040)={0x7, 0x7, [0x200, 0x591, 0x5, 0x9, 0x9], 0x1}) add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 808.423123] CPU: 0 PID: 17843 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 808.430980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.440362] Call Trace: [ 808.442978] dump_stack+0x197/0x210 [ 808.446644] should_fail.cold+0xa/0x1b [ 808.450566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 808.455695] ? lock_downgrade+0x880/0x880 [ 808.459876] __should_failslab+0x121/0x190 [ 808.464132] should_failslab+0x9/0x14 [ 808.467952] kmem_cache_alloc_node+0x26c/0x710 [ 808.472819] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 808.477600] __alloc_skb+0xd5/0x5f0 [ 808.481243] ? skb_trim+0x190/0x190 [ 808.484889] ? __ip6_append_data.isra.0+0x2055/0x2fc0 [ 808.490100] ? __ip6_append_data.isra.0+0x2062/0x2fc0 [ 808.495317] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 808.500476] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.504833] ? ip6_setup_cork+0x1860/0x1860 [ 808.509212] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 808.514073] ? lock_downgrade+0x880/0x880 [ 808.518278] ip6_make_skb+0x32f/0x561 [ 808.522100] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.526449] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.530800] ? ip6_push_pending_frames+0xf0/0xf0 [ 808.535583] ? find_held_lock+0x35/0x130 [ 808.539676] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 808.544545] ? ip6_dst_lookup_flow+0x220/0x220 [ 808.549155] udpv6_sendmsg+0x225b/0x2a00 [ 808.553243] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.557590] ? udp_v6_get_port+0x6b0/0x6b0 [ 808.561850] ? mark_held_locks+0xb1/0x100 [ 808.566040] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 808.570639] ? retint_kernel+0x2d/0x2d [ 808.574549] ? trace_hardirqs_on_caller+0x6a/0x220 [ 808.579524] ? mark_held_locks+0x100/0x100 [ 808.583787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 808.588622] ? release_sock+0x156/0x1c0 [ 808.592638] ? __local_bh_enable_ip+0x15a/0x270 [ 808.597329] ? _raw_spin_unlock_bh+0x31/0x40 [ 808.601762] inet_sendmsg+0x141/0x5d0 [ 808.605584] ? inet_sendmsg+0x141/0x5d0 [ 808.609584] ? ipip_gro_receive+0x100/0x100 [ 808.613925] sock_sendmsg+0xd7/0x130 [ 808.617662] ___sys_sendmsg+0x803/0x920 [ 808.621666] ? copy_msghdr_from_user+0x430/0x430 [ 808.626450] ? lock_downgrade+0x880/0x880 [ 808.630638] ? kasan_check_read+0x11/0x20 [ 808.634795] ? __fget+0x367/0x540 [ 808.638259] ? __fget_light+0x1a9/0x230 [ 808.642222] ? __fdget+0x1b/0x20 [ 808.645575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 808.651122] __sys_sendmsg+0x105/0x1d0 [ 808.655013] ? __ia32_sys_shutdown+0x80/0x80 [ 808.659418] __x64_sys_sendmsg+0x78/0xb0 [ 808.663466] do_syscall_64+0xfd/0x620 [ 808.667273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.672462] RIP: 0033:0x45af49 [ 808.675648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 808.694604] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 808.702363] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 808.709625] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 808.716905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:23:46 executing program 2 (fault-call:3 fault-nth:24): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x24, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000100), 0xffffffffffffffed, r0) 10:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe80) 10:23:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xebf}, 0x0) [ 808.724167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 808.731424] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfec9) [ 808.843410] FAULT_INJECTION: forcing a failure. [ 808.843410] name failslab, interval 1, probability 0, space 0, times 0 [ 808.864740] CPU: 0 PID: 17887 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 808.872581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.881956] Call Trace: [ 808.884604] dump_stack+0x197/0x210 [ 808.888269] should_fail.cold+0xa/0x1b 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x25, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 808.892194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 808.897361] ? lock_downgrade+0x880/0x880 [ 808.901545] __should_failslab+0x121/0x190 [ 808.905807] should_failslab+0x9/0x14 [ 808.909755] kmem_cache_alloc_node_trace+0x274/0x720 [ 808.914880] ? __alloc_skb+0xd5/0x5f0 [ 808.918715] __kmalloc_node_track_caller+0x3d/0x80 [ 808.923673] __kmalloc_reserve.isra.0+0x40/0xf0 [ 808.928368] __alloc_skb+0x10b/0x5f0 [ 808.932104] ? skb_trim+0x190/0x190 [ 808.935751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 10:23:46 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r2, r3, 0x0) r4 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="215e7241081000354ee39deab8957a2a44f69034746a24e8b5b938bc48971f4ee4476a02c4e4d1aeeaf74104bfbfc1d87a2f670e71b778b480b6f3ccfb8b49fe9a37280c8f9608f85b6e796cf248cc8114ed14b37b27c6ffab733c9024c22f20a98906fad61c05029f7e8c64ae970ccb8c9ee0f4befdff8369379eb735f6957cd845", 0x82, r2) keyctl$instantiate(0xc, r4, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESDEC]], 0x1, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 808.940789] ? skb_put+0x183/0x1e0 [ 808.944356] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 808.949401] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.953763] ? ip6_setup_cork+0x1860/0x1860 [ 808.958114] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 808.962980] ? lock_downgrade+0x880/0x880 [ 808.967168] ip6_make_skb+0x32f/0x561 [ 808.970994] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.975357] ? ip_reply_glue_bits+0xc0/0xc0 [ 808.979708] ? ip6_push_pending_frames+0xf0/0xf0 [ 808.984489] ? find_held_lock+0x35/0x130 [ 808.988583] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 808.993456] ? ip6_dst_lookup_flow+0x220/0x220 [ 808.998083] udpv6_sendmsg+0x225b/0x2a00 [ 809.002317] ? ip_reply_glue_bits+0xc0/0xc0 [ 809.006762] ? udp_v6_get_port+0x6b0/0x6b0 [ 809.010398] encrypted_key: insufficient parameters specified [ 809.011024] ? __local_bh_enable_ip+0x15a/0x270 [ 809.011041] ? _raw_spin_unlock_bh+0x31/0x40 [ 809.011053] ? __local_bh_enable_ip+0x15a/0x270 [ 809.011077] ? mark_held_locks+0x100/0x100 [ 809.026525] encrypted_key: insufficient parameters specified 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x26, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 809.030609] ? mark_held_locks+0x100/0x100 [ 809.030627] ? _raw_spin_unlock_bh+0x31/0x40 [ 809.030655] ? release_sock+0x156/0x1c0 [ 809.030685] ? __local_bh_enable_ip+0x15a/0x270 [ 809.030699] ? _raw_spin_unlock_bh+0x31/0x40 [ 809.030721] inet_sendmsg+0x141/0x5d0 [ 809.066336] ? inet_sendmsg+0x141/0x5d0 [ 809.070333] ? ipip_gro_receive+0x100/0x100 [ 809.074671] sock_sendmsg+0xd7/0x130 [ 809.078426] ___sys_sendmsg+0x803/0x920 [ 809.082442] ? copy_msghdr_from_user+0x430/0x430 [ 809.087223] ? lock_downgrade+0x880/0x880 10:23:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "e60bf07c8113e6393a831aee2532bec3"}, 0x11, 0x3) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x34000) [ 809.091488] ? kasan_check_read+0x11/0x20 [ 809.095660] ? __fget+0x367/0x540 [ 809.099151] ? __fget_light+0x1a9/0x230 [ 809.103322] ? __fdget+0x1b/0x20 [ 809.106724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 809.112290] __sys_sendmsg+0x105/0x1d0 [ 809.116206] ? __ia32_sys_shutdown+0x80/0x80 [ 809.120759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 809.125540] ? do_syscall_64+0x26/0x620 [ 809.129538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.134921] ? do_syscall_64+0x26/0x620 [ 809.138929] __x64_sys_sendmsg+0x78/0xb0 [ 809.143023] do_syscall_64+0xfd/0x620 [ 809.146848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.152064] RIP: 0033:0x45af49 [ 809.155275] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 809.174193] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 809.181923] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 809.189215] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 809.196506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 809.203795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 809.211088] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:46 executing program 2 (fault-call:3 fault-nth:25): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000240)=[{0x0, 0x6}, {0x3, 0xfffd}], 0x2, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semctl$GETALL(r0, 0x0, 0xd, 0x0) semctl$SEM_STAT_ANY(r0, 0x1, 0x14, &(0x7f0000000000)=""/112) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 10:23:46 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x100e}, 0x0) 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x27, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) 10:23:46 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1100}, 0x0) 10:23:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x100000) [ 809.415917] FAULT_INJECTION: forcing a failure. [ 809.415917] name failslab, interval 1, probability 0, space 0, times 0 [ 809.452396] CPU: 0 PID: 17930 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 10:23:46 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x642102, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x11}}, 0x6, 0x8, 0x1ff, 0x6, 0x3}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r2, 0xfffffffe}, 0x8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x28, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 809.460248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.469619] Call Trace: [ 809.472231] dump_stack+0x197/0x210 [ 809.475908] should_fail.cold+0xa/0x1b [ 809.479822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 809.484950] ? lock_downgrade+0x880/0x880 [ 809.489129] __should_failslab+0x121/0x190 [ 809.493387] should_failslab+0x9/0x14 [ 809.497208] kmem_cache_alloc_node+0x26c/0x710 [ 809.501811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 809.507379] __alloc_skb+0xd5/0x5f0 [ 809.511035] ? skb_trim+0x190/0x190 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x29, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 809.514685] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 809.519740] ? skb_put+0x183/0x1e0 [ 809.523308] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 809.525793] encrypted_key: master key parameter is missing [ 809.528347] ? ip_reply_glue_bits+0xc0/0xc0 [ 809.528376] ? ip6_setup_cork+0x1860/0x1860 [ 809.528400] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 809.528422] ip6_make_skb+0x32f/0x561 [ 809.528437] ? ip_reply_glue_bits+0xc0/0xc0 [ 809.528457] ? ip_reply_glue_bits+0xc0/0xc0 [ 809.528475] ? ip6_push_pending_frames+0xf0/0xf0 10:23:46 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400102, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x70, r1, 0x51c, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5f7b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4050}, 0x2000) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 809.528497] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 809.539162] encrypted_key: master key parameter is missing [ 809.542751] ? retint_kernel+0x2d/0x2d [ 809.542779] ? ip6_dst_lookup_flow+0x220/0x220 [ 809.583724] udpv6_sendmsg+0x225b/0x2a00 [ 809.587820] ? ip_reply_glue_bits+0xc0/0xc0 [ 809.592178] ? udp_v6_get_port+0x6b0/0x6b0 [ 809.596458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 809.601255] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 809.605878] ? retint_kernel+0x2d/0x2d [ 809.609784] ? trace_hardirqs_on_caller+0x6a/0x220 10:23:46 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2a, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 809.614757] ? release_sock+0x156/0x1c0 [ 809.618774] ? __local_bh_enable_ip+0x15a/0x270 [ 809.623471] ? _raw_spin_unlock_bh+0x31/0x40 [ 809.627910] inet_sendmsg+0x141/0x5d0 [ 809.631728] ? inet_sendmsg+0x141/0x5d0 [ 809.635727] ? ipip_gro_receive+0x100/0x100 [ 809.640068] sock_sendmsg+0xd7/0x130 [ 809.643811] ___sys_sendmsg+0x803/0x920 [ 809.647836] ? copy_msghdr_from_user+0x430/0x430 [ 809.652622] ? lock_downgrade+0x880/0x880 [ 809.654404] encrypted_key: master key parameter is missing [ 809.656789] ? kasan_check_read+0x11/0x20 [ 809.656812] ? __fget+0x367/0x540 [ 809.656843] ? __fget_light+0x1a9/0x230 [ 809.674029] ? __fdget+0x1b/0x20 [ 809.677411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 809.682969] __sys_sendmsg+0x105/0x1d0 [ 809.686879] ? __ia32_sys_shutdown+0x80/0x80 [ 809.691325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 809.696105] ? do_syscall_64+0x26/0x620 [ 809.700100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.705487] ? do_syscall_64+0x26/0x620 [ 809.709486] __x64_sys_sendmsg+0x78/0xb0 [ 809.712242] encrypted_key: master key parameter is missing [ 809.713567] do_syscall_64+0xfd/0x620 [ 809.713586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.713602] RIP: 0033:0x45af49 [ 809.731393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 809.750316] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 809.758050] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 809.765344] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 809.772635] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 809.780049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 809.787341] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:47 executing program 2 (fault-call:3 fault-nth:26): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x400300) 10:23:47 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2b, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000180), 0xffffffffffffffbf}, 0x0) 10:23:47 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = getpid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r1, r0, 0x1b, &(0x7f00000002c0)) waitid(0x0, r1, &(0x7f0000000000), 0x2, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000080)={0xa, {0x9, 0x1, 0x7}}, 0xa) 10:23:47 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1586}, 0x0) 10:23:47 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2c, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 809.956333] encrypted_key: master key parameter is missing [ 809.979648] FAULT_INJECTION: forcing a failure. [ 809.979648] name failslab, interval 1, probability 0, space 0, times 0 10:23:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf0ff7f) [ 810.007937] encrypted_key: master key parameter is missing [ 810.037225] CPU: 1 PID: 17976 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 810.045078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.054452] Call Trace: [ 810.057063] dump_stack+0x197/0x210 [ 810.060717] should_fail.cold+0xa/0x1b [ 810.064638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 810.069774] ? lock_downgrade+0x880/0x880 [ 810.073961] __should_failslab+0x121/0x190 [ 810.078224] should_failslab+0x9/0x14 [ 810.082047] kmem_cache_alloc_node_trace+0x274/0x720 [ 810.087174] ? __alloc_skb+0xd5/0x5f0 [ 810.091005] __kmalloc_node_track_caller+0x3d/0x80 [ 810.095959] __kmalloc_reserve.isra.0+0x40/0xf0 [ 810.100653] __alloc_skb+0x10b/0x5f0 [ 810.104399] ? skb_trim+0x190/0x190 10:23:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, r2, 0x20, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040080}, 0x90) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x54, r6, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x239, 0x1, @in={0x2, 0x0, @empty=0x700}}, {0x14, 0x2, @in6={0xa, 0x0, 0x0, @empty}}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x24a00020}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)={0xc4, r6, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0xfd67, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfeb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x77e0}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}]}, 0x1f5}, 0x1, 0x0, 0x0, 0x80}, 0x10) fsetxattr$security_selinux(r3, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:anacron_exec_t:s0\x00', 0xfffffffffffffeff, 0x2) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:47 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1662}, 0x0) 10:23:47 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40081, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x40002140, &(0x7f00000000c0)={0xa, 0x4e24, 0xf1c, @empty}, 0x1c) 10:23:47 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2d, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 810.108054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 810.113090] ? skb_put+0x183/0x1e0 [ 810.116653] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 810.121702] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.126058] ? ip6_setup_cork+0x1860/0x1860 [ 810.130410] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 810.135289] ? lock_downgrade+0x880/0x880 [ 810.135312] ip6_make_skb+0x32f/0x561 [ 810.135329] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.135351] ? ip_reply_glue_bits+0xc0/0xc0 10:23:47 executing program 2 (fault-call:3 fault-nth:27): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:47 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1afe}, 0x0) 10:23:47 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2e, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1000000) 10:23:47 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xffffffffffffff5f, 0xfffffffffffffffe) [ 810.135373] ? ip6_push_pending_frames+0xf0/0xf0 [ 810.135396] ? find_held_lock+0x35/0x130 [ 810.135419] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 810.135441] ? ip6_dst_lookup_flow+0x220/0x220 [ 810.135465] udpv6_sendmsg+0x225b/0x2a00 [ 810.135488] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.135511] ? udp_v6_get_port+0x6b0/0x6b0 [ 810.135528] ? __local_bh_enable_ip+0x15a/0x270 [ 810.135543] ? _raw_spin_unlock_bh+0x31/0x40 [ 810.135558] ? __local_bh_enable_ip+0x15a/0x270 [ 810.135583] ? mark_held_locks+0x100/0x100 10:23:47 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x2f, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 810.135599] ? mark_held_locks+0x100/0x100 [ 810.135612] ? _raw_spin_unlock_bh+0x31/0x40 10:23:47 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:47 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1e05}, 0x0) [ 810.135643] ? release_sock+0x156/0x1c0 [ 810.135674] ? __local_bh_enable_ip+0x15a/0x270 [ 810.135691] ? _raw_spin_unlock_bh+0x31/0x40 [ 810.135715] inet_sendmsg+0x141/0x5d0 [ 810.135730] ? inet_sendmsg+0x141/0x5d0 [ 810.135747] ? ipip_gro_receive+0x100/0x100 [ 810.135766] sock_sendmsg+0xd7/0x130 [ 810.135786] ___sys_sendmsg+0x803/0x920 [ 810.135808] ? copy_msghdr_from_user+0x430/0x430 [ 810.135830] ? lock_downgrade+0x880/0x880 [ 810.135852] ? kasan_check_read+0x11/0x20 [ 810.135872] ? __fget+0x367/0x540 [ 810.135904] ? __fget_light+0x1a9/0x230 [ 810.135920] ? __fdget+0x1b/0x20 [ 810.135935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 810.135953] __sys_sendmsg+0x105/0x1d0 [ 810.135966] ? __ia32_sys_shutdown+0x80/0x80 [ 810.135992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 810.136007] ? do_syscall_64+0x26/0x620 [ 810.136020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.136035] ? do_syscall_64+0x26/0x620 [ 810.136053] __x64_sys_sendmsg+0x78/0xb0 [ 810.136070] do_syscall_64+0xfd/0x620 [ 810.136090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.136102] RIP: 0033:0x45af49 [ 810.136119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 810.136127] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 810.136143] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 810.136152] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 810.136161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 810.136170] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 810.136179] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 810.202266] encrypted_key: master key parameter is missing [ 810.213371] encrypted_key: master key parameter is missing [ 810.256183] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 810.256193] Invalid UDP bearer configuration [ 810.256214] Enabling of bearer rejected, failed to enable media [ 810.473055] FAULT_INJECTION: forcing a failure. [ 810.473055] name failslab, interval 1, probability 0, space 0, times 0 [ 810.473154] CPU: 0 PID: 18022 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 810.473165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.473171] Call Trace: [ 810.473193] dump_stack+0x197/0x210 [ 810.473219] should_fail.cold+0xa/0x1b [ 810.473243] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 810.473263] ? lock_downgrade+0x880/0x880 [ 810.473291] __should_failslab+0x121/0x190 [ 810.473309] should_failslab+0x9/0x14 [ 810.473323] kmem_cache_alloc_node+0x26c/0x710 [ 810.473343] ? ip_generic_getfrag+0x190/0x230 [ 810.473372] __alloc_skb+0xd5/0x5f0 [ 810.473392] ? skb_trim+0x190/0x190 [ 810.473412] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 810.473429] ? skb_put+0x183/0x1e0 [ 810.473451] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 810.473476] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.473505] ? ip6_setup_cork+0x1860/0x1860 [ 810.473525] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 810.473548] ip6_make_skb+0x32f/0x561 [ 810.473563] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.473585] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.473606] ? ip6_push_pending_frames+0xf0/0xf0 [ 810.473619] ? retint_kernel+0x2d/0x2d [ 810.473643] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 810.473665] ? ip6_dst_lookup_flow+0x220/0x220 [ 810.473688] udpv6_sendmsg+0x225b/0x2a00 [ 810.473711] ? ip_reply_glue_bits+0xc0/0xc0 [ 810.473733] ? udp_v6_get_port+0x6b0/0x6b0 [ 810.473748] ? __local_bh_enable_ip+0x15a/0x270 [ 810.473759] ? _raw_spin_unlock_bh+0x31/0x40 [ 810.473772] ? __local_bh_enable_ip+0x15a/0x270 [ 810.473795] ? mark_held_locks+0x100/0x100 [ 810.473812] ? mark_held_locks+0x100/0x100 [ 810.473825] ? _raw_spin_unlock_bh+0x31/0x40 [ 810.473853] ? release_sock+0x156/0x1c0 [ 810.473885] ? __local_bh_enable_ip+0x15a/0x270 [ 810.473900] ? _raw_spin_unlock_bh+0x31/0x40 [ 810.473923] inet_sendmsg+0x141/0x5d0 [ 810.473937] ? inet_sendmsg+0x141/0x5d0 [ 810.473953] ? ipip_gro_receive+0x100/0x100 [ 810.473971] sock_sendmsg+0xd7/0x130 [ 810.473989] ___sys_sendmsg+0x803/0x920 [ 810.474010] ? copy_msghdr_from_user+0x430/0x430 [ 810.474029] ? lock_downgrade+0x880/0x880 [ 810.474047] ? kasan_check_read+0x11/0x20 [ 810.474066] ? __fget+0x367/0x540 [ 810.474097] ? __fget_light+0x1a9/0x230 [ 810.474113] ? __fdget+0x1b/0x20 [ 810.474128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 810.474146] __sys_sendmsg+0x105/0x1d0 [ 810.474160] ? __ia32_sys_shutdown+0x80/0x80 [ 810.474180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 810.474209] __x64_sys_sendmsg+0x78/0xb0 [ 810.474225] ? do_syscall_64+0x5b/0x620 [ 810.474242] do_syscall_64+0xfd/0x620 [ 810.474259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.474268] RIP: 0033:0x45af49 [ 810.474282] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 810.474291] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 810.474306] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 810.474314] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 810.474323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 810.474331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:23:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2000000) 10:23:48 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x30, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:48 executing program 2 (fault-call:3 fault-nth:28): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:48 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1eb4}, 0x0) 10:23:48 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000040)={0x80, 0x9, 0x32, "26889afb996003317d844ec25708110a30e5439e64cfa5451c45934ddc9fc99a4f288965901cfc867579246111bc3aa15b3d3ffd09b17d24d8f0b8c1", 0xc, "983238bc76470f1d9d6fef74cb3ce563f3d14fb5cf6482d5e654afae531523169b3a84f8b3b98569e775b4ef6c39476993582a41f7b6a68891f463c6", 0x80}) [ 810.474339] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 810.682960] encrypted_key: master key parameter is missing [ 810.845921] encrypted_key: master key parameter is missing [ 810.856377] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 811.208591] Invalid UDP bearer configuration [ 811.208621] Enabling of bearer rejected, failed to enable media [ 811.262217] encrypted_key: master key parameter is missing [ 811.285418] FAULT_INJECTION: forcing a failure. [ 811.285418] name failslab, interval 1, probability 0, space 0, times 0 [ 811.306077] encrypted_key: master key parameter is missing [ 811.328676] CPU: 1 PID: 18051 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 811.336526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.345897] Call Trace: [ 811.348511] dump_stack+0x197/0x210 [ 811.352171] should_fail.cold+0xa/0x1b [ 811.356088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 811.361340] ? lock_downgrade+0x880/0x880 [ 811.365529] __should_failslab+0x121/0x190 [ 811.369817] should_failslab+0x9/0x14 [ 811.373637] kmem_cache_alloc_node_trace+0x274/0x720 [ 811.378772] ? __alloc_skb+0xd5/0x5f0 [ 811.382611] __kmalloc_node_track_caller+0x3d/0x80 [ 811.387566] __kmalloc_reserve.isra.0+0x40/0xf0 [ 811.392262] __alloc_skb+0x10b/0x5f0 [ 811.395999] ? skb_trim+0x190/0x190 [ 811.399650] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 811.404687] ? skb_put+0x183/0x1e0 [ 811.408253] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 811.413296] ? ip_reply_glue_bits+0xc0/0xc0 [ 811.417650] ? ip6_setup_cork+0x1860/0x1860 [ 811.421996] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 811.426860] ? lock_downgrade+0x880/0x880 [ 811.431034] ip6_make_skb+0x32f/0x561 [ 811.434862] ? ip_reply_glue_bits+0xc0/0xc0 [ 811.439207] ? ip_reply_glue_bits+0xc0/0xc0 [ 811.443553] ? ip6_push_pending_frames+0xf0/0xf0 [ 811.448327] ? find_held_lock+0x35/0x130 [ 811.452412] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 811.457283] ? ip6_dst_lookup_flow+0x220/0x220 [ 811.461907] udpv6_sendmsg+0x225b/0x2a00 [ 811.465993] ? ip_reply_glue_bits+0xc0/0xc0 [ 811.470358] ? udp_v6_get_port+0x6b0/0x6b0 [ 811.474610] ? __local_bh_enable_ip+0x15a/0x270 [ 811.479290] ? _raw_spin_unlock_bh+0x31/0x40 [ 811.484076] ? __local_bh_enable_ip+0x15a/0x270 [ 811.488784] ? mark_held_locks+0x100/0x100 [ 811.493041] ? mark_held_locks+0x100/0x100 [ 811.497290] ? _raw_spin_unlock_bh+0x31/0x40 [ 811.501740] ? release_sock+0x156/0x1c0 [ 811.505763] ? __local_bh_enable_ip+0x15a/0x270 [ 811.510457] ? _raw_spin_unlock_bh+0x31/0x40 [ 811.514902] inet_sendmsg+0x141/0x5d0 [ 811.517939] encrypted_key: master key parameter is missing [ 811.518728] ? inet_sendmsg+0x141/0x5d0 [ 811.518753] ? ipip_gro_receive+0x100/0x100 [ 811.518771] sock_sendmsg+0xd7/0x130 [ 811.518793] ___sys_sendmsg+0x803/0x920 [ 811.540944] ? copy_msghdr_from_user+0x430/0x430 [ 811.545728] ? lock_downgrade+0x880/0x880 [ 811.549917] ? kasan_check_read+0x11/0x20 [ 811.554088] ? __fget+0x367/0x540 [ 811.557577] ? __fget_light+0x1a9/0x230 [ 811.561571] ? __fdget+0x1b/0x20 [ 811.564959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 811.570517] __sys_sendmsg+0x105/0x1d0 [ 811.574429] ? __ia32_sys_shutdown+0x80/0x80 [ 811.578877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 811.583677] ? do_syscall_64+0x26/0x620 [ 811.587675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.593079] ? do_syscall_64+0x26/0x620 [ 811.597082] __x64_sys_sendmsg+0x78/0xb0 [ 811.601167] do_syscall_64+0xfd/0x620 [ 811.604990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.610418] RIP: 0033:0x45af49 10:23:48 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2000}, 0x0) 10:23:48 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x31, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3000000) 10:23:48 executing program 3: statx(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x2000, 0x80, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) setfsgid(r2) setregid(r0, r2) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:48 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2076}, 0x0) 10:23:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4000000) [ 811.613630] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 811.632546] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 811.640277] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 811.647564] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 811.654853] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 811.662149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 811.669436] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:49 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x71dc570edc3f0d9, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x5000000) 10:23:49 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x25ee}, 0x0) 10:23:49 executing program 2 (fault-call:3 fault-nth:29): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x32, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6000000) [ 811.767343] encrypted_key: master key parameter is missing [ 811.797923] encrypted_key: master key parameter is missing 10:23:49 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2657}, 0x0) 10:23:49 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3000000064ef64b891571f9538f11e03ee9c28cf6526d7a58514702406b2d0fbafc3f6138bb804d46aa21c34d33a49ce26657953a922253c160c9cd55ac143535632f410098a4b867ffe02c6196272bc76ce1a531f91a94b4bb683c1fa50e54513c2fc738cca4e0f914b24e78e0088404c8f512ff22324f39c46467bab41d4ba5e0831c8e1d862ca50a86a01a97c9f7bc7b7a4ac5b3d630b02a0048d89f824438e18e26322c1381f308b68989a4eb1ffc815e6ea5fbc52047969cebc964446121bf0fc9c1ceb597b8ff07e2d", @ANYRES16=0x0, @ANYBLOB="00032abd7000540000004b00000008007700c80400000600f78adeabd5000600a800090000000400ff00"], 0x30}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000004) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 10:23:49 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x33, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e0a, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 811.993102] encrypted_key: master key parameter is missing [ 812.009444] FAULT_INJECTION: forcing a failure. [ 812.009444] name failslab, interval 1, probability 0, space 0, times 0 [ 812.041647] encrypted_key: master key parameter is missing 10:23:49 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2b66}, 0x0) [ 812.079433] CPU: 0 PID: 18108 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 812.087300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.096677] Call Trace: [ 812.099445] dump_stack+0x197/0x210 [ 812.103132] should_fail.cold+0xa/0x1b [ 812.107567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 812.112695] ? lock_downgrade+0x880/0x880 [ 812.116873] __should_failslab+0x121/0x190 [ 812.121129] should_failslab+0x9/0x14 [ 812.124951] kmem_cache_alloc_node+0x26c/0x710 10:23:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x11, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x1ff, 0xc10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9fd3}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 812.129557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 812.135111] __alloc_skb+0xd5/0x5f0 [ 812.138752] ? skb_trim+0x190/0x190 [ 812.142392] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 812.147449] ? skb_put+0x183/0x1e0 [ 812.151021] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 812.156066] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.160422] ? ip6_setup_cork+0x1860/0x1860 [ 812.164885] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 812.169748] ? lock_downgrade+0x880/0x880 [ 812.173927] ip6_make_skb+0x32f/0x561 10:23:49 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e2b, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 812.177749] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.182090] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.186434] ? ip6_push_pending_frames+0xf0/0xf0 [ 812.191219] ? find_held_lock+0x35/0x130 [ 812.195309] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 812.200441] ? ip6_dst_lookup_flow+0x220/0x220 [ 812.205049] udpv6_sendmsg+0x225b/0x2a00 [ 812.209133] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.213484] ? udp_v6_get_port+0x6b0/0x6b0 [ 812.217742] ? __local_bh_enable_ip+0x15a/0x270 [ 812.222425] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.226851] ? __local_bh_enable_ip+0x15a/0x270 [ 812.231551] ? mark_held_locks+0x100/0x100 [ 812.235803] ? mark_held_locks+0x100/0x100 [ 812.240049] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.244485] ? release_sock+0x156/0x1c0 [ 812.248493] ? __local_bh_enable_ip+0x15a/0x270 [ 812.253181] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.258144] inet_sendmsg+0x141/0x5d0 [ 812.262053] ? inet_sendmsg+0x141/0x5d0 [ 812.266049] ? ipip_gro_receive+0x100/0x100 [ 812.270402] sock_sendmsg+0xd7/0x130 [ 812.274145] ___sys_sendmsg+0x803/0x920 [ 812.278148] ? copy_msghdr_from_user+0x430/0x430 [ 812.282933] ? lock_downgrade+0x880/0x880 [ 812.287105] ? kasan_check_read+0x11/0x20 [ 812.291274] ? __fget+0x367/0x540 [ 812.294765] ? __fget_light+0x1a9/0x230 [ 812.298762] ? __fdget+0x1b/0x20 [ 812.302165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 812.307728] __sys_sendmsg+0x105/0x1d0 [ 812.311631] ? __ia32_sys_shutdown+0x80/0x80 [ 812.316078] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 812.320857] ? do_syscall_64+0x26/0x620 [ 812.324845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.330226] ? do_syscall_64+0x26/0x620 [ 812.334228] __x64_sys_sendmsg+0x78/0xb0 [ 812.338313] do_syscall_64+0xfd/0x620 [ 812.342130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.347348] RIP: 0033:0x45af49 [ 812.350556] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 812.369474] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:49 executing program 2 (fault-call:3 fault-nth:30): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x202000, 0x0) recvmsg$kcm(r0, 0x0, 0xe6f099855eae8512) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:49 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 812.377192] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 812.384479] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 812.391769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 812.399054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 812.406354] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x66d0000) 10:23:49 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001400)=ANY=[@ANYBLOB="1c0000001ce5f9a654f596af106be8a576ed4c4a296fc3cb7c6a95c4cfe9c63698b6727f51892f706919510caa4266ec6f8816f68f6513d62a242bad1100f910108573596410a6b555e6f92084404825b080e3d9199667382ee9038d8d89493407e24c4190610d7990cbd7c7c9b6182ac81511d7a6b089c9b236d5130de382025dcb96829ab418c5b39b0846c92fcbe688aface98f6690e6184c5873d83d32226c9afacc1f9df2ba6efc04", @ANYRES16=r3, @ANYBLOB="fa8def8ae58242ed0635e5d3391623c715030000884c61fd61d595868874b5120815c0eb000014f84df6950cd6ba9033e0d2b0127d15c9ad04adc9c72d9e968b57921f83"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_ANTENNA_TX={0x8, 0x69, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2400e800}, 0x84) r4 = socket$inet(0x2, 0x4000000805, 0x0) dup(r0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={r6, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r6, 0x17000000}, &(0x7f0000000040)=0x8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffc) 10:23:49 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2ea9}, 0x0) [ 812.556427] FAULT_INJECTION: forcing a failure. [ 812.556427] name failslab, interval 1, probability 0, space 0, times 0 10:23:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x204400, 0x0) connect$l2tp(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 812.630732] CPU: 1 PID: 18153 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 812.638588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.647956] Call Trace: [ 812.650567] dump_stack+0x197/0x210 [ 812.654227] should_fail.cold+0xa/0x1b [ 812.658146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 812.663288] ? lock_downgrade+0x880/0x880 [ 812.667497] __should_failslab+0x121/0x190 [ 812.671757] should_failslab+0x9/0x14 [ 812.675582] kmem_cache_alloc_node_trace+0x274/0x720 [ 812.680708] ? __alloc_skb+0xd5/0x5f0 [ 812.684538] __kmalloc_node_track_caller+0x3d/0x80 [ 812.689493] __kmalloc_reserve.isra.0+0x40/0xf0 [ 812.694220] __alloc_skb+0x10b/0x5f0 [ 812.697950] ? skb_trim+0x190/0x190 [ 812.701591] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 812.706619] ? skb_put+0x183/0x1e0 [ 812.710185] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 812.715224] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.719614] ? ip6_setup_cork+0x1860/0x1860 [ 812.723959] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 812.728827] ? lock_downgrade+0x880/0x880 [ 812.733002] ip6_make_skb+0x32f/0x561 [ 812.736821] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.741171] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.745520] ? ip6_push_pending_frames+0xf0/0xf0 [ 812.750292] ? find_held_lock+0x35/0x130 [ 812.754376] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 812.759236] ? ip6_dst_lookup_flow+0x220/0x220 [ 812.763844] udpv6_sendmsg+0x225b/0x2a00 [ 812.767930] ? ip_reply_glue_bits+0xc0/0xc0 [ 812.772265] ? udp_v6_get_port+0x6b0/0x6b0 [ 812.776504] ? __local_bh_enable_ip+0x15a/0x270 [ 812.781880] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.786305] ? __local_bh_enable_ip+0x15a/0x270 [ 812.791024] ? mark_held_locks+0x100/0x100 [ 812.795313] ? mark_held_locks+0x100/0x100 [ 812.799580] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.804064] ? release_sock+0x156/0x1c0 [ 812.808077] ? __local_bh_enable_ip+0x15a/0x270 [ 812.812769] ? _raw_spin_unlock_bh+0x31/0x40 [ 812.817208] inet_sendmsg+0x141/0x5d0 [ 812.821114] ? inet_sendmsg+0x141/0x5d0 [ 812.825111] ? ipip_gro_receive+0x100/0x100 [ 812.829466] sock_sendmsg+0xd7/0x130 [ 812.833217] ___sys_sendmsg+0x803/0x920 [ 812.837220] ? copy_msghdr_from_user+0x430/0x430 [ 812.842001] ? lock_downgrade+0x880/0x880 [ 812.846172] ? kasan_check_read+0x11/0x20 [ 812.850350] ? __fget+0x367/0x540 [ 812.853838] ? __fget_light+0x1a9/0x230 [ 812.857834] ? __fdget+0x1b/0x20 [ 812.861215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 812.866763] __sys_sendmsg+0x105/0x1d0 [ 812.870666] ? __ia32_sys_shutdown+0x80/0x80 [ 812.875107] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:23:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'vlan0\x00', {0x1}, 0x400}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000100)=0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) move_pages(r4, 0x9, &(0x7f0000000200)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil], &(0x7f0000000300)=[0xd9, 0x6, 0x80000000, 0x7, 0x101, 0x400], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7000000) 10:23:50 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x30de}, 0x0) 10:23:50 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x364c}, 0x0) 10:23:50 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3656}, 0x0) [ 812.879894] ? do_syscall_64+0x26/0x620 [ 812.883890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.889280] ? do_syscall_64+0x26/0x620 [ 812.893300] __x64_sys_sendmsg+0x78/0xb0 [ 812.897389] do_syscall_64+0xfd/0x620 [ 812.901216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.906421] RIP: 0033:0x45af49 [ 812.909716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 812.928726] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 812.936458] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 812.943832] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 812.951118] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 812.958409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 812.965803] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:50 executing program 2 (fault-call:3 fault-nth:31): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:50 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r3}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x8000, 0xfff, 0x4, 0x90, 0x1, 0x5, [], r3, 0xffffffffffffffff, 0x4, 0x4}, 0x3c) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r4, 0x0) r5 = add_key(&(0x7f0000000380)='logon\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="eb449cd00a7fea23949eb72e8b84058354dcc30a7a60c31f31d14b3f05f4f9a9698f8423a0a9b599f84bb936c39b7b2ba17862f5b3c7ad707f840d36a4a7023caeb5ff60eac275a1bc1e47d828bd1ff23ec9f03f6fd4450ad895c38cf23a85264209e08f7f48c5715eb3836324548bd53752cca25dbb2b82a19182a9ce0191858e82145bc9e305625d1159c83d6cf8b62dbe07ec323e6a49a8bf7d035e01dd66556b9ae68a475cf776d019274810ca15b04ade1573b7dc08dba0135c307c95f6a06a", 0xc2, r0) add_key(&(0x7f0000000080)='.dead\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000500)="ea0d6b0200000040ebf129d5b74c457f04e049c196b0b15bc5ef8aa5412f206c4ec2e7acb64d83405da8b3eeecea8e457f6810fc68dd52b8f2ea65b7f474d6ca9035e18af9c36fff5437312836f05f52a97270f5cb0f3de020a034cd22518c40fd94f268db7ab43d31f92b93f46c609f0e45f0c0e06ed37c25978606c0ef19442d", 0xfffffffffffffeae, r5) 10:23:50 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:50 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3bce}, 0x0) 10:23:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x980000, 0x9, 0x4, r1, 0x0, &(0x7f0000000040)={0x9e0902, 0x4, [], @p_u32=&(0x7f0000000000)=0x5}}) ioctl$SNDCTL_DSP_SPEED(r2, 0xc0045002, &(0x7f0000000140)=0x1) 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8000000) [ 813.121977] batman_adv: Cannot find parent device 10:23:50 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 813.172588] FAULT_INJECTION: forcing a failure. [ 813.172588] name failslab, interval 1, probability 0, space 0, times 0 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9000000) [ 813.231916] batman_adv: Cannot find parent device [ 813.243160] CPU: 1 PID: 18204 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 813.251030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.260531] Call Trace: [ 813.263151] dump_stack+0x197/0x210 [ 813.266821] should_fail.cold+0xa/0x1b [ 813.270797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 813.275926] ? lock_downgrade+0x880/0x880 [ 813.280111] __should_failslab+0x121/0x190 [ 813.284372] should_failslab+0x9/0x14 [ 813.288195] kmem_cache_alloc_node+0x26c/0x710 [ 813.292796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 813.298362] __alloc_skb+0xd5/0x5f0 [ 813.302016] ? skb_trim+0x190/0x190 [ 813.305656] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 813.310695] ? skb_put+0x183/0x1e0 [ 813.314261] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 813.319315] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.323872] ? ip6_setup_cork+0x1860/0x1860 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa000000) [ 813.328219] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 813.333078] ? lock_downgrade+0x880/0x880 [ 813.337264] ip6_make_skb+0x32f/0x561 [ 813.341089] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.345436] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.349781] ? ip6_push_pending_frames+0xf0/0xf0 [ 813.354556] ? find_held_lock+0x35/0x130 [ 813.358639] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 813.363501] ? ip6_dst_lookup_flow+0x220/0x220 [ 813.368109] udpv6_sendmsg+0x225b/0x2a00 [ 813.372205] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.376812] ? udp_v6_get_port+0x6b0/0x6b0 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe000000) [ 813.381064] ? __local_bh_enable_ip+0x15a/0x270 [ 813.385750] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.390182] ? __local_bh_enable_ip+0x15a/0x270 [ 813.394966] ? mark_held_locks+0x100/0x100 [ 813.399223] ? mark_held_locks+0x100/0x100 [ 813.403476] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.407915] ? release_sock+0x156/0x1c0 [ 813.411921] ? __local_bh_enable_ip+0x15a/0x270 [ 813.416606] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.421078] inet_sendmsg+0x141/0x5d0 [ 813.424896] ? inet_sendmsg+0x141/0x5d0 10:23:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0x40000000, 0x7, "156eaf29bbcaa0eb3b32fdef589d3aa2f73bb258ebda68dd4d79dea89d76c7ef", 0x2, 0x9, 0x101, 0xf923, 0xa8, 0x3, 0x7, 0x400, [0x80000001, 0xfffffffa, 0x2, 0x3f]}) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x2001, 0x0, 0x0, 0x5, 0xfffffffffffffffd, 0x6}, 0x0, 0x7, 0xffffffffffffffff, 0x12) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x7, 0x6, 0xfa}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe100000) [ 813.428885] ? ipip_gro_receive+0x100/0x100 [ 813.433222] sock_sendmsg+0xd7/0x130 [ 813.436961] ___sys_sendmsg+0x803/0x920 [ 813.440967] ? copy_msghdr_from_user+0x430/0x430 [ 813.445747] ? lock_downgrade+0x880/0x880 [ 813.449941] ? kasan_check_read+0x11/0x20 [ 813.454114] ? __fget+0x367/0x540 [ 813.457604] ? __fget_light+0x1a9/0x230 [ 813.461599] ? __fdget+0x1b/0x20 [ 813.464998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 813.470563] __sys_sendmsg+0x105/0x1d0 [ 813.474471] ? __ia32_sys_shutdown+0x80/0x80 [ 813.478915] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 813.483689] ? do_syscall_64+0x26/0x620 [ 813.487676] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.493052] ? do_syscall_64+0x26/0x620 [ 813.497053] __x64_sys_sendmsg+0x78/0xb0 [ 813.501162] do_syscall_64+0xfd/0x620 [ 813.504984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.510204] RIP: 0033:0x45af49 [ 813.513418] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.532453] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 813.540192] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 813.547486] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 813.554776] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 813.562090] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 813.569378] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:50 executing program 2 (fault-call:3 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xebf0000) 10:23:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0xffffffffffffff6b, &(0x7f0000000300)=[{&(0x7f0000000000)="5e49263257b02bbe4be1b08a6141a1d1a27e6f10c2c31a8037ec2ff87883dee6c99fc8745f2f5c6151b18ecda94ef8455f369acae52e82d10b6d038e06cfa81319a800d54edf108bc83b292889da5a"}, {&(0x7f0000000200)="38db64815b7913239330a1ba72f49075733bda89422682331dbbec4824a2527f9c1997b2680a8dd5bac3dab4d60d568e1bac2ca37d1bbefe24506a6692422832f09f56daf8386c43d5d7bbe99977ee75fc481f4880e5c10cf96bf40ad62ec386f8efef64f54638b60b979c959aa873c7c76365dce614548eb0c70ff1ff78f584593bd1fc40f5a4a3898d5dee92c1c1d8b3e79dac03e9f5f77a2b17f713e0d8d5841ea945", 0xfdff}, {&(0x7f0000000100)="bdbf47b5c5754cea27b5134e311c746c9852588ea366e2e03376e863c58089dba047fd7d7747fe8613674b951c3f0a2f91ce1511b68cd600d1c4446bcb3bb63f79e0b3e2689befbd20ccf103e7", 0x148}], 0x2b, &(0x7f0000000180)}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000340)={{0x6, @empty, 0x4e23, 0x2, 'dh\x00', 0x7, 0x3, 0x74}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e1e, 0x0, 0x9, 0x80000001, 0x1}}, 0x44) 10:23:50 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3e9e}, 0x0) 10:23:50 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 813.669199] FAULT_INJECTION: forcing a failure. [ 813.669199] name failslab, interval 1, probability 0, space 0, times 0 [ 813.685435] CPU: 1 PID: 18237 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 813.693282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.702692] Call Trace: [ 813.705309] dump_stack+0x197/0x210 [ 813.708970] should_fail.cold+0xa/0x1b [ 813.712910] ? fault_create_debugfs_attr+0x1e0/0x1e0 10:23:50 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x1, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 813.718042] ? lock_downgrade+0x880/0x880 [ 813.722225] __should_failslab+0x121/0x190 [ 813.726485] should_failslab+0x9/0x14 [ 813.730302] kmem_cache_alloc_node_trace+0x274/0x720 [ 813.739775] ? __alloc_skb+0xd5/0x5f0 [ 813.743618] __kmalloc_node_track_caller+0x3d/0x80 [ 813.748597] __kmalloc_reserve.isra.0+0x40/0xf0 [ 813.753300] __alloc_skb+0x10b/0x5f0 [ 813.757041] ? skb_trim+0x190/0x190 [ 813.760693] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 813.765739] ? skb_put+0x183/0x1e0 10:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x10000000) [ 813.769305] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 813.774361] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.778717] ? ip6_setup_cork+0x1860/0x1860 [ 813.783071] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 813.787938] ? lock_downgrade+0x880/0x880 [ 813.792229] ip6_make_skb+0x32f/0x561 [ 813.796056] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.800447] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.804799] ? ip6_push_pending_frames+0xf0/0xf0 [ 813.809602] ? find_held_lock+0x35/0x130 [ 813.813729] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 813.818626] ? ip6_dst_lookup_flow+0x220/0x220 [ 813.823238] udpv6_sendmsg+0x225b/0x2a00 [ 813.827333] ? ip_reply_glue_bits+0xc0/0xc0 [ 813.831683] ? udp_v6_get_port+0x6b0/0x6b0 [ 813.835941] ? __local_bh_enable_ip+0x15a/0x270 [ 813.840629] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.845063] ? __local_bh_enable_ip+0x15a/0x270 [ 813.849763] ? mark_held_locks+0x100/0x100 [ 813.854018] ? mark_held_locks+0x100/0x100 [ 813.858273] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.862845] ? release_sock+0x156/0x1c0 10:23:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x91000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$packet_buf(r1, 0x107, 0x19, &(0x7f0000000300)=""/184, &(0x7f0000000000)=0xb8) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e03, 0x1, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000200)=[{0xf8, 0x111, 0x7, "d6da523ab9a9b8e90cd305e155d5b7ff27df91723bdc75d58ce3c00b5fabcfd83595834d75224384841c8426164d73fa8ba53e554346fef037e50b338e132d5e11b911ef4d3a0fef0ed55092c86d81f1c2143939adacbbcf0061d5a2510a592f1fc69ddb2ffca5bc7683a29cb180b4e5056ca9a89fe7e0ac30d4e49cd5cce0f32d18a5c859dea052c438264adf5f860e8f7255c8ef839b3d380ea8c680c793d5a5befe6599d2448cd489652942a66a8f01d8c5676e9cca7441d0f853adf8dbfd4bef9d861956254bfa937086afb9e5a5ef6a50b2c88acf453edacf9e247a6a551c4a627639fd"}], 0xf8}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000100)={0x8001001, 0x9}) [ 813.866860] ? __local_bh_enable_ip+0x15a/0x270 [ 813.871546] ? _raw_spin_unlock_bh+0x31/0x40 [ 813.875982] inet_sendmsg+0x141/0x5d0 [ 813.879812] ? inet_sendmsg+0x141/0x5d0 [ 813.883802] ? ipip_gro_receive+0x100/0x100 [ 813.888145] sock_sendmsg+0xd7/0x130 [ 813.891878] ___sys_sendmsg+0x803/0x920 [ 813.895877] ? copy_msghdr_from_user+0x430/0x430 [ 813.900659] ? lock_downgrade+0x880/0x880 [ 813.904863] ? kasan_check_read+0x11/0x20 [ 813.909044] ? __fget+0x367/0x540 [ 813.912541] ? __fget_light+0x1a9/0x230 [ 813.916535] ? __fdget+0x1b/0x20 10:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x11000000) [ 813.919921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 813.925482] __sys_sendmsg+0x105/0x1d0 [ 813.930266] ? __ia32_sys_shutdown+0x80/0x80 [ 813.934712] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 813.939490] ? do_syscall_64+0x26/0x620 [ 813.943488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.948874] ? do_syscall_64+0x26/0x620 [ 813.952895] __x64_sys_sendmsg+0x78/0xb0 [ 813.956972] do_syscall_64+0xfd/0x620 [ 813.961065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.966271] RIP: 0033:0x45af49 10:23:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r5}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x40, r2, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 813.969479] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.988397] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 813.996127] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 814.003413] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 814.010725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 814.018010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 814.025304] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:51 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRES64, @ANYRESDEC, @ANYRES64=0x0, @ANYPTR64, @ANYRES16], @ANYRES64=r1, @ANYRES32, @ANYRES16, @ANYBLOB="9bca673be2574d425d62b2b19d1bb5fe334447c93a6ce6852a060a97cf98c7d8842b541fe4e5e7349c1b2253780986dc336c8e19db5edb57b670d1761e79f8b4", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESOCT=r2, @ANYRESHEX, @ANYPTR, @ANYBLOB="bca0d3ec9eb071990fbfa89344dc7871a34a7c97e13f732b491f6bce07da70d429f04dbb88750681d6081078108b6fa06776d5e11ff0e5fc4aefdbbeb6edc5a635677ef4a314871ca6fb214eea053e1034cc5c9238adffa671bedd8b40c44186b7e2a7d8d5fdcc4864be4c19da8e30c9abfd0d401b5e76ccd313a55f2c766afbdac39e2e4a6c237366c9463cb54c812542f1354c69cf62f0df4b1ce816da836d735086d6eb41f9d701549df8a6e8fc7c936104a7e808290562e6640eb6f605f830d9c17f5d94c12ec4f1e117ffc02e77497798503014f6211863080ccd4c97378abf4f8d6fbcab15185c7cd87015c70c118a57a548c5b97f8e1dfc57dc37efd76add31b2c666212894f983dbbdac95e6100ddce45e84db8d34e09d36e820b1998b0463fd9871e6ce642689fa800f6ebac9ef391697bf39314f953855f834d6b301310c017348e226e016e9bd9a6302e336969ed78bebe2d1e093cb19e91485dd726371348aa0693103fec39d2c75e75582dae5734ca6b5782d539f456368b75353e760daf68fd7aa96da9907fc557f2987285bc09cd937ae8d3f8b8494df6b87ee3ec33b27597734a337ac782a678e3504279833e56881e6984631e29610679323b22984128478f1fd82966a1293a523c41dbd8d50d3a6ace28940afb7e35b8f29d3856ea9dd000209d76bff6e324e9217a0c16e1246d18a336cdf0221526ac4d72e6e4c90fe609ed53c28122513f31d9991295c00f082eb93dd431a492d784556cbdcdc991b49b8c100fe9e0c9a1bbd3ec1e8eb3cae2cda5dd584be1df889f0ccc7afefcd9d201b3064bf0623ad2096bb24cefe15c42af88cd2bf58f5f0a0bf830a833d88fd85f290882610f562862928eefb5374fdcbb2506fcccb789c4a1045d0966ee953278c803eccafd1d2081ec928c880cadc8b229a72984ff5c1fbb491061cfed524f5deaaae8e7689d3ef9f534bd0fbe92600e9f281c3ed3c6ced4518abff6e30b1b1e5a4e5600c70c6d9139131f344e288504c05a2e1c3e17d8f7fe6634b07fa73460d7528c5f5fc39089e815f1fee3d0ccee04e26bf82d9f1a0c2e29d77acaf0c1dd2ded16485eb1ecefe25dcd65755b903c385394bdf082a0b24f75b1187f0c21e46dd75f442da77a5c2bdee1c0df18f3c621bca0dcceba3d2a67d8e4f58a8e8c44536daaef5d4e5049a7a246cf7b5861cae392dbc9b3d12858b74ecd6946536edbff110ad7d048ad7b0cc60eee1c2638ab9d22ebf0f31a7fb122d8ceb93c45bcc2fd9d96a4cdae75613007ee62d2d23857621b994c5e4a7860a50d62a3bc9ad036c39832f33b2f7a4324b30dea8e9b8f5d57175c8778b0eb16103c47f5a9c525803e7b61eef6224c17020fd1f4c14e62ade39442ac475281a2dfaf10be9d3ba33e7279eaade1960a617a74124e8e13122d44c01ac5ad467c0f7dc449a4648b5407117fa9eeaea6727a4e97ad15c1531f3b6190fb3fb9653b1f2b04e60e8dbcdab01451ca35d73ae4ed041b4e9615a976e00cf1d25ac263607ce95435dc6eaf292463987c97bff3935e9463efc619e7a72f8b116dccf483ea9dcc9e971fdf51525f1eb613fe1ae31301f1c9d49d784e721809d342af7aa7dd02d7ca83d88fd0b1b4cbad0cdcbaa4d653ad316782842f03629055e98874563d723dbaf6eb4ca4e3eb6dae0c0b772053d412f1ed53f00f3a5903ef8dc242353b6283dce6d66a56faa865d9886bed91138d950fe18f4586705a873b481978bac350741b66c09a03c72ab1c05f4fb967e46e355c271d5c65fddce5abfee9fa01415371dc340fa0cd60fcc82da78352ec3071342ad40836d489e33f2dae7db57d7ad3f50e9e9010dc616989b7a1c24c26f664324a49343712c19b1a427df85da022d35348dbce3d5a1a4e428951221e52fd4882db5329ad2b9d2e06cf90aa36c9ffc1787bdebac6ebc4d50c9169bc8ed173ccfb89f40c6b6f9d8ab2b3641480cba55287b2e24399aa32dfef69277056e50408e1c99b62f17396e3717c79db86e7cf3e2c8226e201006366d03b3546c6c49fe524847a7233ae7fd78e3967bfdcaf890b22d06b33a75edb397a0ec75e1affb0482882bb02fca30287cb41ca7b765d42466663c92dc4f2497de81dd005b7ee2c0358627e39a2c25b39364b0cad9a31c8997ba7ffe3a83cacb16518af2a09745476067fc6c2ab302ab80424b520344df250bd8c208dcd6c54c85e911ca4aff1948cd3d7036fde838a54fddc63e914ddc9d60342f8e67fea413404f4e05f9e58019d57759759d15f775f1e5d4efe688a526b1cdc7fc7a50132beadb0be4f40b9444e692581901de627267607d11311b9f09ed1e19881c9362fa1ec7cf93b4f65b8b97dd64907fd108a3fd1b1b3e9d3b761ed6d1795fa121aa80a8bee0429df2a4663921c5840d9b83fee783e0839cab1626c73bb9449c3960d9e9d923782a2efa17ad5077dd3822966e50cccbe3205f8029812bc6b4ad3be57ce34d81e85204ca0ef77cde65d4cd854e9d3d196546bf56069be4f4dbaee86bdb8d7324683ddee15eb8b68fbffe2e295b0a0f2eae16f44d6d842fd46311995d880918c8092b157cb97609f0b66044db6ec0396ba955f634208983a979d73a5ae3c255d1c2d50f93bff222a50554c6db726e003deea50efbb83799b753827424c3f7cc5d0a1daa90b8695e0e4b6ac3ee471dc5c3e63bccb8d394d07b5a27c8f4fa0de17ca2d3a181e22d91b15df948ad139e45a7546eb72490c0249948652076eccc922d3c23cd0fff4b8b0314325af48beca1c884af3ceebcedf70c72f3c9e8d4c7fd1fa970b3e7e5df677c7ffb96120b041f1b6b85e5842392db75b078db509464e244d052709f0e461ae1f5cce7a91c93aaeb3a57cef7acd71aebff76db03f252519186d18fbea84fe38b181695e6e3bf24ef2232356e938cbe6aca34ebe1c0fcf7850f5e12f8d0f6b0df042d41c2da3d26c0806e0039e220b29ccd0585dcbaf09e3ac72738b769a6b16743a5fceded48731faa65f2982b7a7220e0881f92f2c4f8f3de85ea555b203305e2068420a505431e614efdcf9b902b66eb22301074312f8f0de65414851104067942606d44d8d3200eefb03ee1165d1f185b9d5cee63ed4ba03aefd0f907199a375d5c9567d2a08214c5c9f3c1cc13887d644685df66f886bc8f4380d54e46110e50553b4f34450f51c410bdd503f9ef98135e9030d3d3b3cf62e0711c00f66bf481807f4db07f21e20bc98f76dfbf7a8216766751db74ed882cfb3531cd9c9ef99af9d9eb7533d42e31e8b685e408282851776fcfbde29d1a512d4c1ce4039ca2eccb5a328dc7dba56fdf3b79fcbc658c3f13bea528bf0e1285380f315ffe18709b8bd479f80a0380867e3f534d9a8c152c10d87b616ddb5d89465050e109311f0eb17a9d01f2a70ad2d358da8bf497177b640d29bece4c4976cbb746a581e1c72ffe9ed0ae9cd8e5041a749e09ba7eddb49d433099a996f51e836f3104bc6274df3710caefa1dbf1ae35a70892bf6d1dac82208d3430ab9fbe55815d20da5ff241538ea3a52adec289481714a5caa139d645504931b1e7e3f245f2eb67b556e8e0c0722f767a282287867031419a3fd115f86d4be0ddbc44af1bc8da01e2d4addd0b0154f3a4f99dc41bb72229da0e92c283cda1e994dc45e219cd95ec608723be648374efd84e22ffd650dff759b4147e3c60be15d1972e160fed8194ddb13174e92f525014f965e17de5e64b4bfd8e4b9f7d26ca8a90d51044278e36d9b3a3ab12f398a0518f0e93f8dadd0f4bd3660bf07276948602051ccaa34f8b6af9c4583e3f4b507e4fba4ab0aed7f9414ee74c0bb98e6fe963001ebb831b4f70fe23daa18b8ca3b954fbe7b6aee9a4259ceb947229d4c2e28060dc0491c73b98a174a2cc2825d05291fa9d8ef1128886c6812252c8bfd23437c4179dcd2919ac44e4994489281d51c0d6933127094887cdb2863cafd61cc21b6211577f784adcd29d2daa5f3fec62f2810da3dd95ed8a6039f462eb684c7a6188e145f006693ae95fe8fed202e6f8e5a0559feed18edbf89a824e955648a3a8b00370f251d5634e3594fe89103e36b3a3f7a585cd410e60c8a7db3b0bc63d9d256116afb282ea449787258af35a9fb8c1bdc7ca0b975e01041a1be2b17a3d6be13cdf14bfe0abeebf316522ff3e702c72e45844a00bf0f738d717e3680a5e91d4f259e10dd511b1e9722085b199726aea7e5e0ed1b6dc862a34b31cecf97e17de42380790f3d644aa9d0e0f2ac769ed523434df1cbcd2af1dd9aff6e6f41c9c08c554d49693694ef57fc122765bab1a3cdf8c3cd7e39789f881dd7423d2b347de5a03632cc5abfcade996079e77f7b3c997b95f1237b8f97e1f4d3893709701b0d78f00fd704c7da28d820590922b3cead0f85a96d10a73bfa4384704b4cedcd8e6488a5586e5c4d95bf47e0bd170c52f3773a133eb1534632d02496aeefa7a63bfbf8086b015bc3dd4a82f2eafc0da62401839d88d917c061a55c6738836e49bda8b5db76c1e82bf689d8fd289c9606ab78dbe0c1894bf6dfc912437d1d59e4381d2d9d87ebd216b220769337c03c47352d83f2c58d39ffd88f0474f3c29487a2fa6ec45aa6980313d284bbc3d898daad61d1516dbc73c509a0f85a4b1ca6f091dd8836a87b697075b18fb466543d7e6b8732ccdd8e1519b013950925fbfac38f863a78b47e2bb64990c6917dd27af2f9508ed08516297901f126bca81f7588fce28819baad92c9b4a477309e601919f3fc9a2888436ce9ff45541d8c4c9f053889e21744215ee0c042e61645574a56f0a0e51d3dd54974a150acb9aceecd2d787b6ecec0fbdb2620e8d4236cce07b88069c556e11114eb0a0bf107ba91048bca7311fa21276f06404ed57ad6c6ed73a3ac95ceb9364b9040efdf4d775317a63dba9de947067ca546c86a1626e857995e806a01ae7de86c9475d12307119282589018bc2179c6a272213e3a1eff4ea0642f9b183a3ac6e9a4c20d9c6faa96ac98aebdcf6c1ca866eb5bd0fc314dd3c546161788f5b7eee6e1f3e8105a4f618ca409a8102de8acbc3bc86eae904caa92b9606355d68cd0def17b6f96296f505f2679c98e0de960c349f2f3d33346e4a8cc4ad453d6e59f6054b402e6825820a57f3146036f2d22b4e6117cb9d84df06cfdfc475050bcc0e70e9795234179d53ff736e3a177fd90181e11ca8429281b66a90e6c923a4083bd2b04621b2cdce9153180699c5bb8eb3dc32a54fa2a7e5fb19b401c7f0ad8636949d4cf20c7c4947be82c51fe3d1573d14f98c09c5483b61b1d77dddc9aaa4caf856b6f08f5ce8e93855698d5030a41c5b72768cc2f04b7c693dc3d9185493a3857ce9866cd8d490c5919fb11ea2266bd638dcf2628f5b13225648f7f58a813883ffd9f5e199b320be263b3af64d7cea11768872fe0868696ba280c7dad57e8753b403d626124d44d9d1834cdfc6e8ff4b17627337ec239fdc0f7db374a71be6a74424d3eefda37767654817ccf30561511e468693acfd69c3cb20e13817436d2d87b1a92b5c3017fe338650bde8c730a87c53912f5bc7cce80860768c79166921944ce7293aeb118492118273fdd1a4861a244f07b35f6dd01cba8f1dfb892ea731747e146c973983b8d67509069b933bc3feb0488121b851cdd498fc3769a1531fc427d8b11a12e868c46aec875c07d98698ecbc70d871efd4abd79e617f54bc1a83f235d33908239b5d66ec8f44f8a873d397f3dab00eca8eee8b4482", @ANYRES64]]], 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000210}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r4, 0xc14, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'tunl0\x00'}]}, 0x38}}, 0x4040092) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 814.084356] encrypted_key: insufficient parameters specified [ 814.208285] encrypted_key: insufficient parameters specified [ 814.221803] batman_adv: Cannot find parent device 10:23:51 executing program 2 (fault-call:3 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:51 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3f00}, 0x0) 10:23:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x16620000) 10:23:51 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:51 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000000)=0x7) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001400)=ANY=[@ANYBLOB="1c0000001ce5f9a654f596af106be8a576ed4c4a296fc3cb7c6a95c4cfe9c63698b6727f51892f706919510caa4266ec6f8816f68f6513d62a242bad1100f910108573596410a6b555e6f92084404825b080e3d9199667382ee9038d8d89493407e24c4190610d7990cbd7c7c9b6182ac81511d7a6b089c9b236d5130de382025dcb96829ab418c5b39b0846c92fcbe688aface98f6690e6184c5873d83d32226c9afacc1f9df2ba6efc04", @ANYRES16=r3, @ANYBLOB="fa8def8ae58242ed0635e5d3391623c715030000884c61fd61d595868874b5120815c0eb000014f84df6950cd6ba9033e0d2b0127d15c9ad04adc9c72d9e968b57921f83"], 0x3}}, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) sendmsg$NL80211_CMD_NEW_STATION(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x48, r3, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x80000000, 0x3}}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x1}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r5}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x252e}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x1d1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) [ 814.362741] encrypted_key: master key parameter is missing [ 814.403613] batman_adv: Cannot find parent device [ 814.415819] FAULT_INJECTION: forcing a failure. [ 814.415819] name failslab, interval 1, probability 0, space 0, times 0 [ 814.423902] encrypted_key: master key parameter is missing [ 814.431699] CPU: 0 PID: 18292 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 814.440529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.449895] Call Trace: [ 814.452509] dump_stack+0x197/0x210 [ 814.456165] should_fail.cold+0xa/0x1b [ 814.460077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 814.465204] ? lock_downgrade+0x880/0x880 [ 814.469374] __should_failslab+0x121/0x190 [ 814.473624] should_failslab+0x9/0x14 [ 814.477442] kmem_cache_alloc_node+0x26c/0x710 [ 814.482045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 814.487605] __alloc_skb+0xd5/0x5f0 [ 814.491241] ? skb_trim+0x190/0x190 [ 814.494885] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 814.499944] ? skb_put+0x183/0x1e0 [ 814.503506] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 814.508526] ? ip_reply_glue_bits+0xc0/0xc0 [ 814.512851] ? ip6_setup_cork+0x1860/0x1860 [ 814.517167] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 814.522003] ? lock_downgrade+0x880/0x880 [ 814.526146] ip6_make_skb+0x32f/0x561 [ 814.529938] ? ip_reply_glue_bits+0xc0/0xc0 [ 814.534255] ? ip_reply_glue_bits+0xc0/0xc0 [ 814.538586] ? ip6_push_pending_frames+0xf0/0xf0 [ 814.543350] ? retint_kernel+0x2d/0x2d [ 814.547240] udpv6_sendmsg+0x225b/0x2a00 [ 814.551298] ? ip_reply_glue_bits+0xc0/0xc0 [ 814.555633] ? udp_v6_get_port+0x6b0/0x6b0 [ 814.559898] ? __local_bh_enable_ip+0x15a/0x270 [ 814.564705] ? _raw_spin_unlock_bh+0x31/0x40 [ 814.569116] ? __local_bh_enable_ip+0x15a/0x270 [ 814.573811] ? mark_held_locks+0x100/0x100 [ 814.578045] ? mark_held_locks+0xb1/0x100 [ 814.582205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 814.587001] ? release_sock+0x156/0x1c0 [ 814.591003] ? __local_bh_enable_ip+0x15a/0x270 [ 814.595686] ? _raw_spin_unlock_bh+0x31/0x40 [ 814.600097] inet_sendmsg+0x141/0x5d0 [ 814.603913] ? inet_sendmsg+0x141/0x5d0 [ 814.607887] ? ipip_gro_receive+0x100/0x100 [ 814.612220] sock_sendmsg+0xd7/0x130 [ 814.615929] ___sys_sendmsg+0x803/0x920 [ 814.619902] ? copy_msghdr_from_user+0x430/0x430 [ 814.624744] ? lock_downgrade+0x880/0x880 [ 814.628900] ? __fget+0x345/0x540 [ 814.632347] ? __fget+0x367/0x540 [ 814.635812] ? __fget_light+0x1a9/0x230 [ 814.639792] ? __fdget+0x1b/0x20 [ 814.643149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 814.648681] __sys_sendmsg+0x105/0x1d0 [ 814.652563] ? __ia32_sys_shutdown+0x80/0x80 [ 814.656972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 814.661723] ? do_syscall_64+0x26/0x620 [ 814.665688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.671044] ? do_syscall_64+0x26/0x620 [ 814.675026] __x64_sys_sendmsg+0x78/0xb0 [ 814.679083] do_syscall_64+0xfd/0x620 [ 814.682891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.688074] RIP: 0033:0x45af49 10:23:51 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4000}, 0x0) [ 814.691256] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 814.710148] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 814.717846] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 814.725118] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 814.732389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 814.739646] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 814.746919] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:52 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r2, &(0x7f0000000040)=ANY=[@ANYBLOB="6e657720f77b64ae644b2dbee11aa6929d9b3af0aab622d94b541df32dfdc3ec934cfd1365666175"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') [ 814.849022] encrypted_key: insufficient parameters specified 10:23:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1e050000) 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4146}, 0x0) 10:23:52 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x8, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 814.898204] encrypted_key: insufficient parameters specified 10:23:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x191000, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000280)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="80c91f6a", @ANYRES16=r1, @ANYBLOB="000426bd7000fedbdf250200000014000300fe8000000000000000000000000000bb080005007f000001"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40400004}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x60028025) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001980)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000001a40)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2080090}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x20, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r5 = openat(r4, &(0x7f0000003c80)='./file0\x00', 0x101002, 0x247) setsockopt$inet_dccp_int(r5, 0x21, 0xb, &(0x7f0000003cc0)=0x401, 0x4) recvmsg$kcm(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/133, 0x85}, {&(0x7f00000006c0)=""/252, 0xfc}], 0x2, &(0x7f00000007c0)=""/4096, 0x1000}, 0x40000000) r6 = socket$kcm(0xa, 0x0, 0x11) write$binfmt_aout(r6, &(0x7f0000001a80)={{0x10b, 0x5, 0x40, 0x77, 0xfb, 0xae, 0x130, 0x9}, "6095638ec9edf2e3a22f9fe4c23ebefea23cafea83dc025a5e", [[], [], [], [], [], []]}, 0x639) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r7, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$IPSET_CMD_FLUSH(r7, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x104008}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x4, 0x6, 0x300, 0x70bd2b, 0x25dfdbfe, {0x5, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x88000}, 0x40040) sendmsg$kcm(r6, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000017c0)="45af19b6e3ab6e7e7859973d306fff953108235e45d07b12a7831bd68bc5e9fbac2fde24e5c0536696972aa93dbeb2621a267539bcab4b494f86b3d0736861eb34da4718e4ac792f85a014246151a14167cc79beb00b9de42af89ca4924fd7d1e6575297bb6b213f6973502948c141db64abdac6f10c37cd78bff8090ded669931f3dafa613990e4119c823d18f146", 0x8f}, {&(0x7f0000001880)="0315488a3eba8e4234a86de8d8d42a1a0d14bedacdb893401b397c375b9a1ddc3021c8d07b28bac772103f88b5a6ffbeeb8906849d52b551edb8e153f969e78c211a11651f238a0ee4922a9a54545daed4d1bbb79138af69a2c5e836396cb6548333a382353f0a6d13df2f3b162e4c53739d30af7e7f2ae6df64ae326ae36fe663624df89e098161123173b44cd5840ec38bbbb41ba4f5bbe78f071ea98e2067dca14f9baf3b73bce145694363a4b01859cb99515245c4fece44cd693e3601798ce4d9ac66dbc04d603dacbf1cc9707c887b40ed74fcb5a1e720c4aa8846d3", 0xdf}], 0x2, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 2 (fault-call:3 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e0000000000000000156c74"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1eb40000) 10:23:52 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4641}, 0x0) 10:23:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000500)=0x10080) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="cb9703761ff29aa5032a60dcfc8808bf", 0x8}}, [0x6, 0x7fff, 0x0, 0x9, 0x43d2, 0x3, 0x10000, 0xe4c6, 0x100, 0xfffffffffffffffd, 0x4, 0x7, 0x7, 0x3, 0x6]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x9cb, 0x8101, 0xeeb6, 0x6, 0x6, 0xffff, 0x401, r3}, 0x20) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000300)=0x4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x24, r5, 0x100, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0xd2a7}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r6, 0x800442d4, &(0x7f0000000540)=0x8) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r7, &(0x7f0000000480)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80, &(0x7f0000000340), 0x28f, &(0x7f0000000180), 0x2b2}, 0x0) [ 815.184049] encrypted_key: insufficient parameters specified [ 815.218477] encrypted_key: insufficient parameters specified 10:23:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x20000000) 10:23:52 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x46be}, 0x0) [ 815.286838] FAULT_INJECTION: forcing a failure. [ 815.286838] name failslab, interval 1, probability 0, space 0, times 0 [ 815.319395] CPU: 1 PID: 18346 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 815.327250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.336657] Call Trace: [ 815.339366] dump_stack+0x197/0x210 [ 815.343067] should_fail.cold+0xa/0x1b [ 815.346975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 815.352098] ? lock_downgrade+0x880/0x880 [ 815.356266] __should_failslab+0x121/0x190 [ 815.360528] should_failslab+0x9/0x14 [ 815.364352] kmem_cache_alloc_node_trace+0x274/0x720 [ 815.369808] ? __alloc_skb+0xd5/0x5f0 [ 815.373653] __kmalloc_node_track_caller+0x3d/0x80 [ 815.378617] __kmalloc_reserve.isra.0+0x40/0xf0 [ 815.383516] __alloc_skb+0x10b/0x5f0 [ 815.387263] ? skb_trim+0x190/0x190 [ 815.393174] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 815.398217] ? skb_put+0x183/0x1e0 [ 815.401779] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 815.406834] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.411195] ? ip6_setup_cork+0x1860/0x1860 [ 815.415549] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 815.420459] ? lock_downgrade+0x880/0x880 [ 815.424778] ip6_make_skb+0x32f/0x561 [ 815.428602] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.432961] ? ip_reply_glue_bits+0xc0/0xc0 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4c36}, 0x0) [ 815.437312] ? ip6_push_pending_frames+0xf0/0xf0 [ 815.442088] ? find_held_lock+0x35/0x130 [ 815.446218] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 815.451086] ? ip6_dst_lookup_flow+0x220/0x220 [ 815.455691] udpv6_sendmsg+0x225b/0x2a00 [ 815.459777] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.464132] ? udp_v6_get_port+0x6b0/0x6b0 [ 815.468385] ? __local_bh_enable_ip+0x15a/0x270 [ 815.473074] ? _raw_spin_unlock_bh+0x31/0x40 [ 815.477504] ? __local_bh_enable_ip+0x15a/0x270 [ 815.482216] ? mark_held_locks+0x100/0x100 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4e93}, 0x0) [ 815.486468] ? mark_held_locks+0x100/0x100 [ 815.490713] ? _raw_spin_unlock_bh+0x31/0x40 [ 815.495155] ? release_sock+0x156/0x1c0 [ 815.499169] ? __local_bh_enable_ip+0x15a/0x270 [ 815.503856] ? _raw_spin_unlock_bh+0x31/0x40 [ 815.508289] inet_sendmsg+0x141/0x5d0 [ 815.512117] ? inet_sendmsg+0x141/0x5d0 [ 815.516124] ? ipip_gro_receive+0x100/0x100 [ 815.520470] sock_sendmsg+0xd7/0x130 [ 815.524208] ___sys_sendmsg+0x803/0x920 [ 815.528207] ? copy_msghdr_from_user+0x430/0x430 [ 815.532995] ? lock_downgrade+0x880/0x880 10:23:52 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x10, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 815.537163] ? kasan_check_read+0x11/0x20 [ 815.541337] ? __fget+0x367/0x540 [ 815.544829] ? __fget_light+0x1a9/0x230 [ 815.548822] ? __fdget+0x1b/0x20 [ 815.552208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 815.557772] __sys_sendmsg+0x105/0x1d0 [ 815.561680] ? __ia32_sys_shutdown+0x80/0x80 [ 815.566118] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 815.570914] ? do_syscall_64+0x26/0x620 [ 815.574900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.580279] ? do_syscall_64+0x26/0x620 [ 815.584277] __x64_sys_sendmsg+0x78/0xb0 [ 815.588357] do_syscall_64+0xfd/0x620 [ 815.592178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.597390] RIP: 0033:0x45af49 [ 815.600599] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 815.619552] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 815.627282] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 815.634569] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 815.641903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 815.649438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 815.656727] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:52 executing program 2 (fault-call:3 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x51ae}, 0x0) 10:23:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x20000180) 10:23:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x453, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x16b) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x15, "73fc946549b37294f97d5725a30d26759ddeaab0530715df213845b9adee4c988f4165e0764e3c386f07b1e7338a36b845e67cd1011ea408db5a2cd9743da5c57d8b0756537e208f479b8c9b47d6fa0c27453a258e4b932283c6378952681c40c93164599670982135d45db7185c705cfc16e1cce62fc29571b4a5e26be5"}, 0x2db, &(0x7f0000000140)=[{&(0x7f0000000200)="9b52126eaa94808f122f81dee60b41ed5c1f3e7d4d243e416cd2ed0443513d2c1cdac15578bd40a5b49aad3ca40edf5cbcafaa90ac46d9b1f3ef76929642b793445b94c69287ea986ebcd730574ac903e9c215f216a67225fd4b65482f439105aa5ce71a8e39b4bed2f417e9463caaa30a2e8f52c16ad75f6a1b305fcfc90bc1aca847e9a3460776eae03d106af42ccf3726c68d40e2f7b0bf17fb889c5abf8661e8a1bff8dac8eb5ba842a126057ccee364709375edde6a2592c1a827666e7c418ae6e2e201dfba3f71a482fcf91f51af5f290f7d538aabba625bb33d01f281396b977d83d1d5b15d1084003f078127ec"}], 0x0, &(0x7f0000000040), 0xca}, 0x20000040) 10:23:52 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6577b85c39cf0e8222b4b8332ca8ee92f8dd2064656661756c74"], 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000080), 0x8, &(0x7f00000001c0)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:52 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x11, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 815.778721] encrypted_key: insufficient parameters specified [ 815.809588] FAULT_INJECTION: forcing a failure. [ 815.809588] name failslab, interval 1, probability 0, space 0, times 0 10:23:53 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5636}, 0x0) 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x26570000) [ 815.860613] CPU: 1 PID: 18390 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 815.868469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.877839] Call Trace: [ 815.880458] dump_stack+0x197/0x210 [ 815.884117] should_fail.cold+0xa/0x1b [ 815.888039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 815.893169] ? lock_downgrade+0x880/0x880 [ 815.897361] __should_failslab+0x121/0x190 [ 815.901638] should_failslab+0x9/0x14 [ 815.906418] kmem_cache_alloc_node+0x26c/0x710 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2ea90000) [ 815.911022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 815.916583] __alloc_skb+0xd5/0x5f0 [ 815.920235] ? skb_trim+0x190/0x190 [ 815.923880] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 815.928920] ? skb_put+0x183/0x1e0 [ 815.932484] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 815.937524] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.941894] ? ip6_setup_cork+0x1860/0x1860 [ 815.946249] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 815.951127] ? lock_downgrade+0x880/0x880 [ 815.955311] ip6_make_skb+0x32f/0x561 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x364c0000) [ 815.959130] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.963479] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.967823] ? ip6_push_pending_frames+0xf0/0xf0 [ 815.972602] ? find_held_lock+0x35/0x130 [ 815.976686] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 815.981552] ? ip6_dst_lookup_flow+0x220/0x220 [ 815.986161] udpv6_sendmsg+0x225b/0x2a00 [ 815.990266] ? ip_reply_glue_bits+0xc0/0xc0 [ 815.994617] ? udp_v6_get_port+0x6b0/0x6b0 [ 815.998877] ? __local_bh_enable_ip+0x15a/0x270 [ 816.003565] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.007995] ? __local_bh_enable_ip+0x15a/0x270 [ 816.012698] ? mark_held_locks+0x100/0x100 [ 816.016955] ? mark_held_locks+0x100/0x100 [ 816.021205] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.025646] ? release_sock+0x156/0x1c0 [ 816.029682] ? __local_bh_enable_ip+0x15a/0x270 [ 816.034372] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.038810] inet_sendmsg+0x141/0x5d0 [ 816.042631] ? inet_sendmsg+0x141/0x5d0 [ 816.046623] ? ipip_gro_receive+0x100/0x100 [ 816.050964] sock_sendmsg+0xd7/0x130 [ 816.054700] ___sys_sendmsg+0x803/0x920 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3e9e0000) 10:23:53 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x60, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 816.058700] ? copy_msghdr_from_user+0x430/0x430 [ 816.063478] ? lock_downgrade+0x880/0x880 [ 816.067640] ? kasan_check_read+0x11/0x20 [ 816.071809] ? __fget+0x367/0x540 [ 816.075298] ? __fget_light+0x1a9/0x230 [ 816.079318] ? __fdget+0x1b/0x20 [ 816.082701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 816.088266] __sys_sendmsg+0x105/0x1d0 [ 816.092177] ? __ia32_sys_shutdown+0x80/0x80 [ 816.096636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 816.101402] ? do_syscall_64+0x26/0x620 [ 816.105381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.110762] ? do_syscall_64+0x26/0x620 [ 816.114764] __x64_sys_sendmsg+0x78/0xb0 [ 816.118851] do_syscall_64+0xfd/0x620 [ 816.122677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.127879] RIP: 0033:0x45af49 [ 816.131104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 816.150054] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 816.157787] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 816.165079] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 816.172539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 816.179830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 816.187122] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:53 executing program 2 (fault-call:3 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:53 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x300, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2921d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) ioctl(r0, 0xffffffffffffffb0, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x29, 0x5, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r2, 0x81204101, &(0x7f0000000300)) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x10000213, &(0x7f0000000180)}, 0x40000) 10:23:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4008094}, 0x24048044) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3f000000) 10:23:53 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5726}, 0x0) [ 816.361403] encrypted_key: master key parameter is missing 10:23:53 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x500, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:53 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5c9e}, 0x0) [ 816.408995] encrypted_key: master key parameter is missing [ 816.443318] FAULT_INJECTION: forcing a failure. [ 816.443318] name failslab, interval 1, probability 0, space 0, times 0 [ 816.484046] CPU: 0 PID: 18439 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 816.491899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.501275] Call Trace: [ 816.503902] dump_stack+0x197/0x210 [ 816.507564] should_fail.cold+0xa/0x1b [ 816.511485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 816.516631] ? lock_downgrade+0x880/0x880 [ 816.520816] __should_failslab+0x121/0x190 [ 816.525074] should_failslab+0x9/0x14 [ 816.528898] kmem_cache_alloc_node_trace+0x274/0x720 [ 816.534022] ? __alloc_skb+0xd5/0x5f0 [ 816.537852] __kmalloc_node_track_caller+0x3d/0x80 [ 816.542810] __kmalloc_reserve.isra.0+0x40/0xf0 [ 816.547509] __alloc_skb+0x10b/0x5f0 [ 816.548000] encrypted_key: master key parameter is missing [ 816.551249] ? skb_trim+0x190/0x190 [ 816.551270] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 816.551290] ? skb_put+0x183/0x1e0 [ 816.559327] batman_adv: Cannot find parent device [ 816.560544] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 816.560568] ? ip_reply_glue_bits+0xc0/0xc0 [ 816.583299] ? ip6_setup_cork+0x1860/0x1860 [ 816.587648] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 816.593728] ? lock_downgrade+0x880/0x880 [ 816.597903] ip6_make_skb+0x32f/0x561 [ 816.601725] ? ip_reply_glue_bits+0xc0/0xc0 [ 816.606075] ? ip_reply_glue_bits+0xc0/0xc0 [ 816.610424] ? ip6_push_pending_frames+0xf0/0xf0 [ 816.615201] ? find_held_lock+0x35/0x130 [ 816.619292] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 816.624162] ? ip6_dst_lookup_flow+0x220/0x220 [ 816.628772] udpv6_sendmsg+0x225b/0x2a00 [ 816.632860] ? ip_reply_glue_bits+0xc0/0xc0 [ 816.637216] ? udp_v6_get_port+0x6b0/0x6b0 [ 816.641501] ? __local_bh_enable_ip+0x15a/0x270 [ 816.646188] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.650615] ? __local_bh_enable_ip+0x15a/0x270 [ 816.655316] ? mark_held_locks+0x100/0x100 [ 816.659572] ? mark_held_locks+0x100/0x100 [ 816.663820] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.668350] ? release_sock+0x156/0x1c0 [ 816.672367] ? __local_bh_enable_ip+0x15a/0x270 [ 816.677235] ? _raw_spin_unlock_bh+0x31/0x40 [ 816.681683] inet_sendmsg+0x141/0x5d0 [ 816.685594] ? inet_sendmsg+0x141/0x5d0 [ 816.689593] ? ipip_gro_receive+0x100/0x100 [ 816.693937] sock_sendmsg+0xd7/0x130 [ 816.697674] ___sys_sendmsg+0x803/0x920 [ 816.701821] ? copy_msghdr_from_user+0x430/0x430 [ 816.706639] ? lock_downgrade+0x880/0x880 [ 816.710815] ? kasan_check_read+0x11/0x20 [ 816.715142] ? __fget+0x367/0x540 [ 816.718645] ? __fget_light+0x1a9/0x230 [ 816.722650] ? __fdget+0x1b/0x20 [ 816.726038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 816.731619] __sys_sendmsg+0x105/0x1d0 [ 816.735538] ? __ia32_sys_shutdown+0x80/0x80 [ 816.739985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 816.744936] ? do_syscall_64+0x26/0x620 [ 816.748935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.754321] ? do_syscall_64+0x26/0x620 [ 816.758325] __x64_sys_sendmsg+0x78/0xb0 [ 816.762414] do_syscall_64+0xfd/0x620 [ 816.766243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.771448] RIP: 0033:0x45af49 [ 816.774658] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 816.793574] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 816.801300] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 816.808581] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 816.815872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 816.823160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:23:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x48, &(0x7f0000000000)=""/72, 0x8e, &(0x7f0000000200)=""/142, 0x25, &(0x7f0000000100)=""/37}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvme-fabrics\x00', 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="dd07140000ecff0000000f000000"], 0x14}}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100004000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x8c, r5, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r6}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x30008000}, 0x8000) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r11, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$EVIOCGSW(r11, 0x8040451b, &(0x7f00000004c0)=""/117) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="20001200100001006970366772657461700000000c00020008000100", @ANYRES32=r10, @ANYBLOB], 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r7, 0x4ee546a801c7bbc2, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0xffffffffffffffff}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) 10:23:53 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x4, @remote, 0x1}], 0x1c) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$SIOCRSGCAUSE(r4, 0x89e0, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:23:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x40000000) 10:23:53 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x51e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 816.830805] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 816.850924] encrypted_key: master key parameter is missing 10:23:54 executing program 2 (fault-call:3 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5e88}, 0x0) 10:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x46410000) 10:23:54 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x578, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000080)={0x10001, &(0x7f0000000000)="cc6544db44abf9c971637a5440e4b1880f501d41430515cc2303661bfa0ed074cf89dbe17edf0dc22549a547e84001566c073e7664d5927a25c31a18c347a232945478835b5c0df091ed35a0a191ccfcfefc9c0cc2819f2a907e"}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 816.950142] batman_adv: Cannot find parent device 10:23:54 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6000}, 0x0) [ 816.989664] FAULT_INJECTION: forcing a failure. [ 816.989664] name failslab, interval 1, probability 0, space 0, times 0 [ 817.021114] CPU: 0 PID: 18482 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 817.028974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 10:23:54 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5a8, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4d16ff7f) [ 817.038347] Call Trace: [ 817.040958] dump_stack+0x197/0x210 [ 817.045225] should_fail.cold+0xa/0x1b [ 817.049145] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 817.054311] ? lock_downgrade+0x880/0x880 [ 817.058494] __should_failslab+0x121/0x190 [ 817.062756] should_failslab+0x9/0x14 [ 817.066584] kmem_cache_alloc_node+0x26c/0x710 [ 817.071197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 817.076773] __alloc_skb+0xd5/0x5f0 [ 817.080456] ? skb_trim+0x190/0x190 [ 817.084106] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 817.089150] ? skb_put+0x183/0x1e0 [ 817.092722] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 817.097780] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.102137] ? ip6_setup_cork+0x1860/0x1860 [ 817.106484] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 817.111350] ? lock_downgrade+0x880/0x880 [ 817.115796] ip6_make_skb+0x32f/0x561 [ 817.119642] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.123997] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.128353] ? ip6_push_pending_frames+0xf0/0xf0 [ 817.133134] ? find_held_lock+0x35/0x130 [ 817.137224] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 817.142100] ? ip6_dst_lookup_flow+0x220/0x220 [ 817.146714] udpv6_sendmsg+0x225b/0x2a00 [ 817.150806] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.155169] ? udp_v6_get_port+0x6b0/0x6b0 [ 817.160463] ? __local_bh_enable_ip+0x15a/0x270 [ 817.165280] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.169709] ? __local_bh_enable_ip+0x15a/0x270 [ 817.174406] ? mark_held_locks+0x100/0x100 [ 817.178662] ? mark_held_locks+0x100/0x100 [ 817.182920] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.187362] ? release_sock+0x156/0x1c0 [ 817.191378] ? __local_bh_enable_ip+0x15a/0x270 [ 817.196067] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.200504] inet_sendmsg+0x141/0x5d0 [ 817.204326] ? inet_sendmsg+0x141/0x5d0 [ 817.208758] ? ipip_gro_receive+0x100/0x100 [ 817.213101] sock_sendmsg+0xd7/0x130 [ 817.216841] ___sys_sendmsg+0x803/0x920 [ 817.222324] ? copy_msghdr_from_user+0x430/0x430 [ 817.227099] ? lock_downgrade+0x880/0x880 [ 817.231262] ? kasan_check_read+0x11/0x20 [ 817.235448] ? __fget+0x367/0x540 [ 817.238945] ? __fget_light+0x1a9/0x230 [ 817.243098] ? __fdget+0x1b/0x20 [ 817.246568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 817.252107] __sys_sendmsg+0x105/0x1d0 [ 817.256007] ? __ia32_sys_shutdown+0x80/0x80 [ 817.260422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 817.265172] ? do_syscall_64+0x26/0x620 [ 817.269143] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.274948] ? do_syscall_64+0x26/0x620 [ 817.278923] __x64_sys_sendmsg+0x78/0xb0 [ 817.282980] do_syscall_64+0xfd/0x620 [ 817.286774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.291998] RIP: 0033:0x45af49 [ 817.295193] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 817.314306] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 817.322015] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 817.329285] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:23:54 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x600, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4e930000) 10:23:54 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6216}, 0x0) [ 817.336557] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 817.343816] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 817.351103] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r2, r1, 0x1b, &(0x7f00000002c0)) ptrace(0xffffffffffffffff, r1) r3 = getpgid(r1) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000001c0)={{0x8, 0x3, 0xfff, 0x8, '\x00', 0x7}, 0x5, 0x20000004, 0x1, r3, 0x4, 0x7fff, 'syz0\x00', &(0x7f00000000c0)=['encrypted\x00', '[\x00', '%eth1keyring\x00', 'syz'], 0x1c, [], [0xfffe, 0x6, 0xe8, 0xe63]}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000004c0)={0xdb, 0x3, 0x0, "851d36c878745f91bce9ee7744797812f6814b23263a66260848d229f152dfac6da13e7bc9e1ded181f47dd2efbb88500c7e55c67b831099aafc31d8", 0x35, "da459406947f512a3a71398e695e118b263d2f5fc381fe9888a0e3f4411f6ed90586e74f3f0ad2194755b4124989be15f830b0ea4849e48fbc640359", 0x10}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000003c0)={0x7, 0xfffffffe, {r1}, {r5}, 0x2cd, 0xfffffffffffffad2}) socket$nl_crypto(0x10, 0x3, 0x15) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e4577e4474fec61756c74dfe7e4ef23828d0816088bbb0100010000000000fdbdf9e423dbff93aeeeae9a564eb121c6488e9d498e4d801b9800012086539d485544a99904007f378f3fb3f1ec37fcdbec2dd96a8447751e877a3df6c056fcd93150f87c3df6dec796e3c90cbd207cf4ec7c0b5bfde25100d6437d8494a56297ca4aa2142ffc9e23d9e59c9d31f8"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) 10:23:54 executing program 2 (fault-call:3 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @rand_addr="5e8ff477f114870be0b181440291bb21", 0xd}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="ef64bfa8993edbf5de80a637ad28089ac09889dfd1ca5e638936b48dba45a4db9b5ced24f1b0aacaa799ffc8689ac2d78daba5efab1df27c8af126d6406b", 0x3e}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1220}, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xeb7, 0x1) 10:23:54 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x662b}, 0x0) 10:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x56360000) 10:23:54 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x66d, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:54 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='security.capability\x00', &(0x7f00000005c0)=@v1={0x1000000, [{0xfffffffd, 0xe4e}]}, 0xc, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/201, 0xc9}, {&(0x7f00000002c0)=""/132, 0x84}, {&(0x7f0000000380)=""/104, 0x68}, {&(0x7f00000004c0)=""/165, 0xa5}], 0x4, 0x100) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000000)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x16, 0xc, 0x17, 0x8, 0x4, 0x800, 0x2, 0x133}}) preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 817.586839] FAULT_INJECTION: forcing a failure. [ 817.586839] name failslab, interval 1, probability 0, space 0, times 0 [ 817.623303] encrypted_key: master key parameter is missing [ 817.629767] CPU: 1 PID: 18516 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 817.637596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.646965] Call Trace: [ 817.649760] dump_stack+0x197/0x210 [ 817.650699] encrypted_key: master key parameter is missing [ 817.653450] should_fail.cold+0xa/0x1b [ 817.653475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 817.668109] ? lock_downgrade+0x880/0x880 [ 817.672294] __should_failslab+0x121/0x190 [ 817.676559] should_failslab+0x9/0x14 [ 817.680381] kmem_cache_alloc_node+0x26c/0x710 [ 817.684987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 817.690556] __alloc_skb+0xd5/0x5f0 [ 817.694206] ? skb_trim+0x190/0x190 [ 817.697858] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 817.703416] ? skb_put+0x183/0x1e0 [ 817.706983] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 817.712026] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.716381] ? ip6_setup_cork+0x1860/0x1860 [ 817.720737] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 817.725599] ? lock_downgrade+0x880/0x880 [ 817.729772] ip6_make_skb+0x32f/0x561 [ 817.733601] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.737951] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.742295] ? ip6_push_pending_frames+0xf0/0xf0 [ 817.747066] ? find_held_lock+0x35/0x130 [ 817.751151] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 817.756019] ? ip6_dst_lookup_flow+0x220/0x220 [ 817.760648] udpv6_sendmsg+0x225b/0x2a00 [ 817.764743] ? ip_reply_glue_bits+0xc0/0xc0 [ 817.769183] ? udp_v6_get_port+0x6b0/0x6b0 [ 817.773529] ? __local_bh_enable_ip+0x15a/0x270 [ 817.778227] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.782772] ? __local_bh_enable_ip+0x15a/0x270 [ 817.787477] ? mark_held_locks+0x100/0x100 [ 817.791737] ? mark_held_locks+0x100/0x100 [ 817.795992] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.800441] ? release_sock+0x156/0x1c0 [ 817.804455] ? __local_bh_enable_ip+0x15a/0x270 [ 817.809153] ? _raw_spin_unlock_bh+0x31/0x40 [ 817.813596] inet_sendmsg+0x141/0x5d0 [ 817.817422] ? inet_sendmsg+0x141/0x5d0 [ 817.821417] ? ipip_gro_receive+0x100/0x100 [ 817.825763] sock_sendmsg+0xd7/0x130 [ 817.829511] ___sys_sendmsg+0x803/0x920 [ 817.833510] ? copy_msghdr_from_user+0x430/0x430 [ 817.838293] ? lock_downgrade+0x880/0x880 [ 817.842474] ? kasan_check_read+0x11/0x20 [ 817.846654] ? __fget+0x367/0x540 [ 817.850139] ? __fget_light+0x1a9/0x230 [ 817.854148] ? __fdget+0x1b/0x20 [ 817.857535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 817.863099] __sys_sendmsg+0x105/0x1d0 [ 817.867006] ? __ia32_sys_shutdown+0x80/0x80 [ 817.871447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 817.876222] ? do_syscall_64+0x26/0x620 [ 817.880214] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.885628] ? do_syscall_64+0x26/0x620 [ 817.889628] __x64_sys_sendmsg+0x78/0xb0 [ 817.893715] do_syscall_64+0xfd/0x620 [ 817.897540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.902745] RIP: 0033:0x45af49 [ 817.905954] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 817.924871] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x5e880000) 10:23:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x480000000, 0xfffffffffffffffb}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x60000000) 10:23:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8890, 0x200042) ioctl$RTC_UIE_OFF(r1, 0x7004) 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x662b0000) 10:23:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5097}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 817.932597] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 817.939886] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 817.947177] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 817.954465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 817.961786] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:55 executing program 2 (fault-call:3 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nej default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:55 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x678e}, 0x0) 10:23:55 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x700, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6e7d0000) 10:23:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)="010d261a42ab0b93b741a7b0d333dca4b86a7da2eb8f37a2f57f61ffa3494535ea95d7f8c2616b25fd51f9d2af91b62f239ef1b527c665ef97e67033a4ab10f5163f32bdc6c7fa30c2f7d7ba47bfc315bbc9068c154011475be0ab404e6104795dad725ee63e2fdde40c915458bd6b3628a283fe3a2fa887988f58e6ed1104e32ea7b3472286993200d718c6f4c1e90d8b4fdc6935", 0x95}], 0x1, &(0x7f0000000040)}, 0x0) [ 818.093942] encrypted_key: master key parameter is missing 10:23:55 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6d06}, 0x0) 10:23:55 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x94, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x16, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22000002}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@deltclass={0xffffff4c, 0x29, 0x20, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x6, 0xf}, {0x7, 0x8}, {0xf, 0x5}}, [@TCA_RATE={0x0, 0x5, {0x81, 0xc6}}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x4818}, 0x2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x76200000) [ 818.178711] FAULT_INJECTION: forcing a failure. [ 818.178711] name failslab, interval 1, probability 0, space 0, times 0 [ 818.248090] CPU: 0 PID: 18569 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 818.255944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.265315] Call Trace: [ 818.267930] dump_stack+0x197/0x210 [ 818.271691] should_fail.cold+0xa/0x1b [ 818.275627] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 818.280791] ? lock_downgrade+0x880/0x880 [ 818.284357] encrypted_key: insufficient parameters specified [ 818.284965] __should_failslab+0x121/0x190 [ 818.295019] should_failslab+0x9/0x14 [ 818.298858] kmem_cache_alloc_node_trace+0x274/0x720 [ 818.304106] ? __alloc_skb+0xd5/0x5f0 [ 818.307939] __kmalloc_node_track_caller+0x3d/0x80 [ 818.312901] __kmalloc_reserve.isra.0+0x40/0xf0 [ 818.313502] encrypted_key: insufficient parameters specified [ 818.317604] __alloc_skb+0x10b/0x5f0 [ 818.317623] ? skb_trim+0x190/0x190 [ 818.317647] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 818.317662] ? skb_put+0x183/0x1e0 [ 818.317683] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 818.317707] ? ip_reply_glue_bits+0xc0/0xc0 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x76cf0000) 10:23:55 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x900, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 818.317735] ? ip6_setup_cork+0x1860/0x1860 [ 818.353053] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 818.357933] ip6_make_skb+0x32f/0x561 [ 818.361766] ? ip_reply_glue_bits+0xc0/0xc0 [ 818.366117] ? ip_reply_glue_bits+0xc0/0xc0 [ 818.370468] ? ip6_push_pending_frames+0xf0/0xf0 [ 818.375239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.380019] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 818.385140] ? retint_kernel+0x2d/0x2d [ 818.389079] ? ip6_dst_lookup_flow+0x220/0x220 [ 818.393696] udpv6_sendmsg+0x225b/0x2a00 10:23:55 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000fff8885ead6d88eb5c4df438780977568dea10e715188c48c10e0b0453c6b66d0f68c1aeb210b904c79136021aa7808bc0cd80197981f6e9f0b919f0d994f8479bc79cf1c15fed09b84b2d8c6ec2adc465c2241d7df2e2ae994c206b49d274e4841992ea950789eb008fbc79b8a1025bed9cd7eec639a2e9b4159abcf97e4f561cf3080437f46d7f472f42cb889f15dfbd96fbb1418792e26e0d39a3d0ff"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x104, 0x4, {0xb53, 0x0, 0x2, 0x5}}) accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @null, @netrom, @null, @default, @remote, @rose, @bcast]}, &(0x7f0000000100)=0x48, 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x2202c060) [ 818.397790] ? ip_reply_glue_bits+0xc0/0xc0 [ 818.402135] ? udp_v6_get_port+0x6b0/0x6b0 [ 818.406389] ? mark_held_locks+0x100/0x100 [ 818.410815] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.415602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.420386] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 818.424989] ? retint_kernel+0x2d/0x2d [ 818.428905] ? trace_hardirqs_on_caller+0x6a/0x220 [ 818.433968] ? __local_bh_enable_ip+0x15a/0x270 [ 818.438666] ? _raw_spin_unlock_bh+0x31/0x40 [ 818.443099] inet_sendmsg+0x141/0x5d0 [ 818.446926] ? inet_sendmsg+0x141/0x5d0 [ 818.450922] ? ipip_gro_receive+0x100/0x100 [ 818.455277] sock_sendmsg+0xd7/0x130 [ 818.459024] ___sys_sendmsg+0x803/0x920 [ 818.463128] ? copy_msghdr_from_user+0x430/0x430 [ 818.467913] ? lock_downgrade+0x880/0x880 [ 818.472087] ? kasan_check_read+0x11/0x20 [ 818.476374] ? __fget+0x367/0x540 [ 818.479864] ? retint_kernel+0x2d/0x2d [ 818.483778] ? __fget_light+0x1a9/0x230 [ 818.487788] ? __fdget+0x1b/0x20 [ 818.491182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 818.496764] __sys_sendmsg+0x105/0x1d0 [ 818.500679] ? __ia32_sys_shutdown+0x80/0x80 [ 818.504401] encrypted_key: insufficient parameters specified [ 818.505229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.505250] ? do_syscall_64+0x26/0x620 [ 818.519863] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.525255] ? do_syscall_64+0x26/0x620 [ 818.529258] __x64_sys_sendmsg+0x78/0xb0 [ 818.533337] do_syscall_64+0xfd/0x620 [ 818.537335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.542541] RIP: 0033:0x45af49 [ 818.545747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 818.547939] encrypted_key: insufficient parameters specified [ 818.564660] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 818.564676] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 818.564684] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 818.564692] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 818.564700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 818.564707] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:55 executing program 2 (fault-call:3 fault-nth:40): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='auxv\x00') lseek(0xffffffffffffffff, 0x20400001, 0x0) syz_open_dev$usbfs(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x78050000) 10:23:55 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa00, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:55 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6e7d}, 0x0) 10:23:56 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x727e}, 0x0) [ 818.794437] encrypted_key: master key parameter is missing [ 818.815747] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:23:56 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa96, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7e720000) [ 818.850973] encrypted_key: master key parameter is missing [ 818.858503] FAULT_INJECTION: forcing a failure. [ 818.858503] name failslab, interval 1, probability 0, space 0, times 0 [ 818.917867] CPU: 0 PID: 18617 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 818.925729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.935302] Call Trace: [ 818.937930] dump_stack+0x197/0x210 [ 818.941608] should_fail.cold+0xa/0x1b [ 818.945527] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 818.950654] ? lock_downgrade+0x880/0x880 [ 818.954835] __should_failslab+0x121/0x190 [ 818.959095] should_failslab+0x9/0x14 [ 818.962922] kmem_cache_alloc_node_trace+0x274/0x720 [ 818.968048] ? __alloc_skb+0xd5/0x5f0 [ 818.971887] __kmalloc_node_track_caller+0x3d/0x80 [ 818.976847] __kmalloc_reserve.isra.0+0x40/0xf0 [ 818.981537] __alloc_skb+0x10b/0x5f0 [ 818.985288] ? skb_trim+0x190/0x190 [ 818.988943] ? __ip6_append_data.isra.0+0xae8/0x2fc0 [ 818.994065] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 818.999104] ? skb_put+0x183/0x1e0 [ 819.002667] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 819.007708] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.012062] ? ip6_setup_cork+0x1860/0x1860 10:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7fff15a2) [ 819.016394] ? retint_kernel+0x2d/0x2d [ 819.020307] ip6_make_skb+0x32f/0x561 [ 819.020324] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.020344] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.020364] ? ip6_push_pending_frames+0xf0/0xf0 [ 819.020387] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 819.020406] ? ip6_dst_lookup_flow+0x220/0x220 [ 819.020428] udpv6_sendmsg+0x225b/0x2a00 [ 819.051589] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.055935] ? udp_v6_get_port+0x6b0/0x6b0 [ 819.060359] ? udp_lib_get_port+0x871/0x19f0 [ 819.064796] ? mark_held_locks+0x100/0x100 [ 819.069053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.073833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.078612] ? lockdep_hardirqs_on+0x415/0x5d0 [ 819.083214] ? retint_kernel+0x2d/0x2d [ 819.087119] ? trace_hardirqs_on_caller+0x6a/0x220 [ 819.092182] ? __local_bh_enable_ip+0x18e/0x270 [ 819.096873] ? _raw_spin_unlock_bh+0x31/0x40 [ 819.101315] inet_sendmsg+0x141/0x5d0 [ 819.105129] ? inet_sendmsg+0x141/0x5d0 [ 819.109118] ? ipip_gro_receive+0x100/0x100 [ 819.113457] sock_sendmsg+0xd7/0x130 [ 819.117197] ___sys_sendmsg+0x803/0x920 [ 819.121196] ? copy_msghdr_from_user+0x430/0x430 [ 819.125976] ? lock_downgrade+0x880/0x880 [ 819.130153] ? kasan_check_read+0x11/0x20 [ 819.134321] ? __fget+0x367/0x540 [ 819.137814] ? __fget_light+0x1a9/0x230 [ 819.141813] ? __fdget+0x1b/0x20 [ 819.145202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 819.150772] __sys_sendmsg+0x105/0x1d0 [ 819.155284] ? __ia32_sys_shutdown+0x80/0x80 [ 819.159721] ? __sys_sendmsg+0x1f/0x1d0 [ 819.163724] __x64_sys_sendmsg+0x78/0xb0 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7620}, 0x0) 10:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7fff164d) [ 819.167813] do_syscall_64+0xfd/0x620 [ 819.171633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.176831] RIP: 0033:0x45af49 [ 819.180030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 819.198943] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 819.206670] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 819.213961] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 819.221247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 819.228531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 819.235818] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:56 executing program 2 (fault-call:3 fault-nth:41): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x76cf}, 0x0) 10:23:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:56 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xe10, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:56 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r2, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r2, r3, 0x0) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r4, r5, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffa, r4, 0x2) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x1, 0xc, 0x4, 0x20010, 0x6, {0x0, 0x2710}, {0x3, 0xc, 0x6, 0xfc, 0x9, 0x2b, "c25181d7"}, 0x10001, 0x3, @planes=&(0x7f0000000040)={0x3, 0x0, @fd, 0x1}, 0x7fff, 0x0, 0xffffffffffffffff}) openat$cgroup_int(r6, &(0x7f00000001c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) [ 819.401201] encrypted_key: insufficient parameters specified [ 819.440979] FAULT_INJECTION: forcing a failure. [ 819.440979] name failslab, interval 1, probability 0, space 0, times 0 [ 819.460737] encrypted_key: insufficient parameters specified [ 819.503699] CPU: 1 PID: 18654 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 819.511551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.520920] Call Trace: [ 819.523536] dump_stack+0x197/0x210 [ 819.527200] should_fail.cold+0xa/0x1b [ 819.531117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 819.536245] ? lock_downgrade+0x880/0x880 [ 819.540429] __should_failslab+0x121/0x190 [ 819.544685] should_failslab+0x9/0x14 [ 819.548505] kmem_cache_alloc_node+0x26c/0x710 [ 819.553107] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 819.558682] __alloc_skb+0xd5/0x5f0 [ 819.562333] ? skb_trim+0x190/0x190 [ 819.565979] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 819.571012] ? skb_put+0x183/0x1e0 [ 819.574600] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 819.579644] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.584003] ? ip6_setup_cork+0x1860/0x1860 [ 819.588349] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 819.593212] ? lock_downgrade+0x880/0x880 [ 819.597388] ip6_make_skb+0x32f/0x561 [ 819.601212] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.605574] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.609918] ? ip6_push_pending_frames+0xf0/0xf0 [ 819.614693] ? find_held_lock+0x35/0x130 [ 819.618781] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 819.623648] ? ip6_dst_lookup_flow+0x220/0x220 [ 819.628267] udpv6_sendmsg+0x225b/0x2a00 [ 819.632360] ? ip_reply_glue_bits+0xc0/0xc0 [ 819.636811] ? udp_v6_get_port+0x6b0/0x6b0 [ 819.641105] ? __local_bh_enable_ip+0x15a/0x270 [ 819.645811] ? _raw_spin_unlock_bh+0x31/0x40 [ 819.650246] ? __local_bh_enable_ip+0x15a/0x270 [ 819.654945] ? mark_held_locks+0x100/0x100 [ 819.659219] ? mark_held_locks+0x100/0x100 [ 819.663473] ? _raw_spin_unlock_bh+0x31/0x40 [ 819.668035] ? release_sock+0x156/0x1c0 [ 819.672063] ? __local_bh_enable_ip+0x15a/0x270 [ 819.676891] ? _raw_spin_unlock_bh+0x31/0x40 [ 819.681336] inet_sendmsg+0x141/0x5d0 [ 819.685173] ? inet_sendmsg+0x141/0x5d0 [ 819.689289] ? ipip_gro_receive+0x100/0x100 [ 819.693636] sock_sendmsg+0xd7/0x130 [ 819.697380] ___sys_sendmsg+0x803/0x920 [ 819.701387] ? copy_msghdr_from_user+0x430/0x430 [ 819.706172] ? lock_downgrade+0x880/0x880 [ 819.710345] ? kasan_check_read+0x11/0x20 [ 819.714525] ? __fget+0x367/0x540 [ 819.718023] ? __fget_light+0x1a9/0x230 [ 819.722030] ? __fdget+0x1b/0x20 [ 819.725416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 819.731107] __sys_sendmsg+0x105/0x1d0 [ 819.735020] ? __ia32_sys_shutdown+0x80/0x80 [ 819.739475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.744260] ? do_syscall_64+0x26/0x620 [ 819.748259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.753755] ? do_syscall_64+0x26/0x620 [ 819.757770] __x64_sys_sendmsg+0x78/0xb0 [ 819.761977] do_syscall_64+0xfd/0x620 [ 819.765816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.771025] RIP: 0033:0x45af49 [ 819.774248] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 819.793172] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:23:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7ffff000) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x77f6}, 0x0) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7805}, 0x0) 10:23:56 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7d6e}, 0x0) 10:23:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) 10:23:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7d8a}, 0x0) [ 819.801166] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 819.808458] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 819.815761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 819.823048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 819.830335] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:57 executing program 2 (fault-call:3 fault-nth:42): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0xe1, 0x4, 0x4, 0x20, 0x6, {}, {0x1, 0x2, 0x23, 0x3b, 0x1, 0x6, "56ea2808"}, 0x1, 0x1, @userptr=0x4, 0x7, 0x0, r0}) perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff85, 0x0, 0x2, 0x0, 0x5, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, r1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000100)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7e72}, 0x0) 10:23:57 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xebf, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x80010020) [ 819.954623] encrypted_key: master key parameter is missing 10:23:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200000, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r4, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r4, &(0x7f0000000140)=0x4) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 10:23:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x80fe}, 0x0) 10:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x86150000) 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x100e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 820.008583] encrypted_key: master key parameter is missing [ 820.045011] FAULT_INJECTION: forcing a failure. [ 820.045011] name failslab, interval 1, probability 0, space 0, times 0 [ 820.107924] CPU: 0 PID: 18705 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 820.115914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.125286] Call Trace: [ 820.127901] dump_stack+0x197/0x210 [ 820.131555] should_fail.cold+0xa/0x1b [ 820.135486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 820.140620] ? lock_downgrade+0x880/0x880 [ 820.144801] __should_failslab+0x121/0x190 [ 820.149065] should_failslab+0x9/0x14 [ 820.152878] kmem_cache_alloc_node+0x26c/0x710 [ 820.157474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 820.163043] __alloc_skb+0xd5/0x5f0 [ 820.166684] ? skb_trim+0x190/0x190 [ 820.170326] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 820.175367] ? skb_put+0x183/0x1e0 [ 820.178936] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 820.183979] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.188338] ? ip6_setup_cork+0x1860/0x1860 [ 820.192679] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 820.197541] ? lock_downgrade+0x880/0x880 [ 820.201713] ip6_make_skb+0x32f/0x561 [ 820.205532] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.209885] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.214230] ? ip6_push_pending_frames+0xf0/0xf0 [ 820.219007] ? find_held_lock+0x35/0x130 [ 820.223094] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 820.227962] ? ip6_dst_lookup_flow+0x220/0x220 [ 820.232566] udpv6_sendmsg+0x225b/0x2a00 [ 820.236650] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.240999] ? udp_v6_get_port+0x6b0/0x6b0 [ 820.245251] ? __local_bh_enable_ip+0x15a/0x270 [ 820.249935] ? _raw_spin_unlock_bh+0x31/0x40 [ 820.254363] ? __local_bh_enable_ip+0x15a/0x270 [ 820.259064] ? mark_held_locks+0x100/0x100 [ 820.263419] ? mark_held_locks+0x100/0x100 [ 820.267702] ? _raw_spin_unlock_bh+0x31/0x40 [ 820.272151] ? release_sock+0x156/0x1c0 [ 820.276863] ? __local_bh_enable_ip+0x15a/0x270 [ 820.281554] ? _raw_spin_unlock_bh+0x31/0x40 [ 820.285987] inet_sendmsg+0x141/0x5d0 [ 820.289804] ? inet_sendmsg+0x141/0x5d0 [ 820.293795] ? ipip_gro_receive+0x100/0x100 [ 820.298139] sock_sendmsg+0xd7/0x130 [ 820.301882] ___sys_sendmsg+0x803/0x920 [ 820.305880] ? copy_msghdr_from_user+0x430/0x430 [ 820.310667] ? lock_downgrade+0x880/0x880 [ 820.314837] ? kasan_check_read+0x11/0x20 [ 820.319013] ? __fget+0x367/0x540 [ 820.322507] ? __fget_light+0x1a9/0x230 [ 820.326502] ? __fdget+0x1b/0x20 [ 820.329891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 820.335449] __sys_sendmsg+0x105/0x1d0 [ 820.339355] ? __ia32_sys_shutdown+0x80/0x80 [ 820.343801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.348577] ? do_syscall_64+0x26/0x620 [ 820.352572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1100, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1586, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 820.357951] ? do_syscall_64+0x26/0x620 [ 820.361952] __x64_sys_sendmsg+0x78/0xb0 [ 820.366394] do_syscall_64+0xfd/0x620 [ 820.370221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.375424] RIP: 0033:0x45af49 [ 820.378633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 820.397662] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 820.405393] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 820.412690] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 820.419979] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 820.427269] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 820.434705] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:57 executing program 2 (fault-call:3 fault-nth:43): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x86c40000) 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1662, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x82e6}, 0x0) 10:23:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x3a7, 0x202) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x6, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000280)={'nat\x00'}, &(0x7f0000000300)=0x78) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100)=0x3f, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000500)={0x0, @motion_det}) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) r1 = getpid() r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r2, r1, 0x1b, &(0x7f00000002c0)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000340)=0x0) r5 = syz_open_procfs(r4, &(0x7f00000003c0)='net/ip_vs\x00') preadv(r5, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x1}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000300)={r7, 0xdfb}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r9 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) r10 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r10, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r10, r11, 0x0) keyctl$update(0x2, r10, &(0x7f0000000500)="74e66e474e57aaf197af770c6a303c34c41ca33185906ae9e8dabd0e450dd7a39d47a9506e3457b09fcd2763f6468c0fb8c9d57f159c5704d852312a36ab04831ea7bd69b1a63834fed49aa6fd4132739cf029ead86598e3fd88c143b4618bb6c14c5e30ea4c72292d9e633b079d7714677825568815841bc8b55472cd71262bf0289d30bf4e34635553a2936749b7f7e923ff12e2095ed14139147c47bc6ad7d196c03beeae8e451725f856f5078cf0b3ff6d7a11", 0xb5) ioctl$SNDCTL_DSP_SUBDIVIDE(r9, 0xc0045009, &(0x7f00000001c0)=0x9) keyctl$chown(0x4, r0, r8, 0x0) r12 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', r0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, r12) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8dffffff) [ 820.570750] encrypted_key: master key parameter is missing 10:23:57 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1afe, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8615}, 0x0) [ 820.624394] FAULT_INJECTION: forcing a failure. [ 820.624394] name failslab, interval 1, probability 0, space 0, times 0 [ 820.649654] encrypted_key: master key parameter is missing [ 820.707450] CPU: 0 PID: 18749 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 820.715310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.724683] Call Trace: [ 820.727301] dump_stack+0x197/0x210 [ 820.730966] should_fail.cold+0xa/0x1b [ 820.734890] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 820.740018] ? lock_downgrade+0x880/0x880 [ 820.744333] __should_failslab+0x121/0x190 [ 820.748592] should_failslab+0x9/0x14 [ 820.752422] kmem_cache_alloc_node+0x26c/0x710 [ 820.757041] __alloc_skb+0xd5/0x5f0 [ 820.760689] ? skb_trim+0x190/0x190 [ 820.764341] ? skb_put+0x135/0x1e0 [ 820.767901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 820.772937] ? skb_put+0x183/0x1e0 [ 820.776505] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 820.781545] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.785938] ? ip6_setup_cork+0x1860/0x1860 [ 820.790281] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 820.795326] ? lock_downgrade+0x880/0x880 [ 820.799540] ip6_make_skb+0x32f/0x561 [ 820.803358] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.807705] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.812055] ? ip6_push_pending_frames+0xf0/0xf0 [ 820.816833] ? retint_kernel+0x2d/0x2d [ 820.820745] udpv6_sendmsg+0x225b/0x2a00 [ 820.824829] ? ip_reply_glue_bits+0xc0/0xc0 [ 820.829181] ? udp_v6_get_port+0x6b0/0x6b0 [ 820.833449] ? mark_held_locks+0x100/0x100 [ 820.837713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.842493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.847269] ? lockdep_hardirqs_on+0x415/0x5d0 [ 820.851863] ? retint_kernel+0x2d/0x2d [ 820.855779] ? trace_hardirqs_on_caller+0x6a/0x220 [ 820.860785] ? __local_bh_enable_ip+0x18e/0x270 [ 820.865483] ? _raw_spin_unlock_bh+0x31/0x40 [ 820.869917] inet_sendmsg+0x141/0x5d0 [ 820.873732] ? inet_sendmsg+0x141/0x5d0 [ 820.877752] ? ipip_gro_receive+0x100/0x100 [ 820.882097] sock_sendmsg+0xd7/0x130 [ 820.885835] ___sys_sendmsg+0x803/0x920 [ 820.889834] ? copy_msghdr_from_user+0x430/0x430 [ 820.894607] ? lock_downgrade+0x880/0x880 [ 820.898775] ? __fget+0x345/0x540 [ 820.902244] ? __rcu_read_unlock+0x7c/0x170 [ 820.906587] ? __fget+0x367/0x540 [ 820.910078] ? __fget_light+0x1a9/0x230 [ 820.914072] ? __fdget+0x1b/0x20 [ 820.917458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 820.923024] __sys_sendmsg+0x105/0x1d0 [ 820.926936] ? __ia32_sys_shutdown+0x80/0x80 [ 820.931375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 820.936270] ? do_syscall_64+0x26/0x620 [ 820.940272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.945749] ? do_syscall_64+0x26/0x620 [ 820.949753] __x64_sys_sendmsg+0x78/0xb0 [ 820.953838] do_syscall_64+0xfd/0x620 10:23:58 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8e670000) 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1e05, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 820.957658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.962862] RIP: 0033:0x45af49 [ 820.966076] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 820.985604] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 820.993348] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 821.000636] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 821.007928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 821.015209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 821.022490] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 821.038374] encrypted_key: master key parameter is missing 10:23:58 executing program 2 (fault-call:3 fault-nth:44): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1eb4, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x86c4}, 0x0) 10:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x960a0000) 10:23:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000000)={0x1, 0x0, [{}]}) r1 = socket$kcm(0xa, 0x43e38a668626ee21, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 821.090888] encrypted_key: master key parameter is missing 10:23:58 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="5d721b2aef95e8e4b9dc5a43cbc9531439736db3983b774da2210c3a382913b4b22218429d9f35e77d52028a94facf63621583dc8892798e71ad453bccdcd10743629093d5cdaa01981dc779f2fe72671d7be6000000ef08ecd08196c21b5c782828481987739c1a38cfe3a68717f02fd08fabe7c58865af57ed4dd445dd6283", 0xffffffffffffff75, 0xfffffffffffffffe) 10:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x96b90000) 10:23:58 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x885e}, 0x0) [ 821.257450] FAULT_INJECTION: forcing a failure. [ 821.257450] name failslab, interval 1, probability 0, space 0, times 0 [ 821.301341] CPU: 1 PID: 18795 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 821.309295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.318785] Call Trace: [ 821.321402] dump_stack+0x197/0x210 [ 821.325047] should_fail.cold+0xa/0x1b [ 821.328959] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.334093] ? lock_downgrade+0x880/0x880 [ 821.338360] __should_failslab+0x121/0x190 [ 821.342743] should_failslab+0x9/0x14 [ 821.346563] kmem_cache_alloc_node_trace+0x274/0x720 [ 821.351701] ? __alloc_skb+0xd5/0x5f0 [ 821.355537] __kmalloc_node_track_caller+0x3d/0x80 [ 821.360486] __kmalloc_reserve.isra.0+0x40/0xf0 [ 821.365175] __alloc_skb+0x10b/0x5f0 [ 821.368912] ? skb_trim+0x190/0x190 [ 821.372565] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 821.377595] ? skb_put+0x183/0x1e0 [ 821.381160] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 821.386211] ? ip_reply_glue_bits+0xc0/0xc0 [ 821.390608] ? ip6_setup_cork+0x1860/0x1860 [ 821.394952] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 821.399820] ? lock_downgrade+0x880/0x880 [ 821.403999] ip6_make_skb+0x32f/0x561 [ 821.407844] ? ip_reply_glue_bits+0xc0/0xc0 [ 821.412182] ? ip_reply_glue_bits+0xc0/0xc0 [ 821.416538] ? ip6_push_pending_frames+0xf0/0xf0 [ 821.421307] ? find_held_lock+0x35/0x130 [ 821.425390] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 821.430258] ? ip6_dst_lookup_flow+0x220/0x220 [ 821.434866] udpv6_sendmsg+0x225b/0x2a00 [ 821.438964] ? ip_reply_glue_bits+0xc0/0xc0 [ 821.443332] ? udp_v6_get_port+0x6b0/0x6b0 [ 821.448189] ? __local_bh_enable_ip+0x15a/0x270 [ 821.452871] ? _raw_spin_unlock_bh+0x31/0x40 [ 821.457303] ? __local_bh_enable_ip+0x15a/0x270 [ 821.462001] ? mark_held_locks+0x100/0x100 [ 821.466247] ? mark_held_locks+0x100/0x100 [ 821.470490] ? _raw_spin_unlock_bh+0x31/0x40 [ 821.474919] ? release_sock+0x156/0x1c0 [ 821.478926] ? __local_bh_enable_ip+0x15a/0x270 [ 821.483615] ? _raw_spin_unlock_bh+0x31/0x40 [ 821.488048] inet_sendmsg+0x141/0x5d0 [ 821.491878] ? inet_sendmsg+0x141/0x5d0 [ 821.495999] ? ipip_gro_receive+0x100/0x100 [ 821.500348] sock_sendmsg+0xd7/0x130 [ 821.504093] ___sys_sendmsg+0x803/0x920 [ 821.508104] ? copy_msghdr_from_user+0x430/0x430 [ 821.512990] ? lock_downgrade+0x880/0x880 [ 821.517165] ? kasan_check_read+0x11/0x20 [ 821.521339] ? __fget+0x367/0x540 [ 821.524878] ? __fget_light+0x1a9/0x230 [ 821.528868] ? __fdget+0x1b/0x20 [ 821.532242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 821.537795] __sys_sendmsg+0x105/0x1d0 [ 821.541697] ? __ia32_sys_shutdown+0x80/0x80 [ 821.546134] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 821.551556] ? do_syscall_64+0x26/0x620 [ 821.555547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.560920] ? do_syscall_64+0x26/0x620 [ 821.564908] __x64_sys_sendmsg+0x78/0xb0 [ 821.568985] do_syscall_64+0xfd/0x620 [ 821.572812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.578013] RIP: 0033:0x45af49 [ 821.581220] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2076, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x25ee, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8a7d}, 0x0) [ 821.600139] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 821.607901] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 821.615213] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 821.622473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 821.629739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 821.637002] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:23:58 executing program 2 (fault-call:3 fault-nth:45): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2657, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:58 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8dd6}, 0x0) 10:23:58 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65772064656661758a746d532b6c16b19dc6ff68f4b874cdf88cf5994cea8b4b544be95f3c00d1dcd75c3b5124763169da39cdc2a8d908a903c877edad48bfe591b08cdd5174adea537f28f7e8d52f9945de962f926df655c3d2cb7dde343b763baefde45b5784cf5c9876d41c2e6313aa4f8c2e26210e2cd8a109acd9d22c45645dbb6044cea6"], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@default) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:23:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='{!vboxnet0@proc][:\x00', 0x13, 0x1) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) 10:23:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9e5c0000) 10:23:59 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8e67}, 0x0) 10:23:59 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2b66, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 821.747203] encrypted_key: insufficient parameters specified 10:23:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa215ff7f) 10:23:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x9, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000006d80)=[{{&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000280)=""/107, 0x6b}, {&(0x7f0000000300)=""/168, 0xa8}, {&(0x7f00000004c0)=""/94, 0x5e}, {&(0x7f0000000540)=""/236, 0xec}, {&(0x7f0000000640)=""/206, 0xce}, {&(0x7f0000000740)=""/158, 0x9e}], 0x6, &(0x7f0000000880)=""/180, 0xb4}, 0x1}, {{&(0x7f0000000940)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f00000009c0)=""/82, 0x52}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x2}, 0x9}, {{&(0x7f0000001a40)=@nfc_llcp, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001ac0)=""/222, 0xde}, {&(0x7f0000000440)=""/7, 0x7}, {&(0x7f0000001bc0)=""/147, 0x93}, {&(0x7f0000001c80)=""/151, 0x97}, {&(0x7f0000001d40)=""/237, 0xed}, {&(0x7f0000001e40)=""/58, 0x3a}, {&(0x7f0000001e80)=""/201, 0xc9}, {&(0x7f0000001f80)=""/60, 0x3c}], 0x8, &(0x7f0000002040)=""/91, 0x5b}, 0x4}, {{&(0x7f00000020c0)=@ipx, 0x80, &(0x7f0000002500)=[{&(0x7f0000002140)=""/96, 0x60}, {&(0x7f00000021c0)=""/115, 0x73}, {&(0x7f0000002240)=""/58, 0x3a}, {&(0x7f0000002280)=""/159, 0x9f}, {&(0x7f0000002340)=""/141, 0x8d}, {&(0x7f0000002400)=""/249, 0xf9}], 0x6, &(0x7f0000002580)=""/91, 0x5b}, 0x6}, {{&(0x7f0000002600)=@hci, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002680)=""/254, 0xfe}, {&(0x7f0000002780)=""/121, 0x79}, {&(0x7f0000002800)=""/165, 0xa5}], 0x3, &(0x7f0000002900)=""/34, 0x22}, 0x1}, {{&(0x7f0000002940)=@l2, 0x80, &(0x7f0000002b00)=[{&(0x7f00000029c0)=""/140, 0x8c}, {&(0x7f0000002a80)=""/95, 0x5f}], 0x2, &(0x7f0000002b40)=""/145, 0x91}, 0x3}, {{0x0, 0x0, &(0x7f0000004f80)=[{&(0x7f0000002c00)=""/221, 0xdd}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/221, 0xdd}, {&(0x7f0000003e00)=""/4096, 0x1000}, {&(0x7f0000004e00)=""/183, 0xb7}, {&(0x7f0000004ec0)=""/55, 0x37}, {&(0x7f0000004f00)=""/110, 0x6e}], 0x7, &(0x7f0000005000)=""/121, 0x79}, 0x2}, {{0x0, 0x0, &(0x7f0000006580)=[{&(0x7f0000005080)=""/97, 0x61}, {&(0x7f0000005100)=""/159, 0x9f}, {&(0x7f00000051c0)=""/227, 0xe3}, {&(0x7f00000052c0)=""/220, 0xdc}, {&(0x7f00000053c0)=""/211, 0xd3}, {&(0x7f00000054c0)=""/23, 0x17}, {&(0x7f0000005500)=""/4096, 0x1000}, {&(0x7f0000006500)=""/111, 0x6f}], 0x8, &(0x7f0000006600)=""/25, 0x19}, 0x800}, {{&(0x7f0000006640)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f00000068c0)=[{&(0x7f00000066c0)=""/143, 0x8f}, {&(0x7f0000006780)=""/188, 0xbc}, {&(0x7f0000006840)=""/112, 0x70}], 0x3}, 0x9}, {{&(0x7f0000006900)=@ax25={{0x3, @bcast}, [@null, @remote, @bcast, @remote, @null, @null, @rose, @bcast]}, 0x80, &(0x7f0000006d00)=[{&(0x7f0000006980)=""/216, 0xd8}, {&(0x7f0000006a80)=""/43, 0x2b}, {&(0x7f0000006ac0)=""/55, 0x37}, {&(0x7f0000006b00)=""/154, 0x9a}, {&(0x7f0000006bc0)=""/42, 0x2a}, {&(0x7f0000006c00)=""/223, 0xdf}], 0x6}, 0x6}], 0xa, 0x2, &(0x7f0000007000)) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000100)={0x0, 'syz0\x00'}) [ 821.818138] encrypted_key: insufficient parameters specified [ 821.891668] FAULT_INJECTION: forcing a failure. [ 821.891668] name failslab, interval 1, probability 0, space 0, times 0 [ 821.935316] CPU: 0 PID: 18838 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 821.943173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.952552] Call Trace: [ 821.955164] dump_stack+0x197/0x210 [ 821.958830] should_fail.cold+0xa/0x1b [ 821.962748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 821.967881] ? lock_downgrade+0x880/0x880 [ 821.972060] __should_failslab+0x121/0x190 [ 821.976319] should_failslab+0x9/0x14 [ 821.980142] kmem_cache_alloc_node+0x26c/0x710 [ 821.984747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 821.990314] __alloc_skb+0xd5/0x5f0 [ 821.993968] ? skb_trim+0x190/0x190 [ 821.997612] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.002645] ? skb_put+0x183/0x1e0 [ 822.006213] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 822.011259] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.015613] ? ip6_setup_cork+0x1860/0x1860 [ 822.019961] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 822.024834] ip6_make_skb+0x32f/0x561 [ 822.029005] ? ip_reply_glue_bits+0xc0/0xc0 10:23:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x1f, 0x5) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa6ae0000) [ 822.033345] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.037690] ? ip6_push_pending_frames+0xf0/0xf0 [ 822.042482] ? retint_kernel+0x2d/0x2d [ 822.046603] udpv6_sendmsg+0x225b/0x2a00 [ 822.050700] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.055058] ? udp_v6_get_port+0x6b0/0x6b0 [ 822.059315] ? __local_bh_enable_ip+0x15a/0x270 [ 822.064094] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.068527] ? __local_bh_enable_ip+0x15a/0x270 [ 822.073223] ? mark_held_locks+0x100/0x100 [ 822.077501] ? mark_held_locks+0x100/0x100 [ 822.081753] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.086200] ? release_sock+0x156/0x1c0 [ 822.090384] ? __local_bh_enable_ip+0x15a/0x270 [ 822.095075] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.099508] inet_sendmsg+0x141/0x5d0 [ 822.103333] ? inet_sendmsg+0x141/0x5d0 [ 822.107330] ? ipip_gro_receive+0x100/0x100 [ 822.111680] sock_sendmsg+0xd7/0x130 [ 822.115450] ___sys_sendmsg+0x803/0x920 [ 822.119450] ? copy_msghdr_from_user+0x430/0x430 [ 822.124237] ? lock_downgrade+0x880/0x880 [ 822.128409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 822.133188] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 822.137969] ? lockdep_hardirqs_on+0x415/0x5d0 [ 822.142577] ? retint_kernel+0x2d/0x2d [ 822.146488] ? trace_hardirqs_on_caller+0x6a/0x220 [ 822.151467] ? sockfd_lookup_light+0xde/0x180 [ 822.156005] ? sockfd_lookup_light+0x103/0x180 [ 822.160793] __sys_sendmsg+0x105/0x1d0 [ 822.164704] ? __ia32_sys_shutdown+0x80/0x80 [ 822.169223] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 822.174030] __x64_sys_sendmsg+0x78/0xb0 [ 822.178106] ? do_syscall_64+0x5b/0x620 [ 822.182091] do_syscall_64+0xfd/0x620 [ 822.185888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.191140] RIP: 0033:0x45af49 [ 822.194325] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.213407] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 822.221106] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 822.228374] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:23:59 executing program 2 (fault-call:3 fault-nth:46): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:59 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x934e}, 0x0) 10:23:59 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2ea9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:59 executing program 0: ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@rc, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000200)=""/10, 0xa}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/89, 0x59}, {&(0x7f00000002c0)}], 0x5}, 0x12001) r0 = socket$kcm(0xa, 0x2, 0x11) syz_open_dev$ptys(0xc, 0x3, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmmsg$inet(r7, &(0x7f0000005e00)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001180)=[{&(0x7f0000000040)="b7", 0x1}], 0x1}}, {{&(0x7f0000001480)={0x2, 0x0, @remote}, 0x10, &(0x7f0000001600)=[{&(0x7f00000014c0)="b0", 0x1}], 0x1}}], 0x2, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f00000003c0)={0x6, 0xff}) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:23:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xaa050000) 10:23:59 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 822.235652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 822.242925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 822.250620] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 822.337727] encrypted_key: insufficient parameters specified 10:23:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xae510000) 10:23:59 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x30de, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 822.382468] FAULT_INJECTION: forcing a failure. [ 822.382468] name failslab, interval 1, probability 0, space 0, times 0 10:23:59 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x960a}, 0x0) 10:23:59 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000000c0), 0xb6, 0xfffffffffffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/52, 0x34}], 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000002c0)={0xffffffffffffffff, 0x9, 0x2, 0x200, 0x1, [{0x2, 0x4, 0xd5, [], 0x7c1497edacdb7dae}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={r1, 0x2}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r3, 0xc1004110, &(0x7f00000001c0)={0x4, [0x2, 0x80, 0x200], [{0x0, 0x3, 0x1, 0x0, 0x1}, {0xffffffff, 0x45d, 0x1, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x0, 0x0, 0x1}, {0xc9, 0x2, 0x0, 0x0, 0x1}, {0x117c, 0x3f, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x7fff, 0x1, 0x0, 0x1}, {0xffff, 0x5, 0x0, 0x1, 0x1}, {0x6, 0x5757, 0x1, 0x1, 0x0, 0x1}, {0x101, 0x0, 0x1, 0x1, 0x1}, {0x1, 0x8, 0x0, 0x1, 0x0, 0x1}, {0x80, 0xffff, 0x0, 0x0, 0x1, 0x1}, {0x80000000, 0x7fffffff, 0x1, 0x1}], 0x6}) [ 822.491935] CPU: 1 PID: 18881 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 822.499793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.509166] Call Trace: [ 822.511781] dump_stack+0x197/0x210 [ 822.515454] should_fail.cold+0xa/0x1b [ 822.519383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 822.524515] ? lock_downgrade+0x880/0x880 [ 822.528699] __should_failslab+0x121/0x190 [ 822.532962] should_failslab+0x9/0x14 [ 822.536355] encrypted_key: insufficient parameters specified [ 822.536781] kmem_cache_alloc_node_trace+0x274/0x720 [ 822.545359] encrypted_key: insufficient parameters specified [ 822.547688] ? __alloc_skb+0xd5/0x5f0 [ 822.547714] __kmalloc_node_track_caller+0x3d/0x80 [ 822.547733] __kmalloc_reserve.isra.0+0x40/0xf0 [ 822.547756] __alloc_skb+0x10b/0x5f0 [ 822.570855] ? skb_trim+0x190/0x190 [ 822.574510] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 822.579562] ? skb_put+0x183/0x1e0 [ 822.583127] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 822.588195] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.592543] ? ip6_setup_cork+0x1860/0x1860 [ 822.596905] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 822.601766] ? lock_downgrade+0x880/0x880 [ 822.605940] ip6_make_skb+0x32f/0x561 [ 822.609758] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.614102] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.618445] ? ip6_push_pending_frames+0xf0/0xf0 [ 822.623315] ? find_held_lock+0x35/0x130 [ 822.627842] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 822.632711] ? ip6_dst_lookup_flow+0x220/0x220 [ 822.637322] udpv6_sendmsg+0x225b/0x2a00 [ 822.642109] ? ip_reply_glue_bits+0xc0/0xc0 [ 822.646462] ? udp_v6_get_port+0x6b0/0x6b0 [ 822.650714] ? __local_bh_enable_ip+0x15a/0x270 [ 822.655504] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.659950] ? __local_bh_enable_ip+0x15a/0x270 [ 822.664650] ? mark_held_locks+0x100/0x100 [ 822.668908] ? mark_held_locks+0x100/0x100 [ 822.673159] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.677621] ? release_sock+0x156/0x1c0 [ 822.681647] ? __local_bh_enable_ip+0x15a/0x270 [ 822.686428] ? _raw_spin_unlock_bh+0x31/0x40 [ 822.691135] inet_sendmsg+0x141/0x5d0 [ 822.694972] ? inet_sendmsg+0x141/0x5d0 [ 822.698972] ? ipip_gro_receive+0x100/0x100 [ 822.703315] sock_sendmsg+0xd7/0x130 [ 822.707046] ___sys_sendmsg+0x803/0x920 [ 822.711051] ? copy_msghdr_from_user+0x430/0x430 [ 822.715836] ? lock_downgrade+0x880/0x880 [ 822.720040] ? kasan_check_read+0x11/0x20 [ 822.724210] ? __fget+0x367/0x540 [ 822.727783] ? __fget_light+0x1a9/0x230 [ 822.731779] ? __fdget+0x1b/0x20 [ 822.735182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 822.737218] encrypted_key: master key parameter 'de' is invalid [ 822.740741] __sys_sendmsg+0x105/0x1d0 [ 822.740758] ? __ia32_sys_shutdown+0x80/0x80 [ 822.740791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 822.740804] ? do_syscall_64+0x26/0x620 [ 822.740823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.749383] encrypted_key: master key parameter 'de' is invalid [ 822.750874] ? do_syscall_64+0x26/0x620 [ 822.750895] __x64_sys_sendmsg+0x78/0xb0 [ 822.750914] do_syscall_64+0xfd/0x620 [ 822.788038] entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:23:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xb6a30000) 10:23:59 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) write$vhost_msg(r0, &(0x7f0000000240)={0x1, {&(0x7f00000001c0)=""/113, 0x71, &(0x7f00000000c0)=""/39, 0x3, 0x2}}, 0x48) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064650400756c74"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000000)={0x6a, ""/106}) [ 822.793243] RIP: 0033:0x45af49 [ 822.796461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.815378] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 822.823113] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 822.830400] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 822.837689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 822.844984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 822.852276] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:00 executing program 2 (fault-call:3 fault-nth:47): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x364c, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x96b9}, 0x0) 10:24:00 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000240)="cab8c6b570d67c3b4a9bae2b91ca921f6f1b18f6cc8f7c3844d1bda411e0420b9920a949b8ce151f4978d8e2e5147aba87786745fabc55ddff2401375f01b25352651dbc98dc0c76326d3c79929ea7abc68e7b2cc3d50a13267524dc6b6a1724", 0x60, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x8000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x6, 0x2}, 0x400, 0xfb3f}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r2}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f0000000040)=0x9) 10:24:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xbe460000) 10:24:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000100)=0x14) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 822.942869] encrypted_key: master key parameter '©I¸ÎIxØâåzº‡xgEú¼UÝÿ$7_²SRe¼˜Ü v2m 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:24:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000000, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000480), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 10:24:00 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x9e3e}, 0x0) 10:24:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x1, @perf_config_ext={0x10}}, 0x0, 0x20, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 823.366899] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 823.374635] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 823.381931] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 823.389223] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 823.396651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 823.404128] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:00 executing program 2 (fault-call:3 fault-nth:48): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x9e5c}, 0x0) 10:24:00 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3656, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new dedault'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba67, 0x0, @perf_bp={&(0x7f0000000140), 0x9}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000100)={r2, 0x3ff, 0xffffffff}) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xce3b0000) [ 823.512572] encrypted_key: master key parameter 'dedault' is invalid 10:24:00 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa3b6}, 0x0) 10:24:00 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3bce, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 823.574821] FAULT_INJECTION: forcing a failure. [ 823.574821] name failslab, interval 1, probability 0, space 0, times 0 [ 823.650997] CPU: 1 PID: 18968 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 823.658862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.668241] Call Trace: [ 823.670858] dump_stack+0x197/0x210 [ 823.674525] should_fail.cold+0xa/0x1b [ 823.678441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 823.683571] ? lock_downgrade+0x880/0x880 [ 823.687754] __should_failslab+0x121/0x190 [ 823.692191] should_failslab+0x9/0x14 [ 823.696011] kmem_cache_alloc_node+0x26c/0x710 [ 823.700614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.706199] __alloc_skb+0xd5/0x5f0 [ 823.709841] ? skb_trim+0x190/0x190 [ 823.713487] ? __ip6_append_data.isra.0+0xa38/0x2fc0 [ 823.718610] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 823.723645] ? skb_put+0x183/0x1e0 [ 823.727212] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 823.732263] ? ip_reply_glue_bits+0xc0/0xc0 [ 823.736621] ? ip6_setup_cork+0x1860/0x1860 [ 823.740960] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 823.745825] ip6_make_skb+0x32f/0x561 [ 823.749649] ? ip_reply_glue_bits+0xc0/0xc0 [ 823.754001] ? ip_reply_glue_bits+0xc0/0xc0 [ 823.758350] ? ip6_push_pending_frames+0xf0/0xf0 [ 823.763128] ? find_held_lock+0x35/0x130 [ 823.767219] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 823.772095] ? ip6_dst_lookup_flow+0x220/0x220 [ 823.776703] udpv6_sendmsg+0x225b/0x2a00 [ 823.780797] ? ip_reply_glue_bits+0xc0/0xc0 [ 823.785149] ? udp_v6_get_port+0x6b0/0x6b0 [ 823.789418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 823.793723] encrypted_key: master key parameter is missing [ 823.794193] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 823.804398] ? retint_kernel+0x2d/0x2d [ 823.808309] ? trace_hardirqs_on_caller+0x6a/0x220 [ 823.813277] ? release_sock+0x156/0x1c0 [ 823.817291] ? __local_bh_enable_ip+0x15a/0x270 [ 823.821982] ? _raw_spin_unlock_bh+0x31/0x40 [ 823.826426] inet_sendmsg+0x141/0x5d0 [ 823.830262] ? inet_sendmsg+0x141/0x5d0 [ 823.834257] ? ipip_gro_receive+0x100/0x100 [ 823.838601] sock_sendmsg+0xd7/0x130 [ 823.842336] ___sys_sendmsg+0x803/0x920 [ 823.846332] ? copy_msghdr_from_user+0x430/0x430 10:24:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8c8d, 0x8, &(0x7f00000024c0)=[{&(0x7f0000000100)="5b56859526ec70dcce94d08bac03eb2c37927ce927aa743613db62ae5f82a8176d062c7ec8bd293097373aa71b245f73aca4d2b689a0260d7fcafac2f8cfbe2662760591fcf4c4fa6bb73de33487d02155e8dabab8ea9b65a2e3a466fa", 0x5d, 0x8}, {&(0x7f0000000200)="f1839e5628cff3367e3f8b8567877d8d97128bea1c95aaba93b140c62bb7d055220420ff74e7405f5cbb0ebfd8dcf51a279433e9054f0ce8ce0303b1e713e824679b719f36faebc44ae63707229a76e5671d769e9fcbf8f466bc37f0c3ed985718f6bf279868124947b021e2fc3dc4efdcfd3bda050691db4b7f1f3fd8105009ada5a471", 0x84, 0x8}, {&(0x7f00000002c0)="bdbb1a17aa1358019ed4484fb8bc4da86dec2b018bcdb0b51289aebac36a1da08398429e5095c2f614784fdf4657056481978f0c219dc1a87a52ca75537a8c9a41445f01e8aa8a112d262dd60151491aa15545eb1c86e5fd241ffe55b857", 0x5e, 0xfffffffffffff4b1}, {&(0x7f0000000340)="128e785da9fb1c15dd9b8c4029c11f4e8358e32acce81b508f6139ef4b113e00b7cf76e490b66cedcfc0d6693c95b4e195746487952040ed559ba5607cff4aaf266a86a94e94106103495cef584266f5b6273416aa2fdead52d23d6841377278c9facc154bff9c14787d75397b8e2e20340f39ffac19bd090dd4427e0ec77941fea5c4f005b4edbd342f610585e6e16268a0c1ffc4e883947825a056524a59f067a0", 0xa2, 0x8}, {&(0x7f00000004c0)="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", 0x1000, 0x4}, {&(0x7f00000014c0)="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", 0x1000, 0x3bfc}, {&(0x7f0000000400)="ff95329a90b6a942a0243fad9483e9d8b75a45db4427848879582163bd365a", 0x1f, 0xab2}, {&(0x7f0000000440)="aa4cc530bf3b8a51758aa89396f3fec4dc16470bc01bc25b74be10e9c980fa18b74730841e26", 0x26, 0x7fffffff}], 0x882011, &(0x7f0000002580)={[{@nodiscard='nodiscard'}, {@resize_size={'resize', 0x3d, 0x407}}, {@grpquota='grpquota'}, {@errors_continue='errors=continue'}], [{@dont_measure='dont_measure'}]}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) write$P9_RLCREATE(r1, &(0x7f0000002600)={0x18, 0xf, 0x2, {{0x4, 0x1, 0x4}, 0x6}}, 0x18) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict={0xa, 0x0, 0x0, 0xb, 0x3}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000200)=""/242, 0x28, 0xf2}, 0x20) write(r0, &(0x7f0000000300)="96aaad11729fb3fef7aa2e869dc5b934e63ebaa095c35d7f6f948be460ea9250e055ad1805fa92134b7facd7698549f1203f55eba226f654f08fe50d8e98e2a65878c2f9f6b021d71b38528db1812db72b46ae17f840a08b6f5e355f760b79fb7a90fb126c94f22cc7b69559333f55a66b23cba813394ebd32fa4d2ebd66e33d985348a78ae7e78eedaad550868ebb7afcd766be9334377737ead8f897ac6a58db78b110f4ff46ac59bb52aa86ce35bf", 0xb0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xd68d0000) [ 823.851109] ? lock_downgrade+0x880/0x880 [ 823.855294] ? kasan_check_read+0x11/0x20 [ 823.859464] ? __fget+0x367/0x540 [ 823.862957] ? __fget_light+0x1a9/0x230 [ 823.866952] ? __fdget+0x1b/0x20 [ 823.870337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.875907] __sys_sendmsg+0x105/0x1d0 [ 823.879826] ? __ia32_sys_shutdown+0x80/0x80 [ 823.884273] ? __sys_sendmsg+0x1f/0x1d0 [ 823.888281] __x64_sys_sendmsg+0x78/0xb0 [ 823.892368] do_syscall_64+0xfd/0x620 [ 823.896217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.901421] RIP: 0033:0x45af49 [ 823.904633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.923678] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 823.931413] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 823.938699] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:24:01 executing program 2 (fault-call:3 fault-nth:49): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000600)="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"}, {&(0x7f00000002c0)="3f6f27f97858e7c1dfec619398e16868208abbf4b536dece67732694f13e6c9c893810a15c46a69a8bc2bf7942b79816a859fc9ca1a0d60a8b8e00499199b0b0c12d016b1061a86c5c766d63723035185aacf0b480b36432d45f8b22859451255d6b3e48c89bcea349b0e12b70f93b4455f11536b3981f2710edd09528207650b952907fb9db2367fa56784dafad00107a8c3de023703f13ec05860c27c78e9666a5dbe345c3697297945e91b650949367125a3e17ac63b7e03ea7"}, {&(0x7f0000000000)="3f7a5495d4e17415f2dfba99f14c64d3f37f"}, {&(0x7f0000000380)="02286f0df1a279c9f0ae539d9464f087398ba60b1da7104e6e735e9a20c3e8561d80d4e34af6cc6259bcd39495a21ac53e29eb1d7fb73e9f378b4cfaa6e136c317885d65765ac193ba0b5ada5e194262d72d08c4904f942a52db9f5664dc2ac47f0092a51ca505bd39093eca04ab9a85c45237f9094ae1346c6c5d41c3e910ea33665d9065d240b406b6"}, {&(0x7f00000004c0)="00423add5e5603ebc08fd987f9ec52e55a94e37632a193654fb408bda3210a30449c9e6ef10543a6f545ac1f2848a0f9f529b0d91bacc1fc4bdb17c4ef126b430fbc71f55511677f8b3fca08f19b347a2b8b2de69964765a2630fe3176a5c7d245c7ad83d89a374ddf4a97c3e634d65b38b09122dabdd8f939330c1dd47c01e80a13f291fc28e9b4e78b3f56b7f87e5100d17b5050c21add11e75b14025d880b1a761b3eda2c97e82cabd59784ad98a10262bd362ac61985059f27f7c4346f"}, {&(0x7f0000000040)="326f9485b8358fb4c539462d1e17e85b23da5cadea1caad8c9ce4b679fe13c"}, {&(0x7f0000000100)="7feb9edf2d1e6be4b59ae551b7"}, {&(0x7f0000000800)="ff9036e32eb961c9f066609eb78ce8ce080885557aba5da24bf7bff970ad687670cd36199b38e63d49266abbc6158477890252c1bb7124c34f2589155be270a2efb72c6936b6cbf88ecd228bc3c3be984856801f619ec7f91dd22416df072b14c008cb9fbe996a911e82c9565ee6eeb05c6d0b36c35483c0e5729a44dd79880e499ab4f1a2dae4d181c3794b62418127fcd550eb31ea29b30633c7aeedc0554d5dede7708c1ae966bd177927532cf71f350dc5d966985e87ee11e2f4794cc95784660afd"}], 0x10000000000000d9, &(0x7f0000000180), 0xffffffffffffff2a}, 0x10) 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xde300000) 10:24:01 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r3, r4, 0x0) r5 = request_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='syz', r3) keyctl$instantiate(0xc, r2, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES16, @ANYBLOB="fa607c29909d6fe99513a75d3e7078c14e8421d957d4b631f2224fbba8bfc05cfcdd1ca475a00b661bde40d7938a6458097826491dcd492fef42884c555c962153be3c9aa87ede01bd0782bea5450ce4e0854802a600c6", @ANYRES32, @ANYRESDEC=0x0, @ANYRESHEX], 0x7, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x6) 10:24:01 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3e9e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:01 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa6ae}, 0x0) [ 823.945994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 823.953520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 823.960913] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 824.043984] encrypted_key: insufficient parameters specified 10:24:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000000)) 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe6820000) 10:24:01 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3f00, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:01 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa805}, 0x0) [ 824.095490] encrypted_key: insufficient parameters specified [ 824.127033] FAULT_INJECTION: forcing a failure. [ 824.127033] name failslab, interval 1, probability 0, space 0, times 0 10:24:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 824.217776] CPU: 0 PID: 19014 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 824.225723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.235184] Call Trace: [ 824.237802] dump_stack+0x197/0x210 [ 824.241466] should_fail.cold+0xa/0x1b [ 824.245385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 824.250517] ? lock_downgrade+0x880/0x880 [ 824.254690] __should_failslab+0x121/0x190 [ 824.258947] should_failslab+0x9/0x14 [ 824.262791] kmem_cache_alloc_node+0x26c/0x710 [ 824.267395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 824.273044] __alloc_skb+0xd5/0x5f0 [ 824.276695] ? skb_trim+0x190/0x190 [ 824.280339] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 824.285369] ? skb_put+0x183/0x1e0 [ 824.288934] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 824.293976] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.298337] ? ip6_setup_cork+0x1860/0x1860 [ 824.302686] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 824.308161] ? lock_downgrade+0x880/0x880 [ 824.312334] ip6_make_skb+0x32f/0x561 [ 824.316156] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.320680] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.325019] ? ip6_push_pending_frames+0xf0/0xf0 [ 824.329801] ? retint_kernel+0x2d/0x2d [ 824.333745] udpv6_sendmsg+0x225b/0x2a00 [ 824.337835] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.342184] ? udp_v6_get_port+0x6b0/0x6b0 [ 824.346441] ? __local_bh_enable_ip+0x15a/0x270 [ 824.351136] ? _raw_spin_unlock_bh+0x31/0x40 [ 824.355575] ? __local_bh_enable_ip+0x15a/0x270 [ 824.360274] ? mark_held_locks+0xb1/0x100 [ 824.364429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.369209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.374257] ? release_sock+0x156/0x1c0 [ 824.378272] ? __local_bh_enable_ip+0x15a/0x270 [ 824.382960] ? _raw_spin_unlock_bh+0x31/0x40 [ 824.387391] inet_sendmsg+0x141/0x5d0 [ 824.391213] ? inet_sendmsg+0x141/0x5d0 [ 824.395206] ? ipip_gro_receive+0x100/0x100 [ 824.399553] sock_sendmsg+0xd7/0x130 [ 824.403311] ___sys_sendmsg+0x803/0x920 [ 824.407336] ? copy_msghdr_from_user+0x430/0x430 [ 824.412115] ? lock_downgrade+0x880/0x880 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xee250000) [ 824.416292] ? kasan_check_read+0x11/0x20 [ 824.420463] ? __fget+0x367/0x540 [ 824.423946] ? __fget_light+0x1a9/0x230 [ 824.427939] ? __fdget+0x1b/0x20 [ 824.428325] encrypted_key: master key parameter is missing [ 824.431318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 824.431344] __sys_sendmsg+0x105/0x1d0 [ 824.446399] ? __ia32_sys_shutdown+0x80/0x80 [ 824.450872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.455674] ? do_syscall_64+0x26/0x620 [ 824.459699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.465604] ? do_syscall_64+0x26/0x620 [ 824.469595] __x64_sys_sendmsg+0x78/0xb0 [ 824.473677] do_syscall_64+0xfd/0x620 [ 824.477510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.482738] RIP: 0033:0x45af49 [ 824.485943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.486725] encrypted_key: master key parameter is missing [ 824.504877] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:01 executing program 2 (fault-call:3 fault-nth:50): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xeed40000) 10:24:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x806, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r5, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1, 0x4c) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60822560c6f34d8c}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}}, 0x0) connect$inet6(r4, &(0x7f00000002c0), 0x1c) ppoll(&(0x7f0000000040)=[{r4, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc08c5336, &(0x7f0000000100)={{}, 'port0\x00'}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x280, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000500)={{0x1, 0x0, 0xffffffff, 0xf4, '\x00', 0x8001}, 0x4, 0x30, 0x7f, r8, 0x4, 0x4, 'syz1\x00', &(0x7f0000000240)=['net/igmp\x00', 'nl80211\x00', '\x00', 'nl80211\x00'], 0x1a, [], [0x2, 0xfff, 0x6, 0xed]}) setsockopt$inet6_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000040)="2aa083402c8144f82e1587602a30f27193", 0x11) r9 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000003d40)=[{{0x0, 0x8d761e3f, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 10:24:01 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa92e}, 0x0) 10:24:01 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 824.504892] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 824.504900] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 824.504907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 824.504915] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 824.504922] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf5ffffff) 10:24:01 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xae51}, 0x0) [ 824.672654] FAULT_INJECTION: forcing a failure. [ 824.672654] name failslab, interval 1, probability 0, space 0, times 0 10:24:02 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4146, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 824.777013] CPU: 0 PID: 19057 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 824.784868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.794687] Call Trace: [ 824.797293] dump_stack+0x197/0x210 [ 824.800947] should_fail.cold+0xa/0x1b [ 824.804858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 824.810163] ? lock_downgrade+0x880/0x880 [ 824.814337] __should_failslab+0x121/0x190 [ 824.818592] should_failslab+0x9/0x14 [ 824.822412] kmem_cache_alloc_node+0x26c/0x710 [ 824.827045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 824.832605] __alloc_skb+0xd5/0x5f0 [ 824.836252] ? skb_trim+0x190/0x190 [ 824.839906] ? __ip6_append_data.isra.0+0x2071/0x2fc0 [ 824.845121] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 824.850159] ? skb_put+0x183/0x1e0 [ 824.853727] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 824.858774] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.863137] ? ip6_setup_cork+0x1860/0x1860 [ 824.867520] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 824.872904] ? lock_downgrade+0x880/0x880 10:24:02 executing program 3: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000000)=""/177) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x1}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r4, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r4, 0x1, 0xa0, 0x400}, &(0x7f00000002c0)=0x10) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x1, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x40, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) fsetxattr$trusted_overlay_nlink(r6, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x9}, 0x16, 0x1) [ 824.877115] ip6_make_skb+0x32f/0x561 [ 824.880936] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.885286] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.889640] ? ip6_push_pending_frames+0xf0/0xf0 [ 824.894418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.899203] ? retint_kernel+0x2d/0x2d [ 824.903134] udpv6_sendmsg+0x225b/0x2a00 [ 824.907224] ? ip_reply_glue_bits+0xc0/0xc0 [ 824.911585] ? udp_v6_get_port+0x6b0/0x6b0 [ 824.915854] ? mark_held_locks+0x100/0x100 [ 824.920112] ? retint_kernel+0x2d/0x2d [ 824.924019] ? trace_hardirqs_on_caller+0x6a/0x220 [ 824.928968] ? mark_held_locks+0x100/0x100 [ 824.933229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.938015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 824.942885] ? inet_autobind+0x144/0x1a0 [ 824.946985] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 824.951862] inet_sendmsg+0x141/0x5d0 [ 824.955777] ? inet_sendmsg+0x141/0x5d0 [ 824.959771] ? ipip_gro_receive+0x100/0x100 [ 824.964114] sock_sendmsg+0xd7/0x130 [ 824.967850] ___sys_sendmsg+0x803/0x920 [ 824.971857] ? copy_msghdr_from_user+0x430/0x430 [ 824.976788] ? lock_downgrade+0x880/0x880 [ 824.980965] ? kasan_check_read+0x11/0x20 [ 824.985251] ? __fget+0x367/0x540 [ 824.988742] ? __fget_light+0x1a9/0x230 [ 824.992828] ? __fdget+0x1b/0x20 [ 824.996211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 825.001773] __sys_sendmsg+0x105/0x1d0 [ 825.005676] ? __ia32_sys_shutdown+0x80/0x80 [ 825.010141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 825.014913] ? do_syscall_64+0x26/0x620 [ 825.018904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.024369] ? do_syscall_64+0x26/0x620 [ 825.028374] __x64_sys_sendmsg+0x78/0xb0 [ 825.032462] do_syscall_64+0xfd/0x620 [ 825.036295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.041501] RIP: 0033:0x45af49 [ 825.044706] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 825.064354] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:02 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xaea6}, 0x0) [ 825.072091] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 825.079389] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 825.086678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 825.093957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 825.101238] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf6770000) 10:24:02 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4641, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:02 executing program 2 (fault-call:3 fault-nth:51): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:02 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="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", 0xfffffe28, 0xfffffffffffffffe) 10:24:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x800, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:02 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xb41e}, 0x0) 10:24:02 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x46be, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe1a0000) 10:24:02 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xb6a3}, 0x0) 10:24:02 executing program 0: open$dir(&(0x7f0000001500)='./file0\x00', 0x2101, 0x20) r0 = add_key$keyring(0x0, &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = add_key(&(0x7f00000014c0)='asymmetric\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0xfffffffffffffed0, r0) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0xd900) r2 = add_key$keyring(0x0, &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0x0) r3 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x1001, r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r4, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000001540)={0x9, {{0xa, 0x4e21, 0x4, @mcast1, 0x1}}}, 0x88) keyctl$read(0xb, r3, &(0x7f0000005340)=""/4096, 0xd900) keyctl$dh_compute(0x17, &(0x7f0000000280)={r1, r3}, &(0x7f00000004c0)=""/4096, 0x1000, &(0x7f0000000400)={&(0x7f00000002c0)={'sha512_mb\x00'}, &(0x7f0000000300)="10e0fce00a7165c10d2fd6dd2b92932fd61b68f7495030a89c1339b11c4a8ebde90ce762d76eedd8f2b0ade86e22a7394800e28314e39c59f1d012437ffa163bc9af6db9594e2c5d15e2dfc2efcbf44b116cc0cfb2ef38192abb5d66829fd4125213305d20f7a7d4d0947de2ee7829052553295391c23fcfebf38898689dd8e8cbb9c66a94da27f2cb50dabaccffa8c873090cd03f103c55a3556c5e7fd22857c67a3ee99dde0bac9ab69b5a169b2fcb72f9a54005027c5517abd26e35d527f6a1a8e7312d684385ab3ff19ca04c1cba341734172fe801af69f1aafde17fe2", 0xdf}) perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffffe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x40000000, 0x0, 0x0, 0x800000000008, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r6 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r6, 0xc100565c, &(0x7f0000000180)={0x5, 0x446, 0x0, {0xa, @sliced={0x1, [0xf5fb, 0x4b, 0xff, 0x7fff, 0x8, 0x1, 0x2, 0x4, 0x2, 0x2, 0xffff, 0x0, 0x9, 0x9, 0x7, 0x5, 0x401, 0x8000, 0xff00, 0x57a1, 0x40, 0x7, 0x7f, 0x101, 0x1, 0xd5f, 0x40, 0x200, 0x400, 0xd7, 0x5, 0x3, 0x0, 0x2000, 0x1, 0x200, 0x7c6, 0x8f9, 0x3ff, 0x1ff, 0x7, 0x6, 0x1c, 0x8000, 0x40, 0x401, 0x402, 0x9], 0x6}}, 0x4}) 10:24:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe800000) 10:24:02 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4c36, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 825.607433] FAULT_INJECTION: forcing a failure. [ 825.607433] name failslab, interval 1, probability 0, space 0, times 0 [ 825.674788] CPU: 0 PID: 19111 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 825.682638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.692007] Call Trace: [ 825.694628] dump_stack+0x197/0x210 [ 825.698283] should_fail.cold+0xa/0x1b [ 825.702200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 825.707333] ? lock_downgrade+0x880/0x880 [ 825.711508] __should_failslab+0x121/0x190 [ 825.715762] should_failslab+0x9/0x14 [ 825.719579] kmem_cache_alloc_node+0x26c/0x710 10:24:03 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) r7 = getpid() r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r8, r7, 0x1b, &(0x7f00000002c0)) ptrace(0xffffffffffffffff, r7) r9 = getpgrp(r7) r10 = gettid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r12, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) statx(r12, &(0x7f0000000440)='./file0\x00', 0x100, 0x8, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r15) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r17) r18 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r18, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$TIOCGPGRP(r18, 0x540f, &(0x7f0000003740)=0x0) r20 = getpid() r21 = getpid() sched_setscheduler(r21, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r21, r20, 0x1b, &(0x7f00000002c0)) r22 = getpgrp(r21) r23 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r23, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r24 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r24, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003fc0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000040c0)=0xe8) r26 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r26, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000004100)={0x0, 0x0, 0x0}, &(0x7f0000004140)=0xc) r28 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r28, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r29 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004180)='/dev/rtc0\x00', 0x2000, 0x0) r30 = openat$mixer(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/mixer\x00', 0x80902, 0x0) r31 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000004240)={0xe98000, 0x4, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000004200)={0x980903, 0x10000, [], @ptr=0x4e7}}) r33 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004280)='/dev/rtc0\x00', 0x10200, 0x0) r34 = openat$cuse(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/cuse\x00', 0x2, 0x0) r35 = openat$autofs(0xffffffffffffff9c, &(0x7f0000004300)='/dev/autofs\x00', 0x100, 0x0) r36 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r36, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r37 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000004340)='/selinux/access\x00', 0x2, 0x0) r38 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r38, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r39 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004380)='/dev/rtc0\x00', 0x4000, 0x0) r40 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r40, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r41 = getpid() r42 = getpid() sched_setscheduler(r42, 0x5, &(0x7f00000001c0)) rt_tgsigqueueinfo(r42, r41, 0x1b, &(0x7f00000002c0)) ptrace(0xffffffffffffffff, r41) r43 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r44) r45 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r45, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r46, 0x0) setfsgid(r46) [ 825.724181] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 825.728967] __alloc_skb+0xd5/0x5f0 [ 825.732619] ? skb_trim+0x190/0x190 [ 825.736267] ? __ip6_append_data.isra.0+0x2071/0x2fc0 [ 825.741485] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 825.746529] ? ip_reply_glue_bits+0xc0/0xc0 [ 825.750880] ? ip6_setup_cork+0x1860/0x1860 [ 825.755227] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 825.762181] ? lock_downgrade+0x880/0x880 [ 825.766354] ip6_make_skb+0x32f/0x561 [ 825.770176] ? ip_reply_glue_bits+0xc0/0xc0 [ 825.774522] ? ip_reply_glue_bits+0xc0/0xc0 [ 825.778860] ? ip6_push_pending_frames+0xf0/0xf0 [ 825.783633] ? find_held_lock+0x35/0x130 [ 825.787724] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 825.792594] ? ip6_dst_lookup_flow+0x220/0x220 [ 825.797207] udpv6_sendmsg+0x225b/0x2a00 [ 825.801296] ? retint_kernel+0x2d/0x2d [ 825.804784] encrypted_key: master key parameter is missing [ 825.805202] ? ip_reply_glue_bits+0xc0/0xc0 [ 825.815161] ? udp_v6_get_port+0x6b0/0x6b0 [ 825.819421] ? __local_bh_enable_ip+0x15a/0x270 [ 825.824106] ? _raw_spin_unlock_bh+0x31/0x40 [ 825.828544] ? __local_bh_enable_ip+0x15a/0x270 [ 825.833246] ? mark_held_locks+0xb1/0x100 [ 825.837432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 825.842209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 825.846988] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 825.851612] ? release_sock+0x156/0x1c0 [ 825.852276] encrypted_key: master key parameter is missing [ 825.855624] ? __local_bh_enable_ip+0x15a/0x270 [ 825.855641] ? _raw_spin_unlock_bh+0x31/0x40 [ 825.855663] inet_sendmsg+0x141/0x5d0 [ 825.874153] ? inet_sendmsg+0x141/0x5d0 [ 825.878151] ? ipip_gro_receive+0x100/0x100 [ 825.882502] sock_sendmsg+0xd7/0x130 [ 825.886240] ___sys_sendmsg+0x803/0x920 [ 825.890237] ? copy_msghdr_from_user+0x430/0x430 [ 825.895024] ? lock_downgrade+0x880/0x880 [ 825.899198] ? kasan_check_read+0x11/0x20 [ 825.903372] ? __fget+0x367/0x540 [ 825.906857] ? __fget_light+0x1a9/0x230 [ 825.910851] ? __fdget+0x1b/0x20 [ 825.914237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 825.919799] __sys_sendmsg+0x105/0x1d0 [ 825.923707] ? __ia32_sys_shutdown+0x80/0x80 [ 825.928165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 825.932942] ? do_syscall_64+0x26/0x620 [ 825.937317] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.942797] ? do_syscall_64+0x26/0x620 [ 825.946797] __x64_sys_sendmsg+0x78/0xb0 [ 825.950884] do_syscall_64+0xfd/0x620 [ 825.954821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.960898] RIP: 0033:0x45af49 [ 825.964143] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 825.983150] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 825.990878] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 825.998169] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 826.005471] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 826.012758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 sendmsg$netlink(r0, &(0x7f0000004480)={0x0, 0x0, &(0x7f0000003f40)=[{&(0x7f00000001c0)={0xb0, 0x16, 0x81c, 0x70bd2c, 0x25dfdbff, "", [@generic="ec21166b", @typed={0xc, 0x17, 0x0, 0x0, @u64=0xfffffffffffff800}, @generic="9f8baa93287d7d64b24426574ffad7932b0d9ad459e985368cc3aec674505cf7bcc758fb67d48810d351cd4a1cb06fb856244a0f69eaf8e1ba023edb45463d100684b46c919d6f", @generic="257e260b1b1aa78b86f0ed31400a9cc2f9379b6ca7a8d0fc8102450d0c34a826f55c4fe4d035b6e6b57b0a3ac9ec98ea4fce9b5eb07ee040e75b12a71ef8a350f1a1769f173f99205e", @generic]}, 0xb0}, {&(0x7f00000004c0)={0x874, 0x21, 0x800, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x2e8, 0x5c, 0x0, 0x1, [@typed={0x4, 0x93}, @typed={0x8, 0x4b, 0x0, 0x0, @u32}, @typed={0x8, 0x1d, 0x0, 0x0, @ipv4=@rand_addr=0x80}, @typed={0xbe, 0x36, 0x0, 0x0, @binary="3d61b05131dd670a613a1be581321f7db0e21f38b8053e55b20f358a53f0f698550e8d6139095635f8dcd9c15dd9a2736807f6c8b54d11d4a2f7f5643343922d09c51223d6e70ef19c4b1b180b6ee41f84482a47c3d4b92e52b8701122a74e4144f73644148ea432c5843d22a94ccdf0fc486cfe5d7a47ecb33c452feb3217cd8ea6c4fc301f10dbde93296564436806d2f605f94f4bb18a63a7364539ebe9db95a0f5a77048417543ca2b1a3cb9b650bff1aec93fa7358025f7"}, @generic="dedad3f301c43e32e0c79153fe488846fed276f52eaa0fe0664c21342fe41c247e30a0b6cc5fe298e2f67c48ee4f6642f468338005564fdd59d20ef864d669c64f0da5e73cb7bbee5ab8a4af8d05402ac4f6bdd0a8eeb8f4fa811336a4c1912de048cf14804f4f0734640b9dd0965c2d9b95e1b3ccedd64ac3b26a66d7e277314d79256ef8a6fc618d655cdf3ced4d97192adb7e8624c18a37b503419777b7", @typed={0x8, 0x54, 0x0, 0x0, @ipv4=@multicast1}, @generic="a5f73b5d9c64887bc6f091d7f703355327880c1ac4d1caa3e370039e2a5207a0de62f891474cd07f9434b77474ce2d61e78cf844d49492ef9a692cebb2ca89599badea1b2597535c90eb56b10a2aeaf65b5bb4a800da14dc28f5f3f1cb86e3fad48700c84f50a80f6896ad46cf0983513297bcc5c4c909bf5f468c0890428c3b1d2181925842fffad77b16db74f2502a125fb057960af395d68bfb432cbf7acabe4af6a937265305ccee40259368ce8502748318864d02eba0949530638b42eac82d8c4975f0dbf56995f2ea", @typed={0x8, 0x67, 0x0, 0x0, @fd=r1}, @generic="c6da0310c5ba9d891f8e732fea7ff6a45d09a6dbd2b164c97311060834519b35e875e4c8742657ab41dafeb183e04cd73a6327b765dd", @generic="741905acb6b09a1caa6cb8e84b70d1d3bbd5d642d1ba491d526546c4ac892cdf9973be37748db7e7a30598568fdadb0bf36f14850469421abc5097ed0e82d75ae408383a23b4942089cde3c4f4115e3d9a37fa10ff1d4fae00c9a203ad8876"]}, @nested={0xb2, 0x94, 0x0, 0x1, [@typed={0xc, 0x71, 0x0, 0x0, @str='environ\x00'}, @generic="ba234d6e916731079e5efa5087d6a341a8898a14e47a56af13550b653a97d170e14db9674a565b7aee584e6249c98875bb07e7f467138421f15974885f30fb9cffb313d303d9fe87bc98081bd7ca05c194b8ca387f6c610c6d6e8ec0082e33a9a6bed425f599e243b7b26dfba163a3dbae6cfb4d5dfd27b9705a8595f66e8d1aea434008c17b5ff3ccf2cca6c6760fdf9905", @typed={0x8, 0x69, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x3d, 0x0, 0x0, @u32=0x66}]}, @typed={0x8, 0x45, 0x0, 0x0, @uid=r4}, @nested={0x212, 0x25, 0x0, 0x1, [@typed={0x14, 0x7b, 0x0, 0x0, @ipv6=@loopback}, @generic="124c875ed30ea4fac8dfa0f207d3fa68e56e3ea9742bb3a60793e70970cb4a26c039016e1f28bcbca30f2a4b9df89b33a903894262a248b70df083684f1c20d4079858c9e8629c6044084c3c56e55ba3504e62990adc97ef76b58497ee0e7b680100c5a621df50df4e6827c0524476168c75d9a7868ee9a97c216ab210172c22dc1952fc53f5dba590bae72be115861961c06afdfb2cc64ebce1a3313a7c93f52554917f796a2dc2ad6c46ff131399590fd6c8905335e5e3a4e7b4c4b9bd8223fc2c9d915f35022772286b8ced65d42a4919cbf4d5e981e750eeec37967edc6869e279b3", @generic="90f6cb824ce47de0149936431d5f337233b3109a51dff756b40bc431337ac4b1dfa435503d674cc5ceb58e0bd89ad302c6555e871fe5d181fe76a3b08290b1a998897ca772ce5822575f2fe0d23b8e8fbb1fcd45be29c66b5a2a78ec2feafeb7b0731ee2bcce7d8988df812874dc9194ed6744e76455356bed442bd30887f7e280063d87c2db7cb7044e5c3482691358192cf11a9dcb0c65d3864b8ee4ddaaa528580787461c7f2caca6a14d552eb343c82b93490bdfa434bbdd465ad4baabe2d3c2743d7f19b9faf4", @generic="ceff66f117e0260fb18cad3272e92fdf03ffbcae704cfd0a55ff628fe0c386d2f6cadc6988d49c2298a7a212ef0e71a1b824c2d7909a6fc08314a9b37037996275bb31bf543008aadcfb070a10"]}, @typed={0x8, 0xc, 0x0, 0x0, @u32=0xed9}, @nested={0x261, 0x93, 0x0, 0x1, [@generic="58a95e688a5ac280c7ed4b327526906296a884623f882b67f8fa4bae5d0b4d15584eb3eff9bda01a74961457bb127f45294c5053d7c5df4b06d8c7619bd467dffb83818c5dcc0836ee37509d515b83d447333a9de913ed47f88e25a2783e50ca53aa25cffc29563cb89666400fd7108ef0862661b318db70d7623d543345fe6b36b7cb1488d177d09ff03a48850a3fdf65b1529b5889470b2c8e9521fcf49c7f6fad4f46407f07e762f602c4bfe8c3d76591e9662b92b7af1a6d2c846cf9158326eba581f942bcc703ae2ebc74af786f9ce4eb1094713ea0fb00a79ed9c4c919dce0e8f46cc07707beef95", @generic="59b7bab001decfd2dca9e2ad7c2eda8cdc2113141bf5636be184c265df2048acdad0c0412a45b87846f91746c9b49c579f4405f07114590b0b784c76da6047944e6b758cc0e6a30a58f1f96cecc9638044b2c0edfe2ff80d161cb2529d96172ae0407acf8647e2bb54271bc0b94e13f40b0564f9dcd32766bb601551b17d02a81f2205e23ae1eec96e14667e01c16a87c33f78ef3ed7d4d1fa973e55ecc534b46d7347c74cb97bccb9db26d55c278cb0dd47665c94d2a196100ae7a8459a7058291ee882066972319aa5b26e5cd54b0a76a7b40f3711be3219fdcc9a99d82b0d476ab2da2f6e", @generic="c7a7a8e2e999ba0a4c2a48c6bed309afbdbab4fb9b75b212971842d1ffd493cf29936b22084949c65cb7775f722bcddd31a8443d5cf2615ed3ecef7da3c9008e7a2c6577cf2eb94d92f48319bbe02739ca0ec0f939ec36ba150037afc64561b5e7745381ebf06ffbca8771b7ab0e883348eb044a4c08f33522cb8ede41a5efe11627a8512fa5f31538e9d837"]}, @nested={0xc, 0x8f, 0x0, 0x1, [@typed={0x8, 0xe, 0x0, 0x0, @uid=r6}]}, @generic="cffa5bb470b26b387280e9f04cd39800f1453938befbba0f7ac7bd0f849b532ec3b61fb9a993a57f3c05b1688be8eadc79"]}, 0x874}, {&(0x7f0000000d40)={0x12b4, 0x10, 0x4, 0x70bd26, 0x25dfdbff, "", [@generic="ac55c947bde9e31c85eb643d4a1a93662a3f3f9b1c02", @generic="879997471443b84a2e7e859c68403ea05a4ac47816a2a7f48d18ab1fe7ac074fdb7004217dd5f95224edc55a7267f02f0b96b0d0b37ae2fb2b2242f87ba70653fe1d428e329a0d58e4bdd1cc5eb04cc0d3f220d69c2fef5e3c75aac0f34645b3529887", @typed={0xc, 0x62, 0x0, 0x0, @u64=0x1f}, @nested={0x158, 0x34, 0x0, 0x1, [@typed={0x14, 0x37, 0x0, 0x0, @ipv6=@rand_addr="7949a793bfec495a6d43bc17d8eabb10"}, @generic="11a9bbcd60f0484648d48681dfc0c10caa6e7946779196e6ffe3db0c95776b0128d7f05ff2fab770aa969d1b59248c202a0cecafc31da1bdacc62db561a7ac961b54ee", @typed={0x8, 0x7, 0x0, 0x0, @ipv4=@rand_addr=0x5}, @generic="e59b1fbe576ee053fe4c7940c7c1f9a74072daddd4f38120a73b3fb290678b5f85f8ab252e758bcda97f88528f592440f8", @typed={0xb9, 0x4e, 0x0, 0x0, @binary="990d4c6664a30895aecc518df9adf2bd1b1c83b84f06dac0d9dc405c58ebf38a72294d4a6f7deeb5a0ee67cb2b35185dea604aba9bcdd2789d15f62669130b32ec47d6986abe3a2e07839f8d36aa7d5b333f03ac8e65e97071ef085e0049ba870a86ae283c0981774a81b05bd76b4a4cd5071131b4d24f637f182740979ab8e5b99f29eb575546a1baff4d84947b6da1ed6318857fa88073372efce3edfbefc5fe248b622ba967b47df658fe8b34cf54a4024332c8"}, @typed={0x8, 0x23, 0x0, 0x0, @u32=0x5}]}, @nested={0x101c, 0x56, 0x0, 0x1, [@typed={0x8, 0x48, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x8f, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x3f, 0x0, 0x0, @pid=r9}, @generic="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"]}, @typed={0x8, 0x29, 0x0, 0x0, @u32=0x1000000}, @typed={0xa0, 0x55, 0x0, 0x0, @binary="b3184883f4f3437f7b8922e96891eee91af9d9830a2dd1ffb37cd9d06e4a3a2bfc034ffd824581978e890fa88be18dde96d0814887f13a1341fe97e62e66d978a8a00e35693d6c0ebbf6ad0eb9ad543d88ab03a2c8c0d82fd6a85a23a68b22ecffe6402b0c04662149bad3243f088570d4551dc0135e3e61a2e880f98ee4be0f6139fe4b2ddf09271a1b2948ed70efa61b49eea037acb414d214969f"}]}, 0x12b4}, {&(0x7f0000002100)={0x154c, 0x3e, 0x100, 0x70bd26, 0x25dfdbfb, "", [@generic="8e0991a9b592328ab9129cad90585d706b9766803d8a4f8dc3f9b0aef268559a67b49dc25fa4a2a6bb2e5e02e8d3318f2e6195a3a3f3eb396ac6b7e7733ef05bf410c9831647fbef1cc5c6f5f5ddc0ce8973da1ac89676b6bd6a581f3ac2fb9d8cc7f1ee221152a48c7f7ffb3822188623bf94b64d5508db7ce7c9dbe434a340121939a99ee0da3f66c700c59f88070d0350609c1b1881f7049c97549501794c4c9a18edcc0d9375875089780a6aecc8", @nested={0x214, 0x0, 0x0, 0x1, [@generic="86405956c9faf76a68c81af3296afef0a63b32185f170e48306fba0e0bdc52138ea528790b0903ec2e55779432c2bd7223b139dc19b4b580f4392a5382ca5496f051a080cfa6b85d83ecbd720b8b4aa61a2e497d1d11b4d77e2bee3dcb38f7fd5db6595c8f739641e25fa4beb40f35fdc7518923aafde2cb2e0d8701827de558d6295a4dca5db7b9db71c200b517fe82c8b4d1fe864396da0d6adf78dd3cba95ace60bc55e81eac03582827e281e9aa4670fdbfd4086c4211b054f0671a900379d2037c1b652053eefcd37368bdfabbfdb3a30578902872438e2011f705a937aa1470b24ba264bd355905e98", @generic="8600e684eb9345261e231b9d0c46f16121f8c24596e8cc720bab601ced9307cd647867cd38ec9a", @typed={0x14, 0x84, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0x30, 0x0, 0x0, @u32=0x8}, @typed={0x8, 0x22, 0x0, 0x0, @pid=r10}, @generic="78d6f8d6115524c47871e22a1e15f30b4334feed59de560fff055e341658e66140ebcea5ff78d96236798e14b890c8a6d4cbd47ef3dc5987bd0241e860c76533df50260a51f698ffbd9e35a550c85b5dc04e00f5818d8fd5408fa09c6a32efd8672605437b31f6e86bfdc0d2104221ce4996d0657665f5248781bfa7f5c29f08031f7151c6ef17e7a8e1e2b970a1529792331a2b8b4c9acb0b3a80ddf0", @generic="89707f07d9ae2d00659ceb06155567d946c0c3e121785b361541346d4298c671", @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@local}, @typed={0x8, 0x64, 0x0, 0x0, @u32}]}, @generic="22ae1160c25ecaf0d3ce679addf6ceb546b29dcf", @typed={0x8, 0x12, 0x0, 0x0, @uid=r11}, @generic="b92f4ea00b4c8f2c418bd5548913e4b27e67174c71ec9f406ebf6d40f2aafaf0e51348b0", @nested={0x109b, 0xc, 0x0, 0x1, [@typed={0x8, 0x39, 0x0, 0x0, @ipv4=@local}, @typed={0x1e, 0x3b, 0x0, 0x0, @str='$posix_acl_accesseth1ppp0\x00'}, @generic="6b7dde68a22aed361e7f61d3efc738cacba27e8620781f959b1ff30f7347c0529409c12a73a7f7df2d7abf1c24a6d0c21aa4e36e879fd45f460419b1cfe374d9751af9bb2df6cccc6f7b44655b99ee36e81e6a", @typed={0xc, 0x30, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x92, 0x0, 0x0, @u32=0x101}, @generic="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", @generic, @typed={0x5, 0x6a, 0x0, 0x0, @str='\x00'}]}, @typed={0x4, 0x76}, @typed={0x8, 0x5e, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @nested={0x18f, 0x88, 0x0, 0x1, [@typed={0x8, 0x8b, 0x0, 0x0, @uid=r13}, @generic="22983a49e8b4557ad4637f170137f75240411aac101996e6741a54c6fd96604a391b61e8d1c10ba6f802514480787beee81fee5f1953bccaed1a22", @typed={0x4, 0x1f}, @typed={0x46, 0x72, 0x0, 0x0, @binary="e1366c7be056fa272ae8c4c8f0df39478c3e26faa9dc5255689faffadefd1f2d9a45852dfd5345fed04b903955e16d60374ef2057fbeb3a77af1d76f8c5f65a1ce9a"}, @typed={0x8, 0x32, 0x0, 0x0, @uid=r15}, @generic="37642af7024bc2d8507272511bba3e05b9ac2b93a28c9b1bed3a722fcb642751037d5b596c577c", @generic="28fa60ed6d2c29b7fa2ffce07dec08cecd7cb2ac52e96dde7eab07bdc69083da61cd194cc76cde35f47578e6b92ca9252848dd261cdf593560ec8de7c54b3f20cfaa0254440c5eeac8114507f2a90b0ddfca0d710db951a18dbfa806f155cb125623ce8a807a302877a45954efb4c4071c9669ea8255a7c24ea385648227e79d6a63a53c8eaa974a0297e8e356668f80399eea8cc114e0b4e611cf0c05423ca8a0030a671a3757a9eaddeb2496980d58d5572f8e21a5827cbcf8c6f114237ea6144f50fa3e3443cb411a3cea95"]}]}, 0x154c}, {&(0x7f0000003680)={0xb8, 0x1c, 0x2, 0x70bd2c, 0x25dfdbfe, "", [@generic="933cdff458fa1b4d1e2527f59afc4a30c7bf7150b0c8dd970840fb51d5979f6fd42205a8f724a27f9034b4180a672ae40ec4ec83989a4f25c423b2931b2fd9bfb48c6866", @generic="ca8c5d7fcaac78d8106686c44f9a2da62d2cbe1ff2da7128361d9ff34fc0d78364a8dd51b4455e07ffde7389dde5d39ffe2dfa09d687d633666d362b26741ee39b837ede459d339278e4d8e63a8ae2b8eb39fe6126da2e990b5be31017c4325699"]}, 0xb8}, {&(0x7f0000003780)={0x7bc, 0x3d, 0x4, 0x70bd27, 0x25dfdbfe, "", [@typed={0x8, 0x5, 0x0, 0x0, @u32=0xbd33}, @typed={0x6, 0x63, 0x0, 0x0, @str=':\x00'}, @nested={0x380, 0x22, 0x0, 0x1, [@typed={0x8, 0x7a, 0x0, 0x0, @uid=r17}, @generic="c23dfd00a1098250ed206d87be25bf81d79b6b524f99668cf8314e271923027618a18b575f3da0f826b9a9c10b5a66101c3956c4288603635e18ee101e2440b3d75f37c2260d4bb307e8abbb8b61cbd6d0e5c804727b039641f928301b5f653e9c3bae6fef7e346cb604da794853c91f3528c11898b8bce6be2185e4f93767ab676e198f510c5750c9d4c8d5da92f90e257c43de6b61d37de27638afe91e17006bca8cd6176c0e149e1bd4e0081dd75c130c99b385a4c112587075bc07da29db2bc22381ab4a5dfa0c0ab90cd0000043e7a9b31cef5264f087f775760368af56a782ed1e77369cefc59e1663", @generic="468b891ed4cbeefb95d9b66144975ffdeffb0ae24f30dd869228267e6c32e2f6c78b63902700bf871c51578adc484d8a7ce80872f622efa0f8ef31f7d51545811db02953427ce832069fe3bf31d32e502b92db6caca3816035312207bb0e3a96e4ebfe42f229a23b69174bd755df3969e4249f00e34e9f446712761b8f3760d095c48f718831cf6cf66a8fe0e0ba33d83760eae6d03745a4eb0155d5647b4f092666cf57b36dfb11ed69bb8e5aedc09310fd2dd47dd6da0643b878c7b728f8dd0baf8e539e84bfe1dd0d16ea0ffe93c25d6336bbcb3875b72cf798b2cf096ffec239dd54478918cec47305", @typed={0x8, 0x8f, 0x0, 0x0, @pid=r19}, @generic="0c14aded4d5ef7e51e7d36c00da1d86c626d313a0bb0eec5b82a52f0906d187df27ac7022e98d038c151fb5f1a9ebf4275f581048193cc880ff56f6a488fd18bc3d572ef7c29fa08c34c7177e5cf48b0b12cf92bac028ae688be1d7b79f1bad2e7bef95c591e6f0eb2eac61428955d7d5f8083f4d03b0b1333b33405b01835eb63790df0620df9f3d98341836e3acd33f27891103af99027b173501f2b28db961e84ae2210693eb2c013e0097eb269b417873f04091d40bfab11d3628b0ae7baefe72761a073ba", @generic="da94e35cf9dba06b3ebe3019", @generic="95910e212def652283d5f7100e15446ffff56574c47b85d74da19735e2192e57c2c0d97369969a235436824dbeacecf63765292ae1e7b59001c875c60cbacaf4852f397386d9be0399d554556863e859d285879e9511bbabf6ee1188100639954868969846e8b94738a3c39421870fe7f3e2cba230578cb689721cd08621a81c94078f7edb2993de4998", @generic="5126051f948ddc815e52c8cf36cef0228a4fabf145e35d704fc74f3889e88e3a9bb1b95472ec365fb5fcca9cda432fad11683e8f", @typed={0x4, 0xe}]}, @nested={0x19f, 0x3, 0x0, 0x1, [@generic="15493e330f1e85855a2dc0ae73e928c32d5048eecc774f30db0672974dafe03544b2fcacff096b9386a3271cf6ede0aa9dc60e894140bc77e958829334b41d022ff4478ff197be470bb542752851adc34ca67352ae1e7572391b045bf96d9994a251ca60f189f173cc02b697f68fc9f4c5bdfe836e651b966c2fcd3ef31dcbd5964d969c2407926a308e488b5c5b2a96999548c93ab2e2426860ff6b0511251af63fb9821b49f763a06477bf7ac86b40265355143157478c010f83a31bfbf90951581024faf4fe51cc8fd16566c05b4ba0a75160811db2c5bcd13c0b7c5ac3aba7", @generic="7c07eb78d13d8c566c2ab6d5b5af0656df337ca5c566e54f22e996cfe52d9341f072bc500c1ca7d7b8370265cbdb5e66c96d9ce505de2191ea7ffd5b776155f8070163b2a9e8f6d5a547a2bab885366be7cc3c5e0b17b462158715921eede63ab21dd7dbfc987a92fd7367de150ffdc5425a4bd5cf4bba4b93681059d52008ff5d95d8645a617da5cfb4ca17a07de5aebdeb6592df0ac0e6b17c5a548956cb20b05eca3d1a4127de4d08623ad58cb20a60a08d69b7d1267e6e75"]}, @nested={0x175, 0x28, 0x0, 0x1, [@generic="2ab1fe1b525c69e46303fe886568da3dcb359260c5558cc89b0b164b25d663d90b7fe353dbd6dfafb90bafa947bba05a756df9f094093de9a66ad6f9fd6094d02c036aab9e89f361ead394a1", @generic="5ddc8ed2d26abc3f853109c65bee5dd0f284730f9cef79ba6fc34ec4851f42ea97f94386ae5711bfbcd71934eb1d8fc7b0cc8631b6afe94d8c58bcfe2d4f832c2682b7afe04a2a952137db65a918af3712125dae25a9e6ec9e", @generic="fa2679324286b0557c2753430de4c8dfa60390fa2e35bb2c3ea91e0fd576adc5b46bccf8cb55b0e90eca9c29e5b7297eeb350727b7d49227f71a98df0d616dd5b4969cd55b936b0a912f1c1ca4a21fe7991ef9474ecf1c39d527ccac1cdaa94386219bfaddbac445a06d", @generic="6d5576cb8a1b00d0cc9429571ec4d8fa2eb6a2827bf31457f7d7547aa0727204b64c76e0388f47fdb5a0039386dcd3789b89ac3f5afccc9ae2521e61ea580c0fabe23734057903d42548cef826bfd170dc7995c76a7200eced7d", @typed={0x8, 0x8c, 0x0, 0x0, @fd}]}, @generic="41d98adef1bd5a9a430b8f32d8de6ea3ca944435d06bdbda9850388c659051817454b4802a0ffdff5afca92c94523c28dd10e06c7616cd50eb798916215886ba0d7a80ade5852421e4ad3216a49fff1716d7da5f6e9d62a19d12f76aa294000711b2f4878902e9693d3ee92445e501d2922a", @typed={0x8, 0x83, 0x0, 0x0, @pid=r22}, @typed={0x8, 0x2c, 0x0, 0x0, @fd=r23}, @generic="e8e40053934fb4c5c185b9860f8a568d0b89e1e7c35e51b95252ae79d322bfe61d2eb51e7b3d515ca6e05dcf0207ac92f1152cc1894569b71fdd74a94730536bb81af539e65bd2313b79d6850c07066e0df86e8c31bcda2d9dc3b44279ed7eb2166bc3a1d5c4c14b9a999ce2b37860a41f6f323200c6b3", @typed={0x8, 0x6f, 0x0, 0x0, @u32=0x9}]}, 0x7bc}], 0x6, &(0x7f00000043c0)=[@rights={{0x14, 0x1, 0x1, [r24]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r28, r29, r30, r31]}}, @rights={{0x34, 0x1, 0x1, [r32, r33, r34, r35, r36, r37, r38, r39, r40]}}, @cred={{0x1c, 0x1, 0x2, {r41, r44, r46}}}], 0xb8, 0x20}, 0x8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r47 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r47, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r47, 0x40084146, &(0x7f0000000000)=0xffffffff80000001) 10:24:03 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4e93, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 826.020057] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:03 executing program 2 (fault-call:3 fault-nth:52): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nTw default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:03 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x51ae, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfec90000) 10:24:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xb996}, 0x0) 10:24:03 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xffffff7f) [ 826.141777] encrypted_key: master key parameter is missing [ 826.165738] FAULT_INJECTION: forcing a failure. [ 826.165738] name failslab, interval 1, probability 0, space 0, times 0 10:24:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r3, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r3) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r6, r7, 0x0) r8 = request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='wlan1\x00', r6) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000340)=0x8c) keyctl$KEYCTL_MOVE(0x1e, r2, r5, r8, 0x1) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5636, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xbe46}, 0x0) [ 826.275693] CPU: 1 PID: 19155 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 826.283550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.292923] Call Trace: [ 826.295537] dump_stack+0x197/0x210 [ 826.297538] encrypted_key: master key parameter is missing [ 826.299193] should_fail.cold+0xa/0x1b [ 826.299217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.299240] ? lock_downgrade+0x880/0x880 [ 826.318017] __should_failslab+0x121/0x190 10:24:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xffffff8d) [ 826.322401] should_failslab+0x9/0x14 [ 826.326116] encrypted_key: master key parameter is missing [ 826.326231] kmem_cache_alloc_node+0x26c/0x710 [ 826.336464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.342034] __alloc_skb+0xd5/0x5f0 [ 826.345687] ? skb_trim+0x190/0x190 [ 826.349342] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 826.354382] ? skb_put+0x183/0x1e0 [ 826.357958] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 826.363121] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.367483] ? ip6_setup_cork+0x1860/0x1860 [ 826.371841] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 826.376704] ? lock_downgrade+0x880/0x880 [ 826.380881] ip6_make_skb+0x32f/0x561 [ 826.384702] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.389047] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.393399] ? ip6_push_pending_frames+0xf0/0xf0 [ 826.398175] ? find_held_lock+0x35/0x130 [ 826.402268] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 826.407136] ? ip6_dst_lookup_flow+0x220/0x220 [ 826.411749] udpv6_sendmsg+0x225b/0x2a00 [ 826.415838] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.420184] ? udp_v6_get_port+0x6b0/0x6b0 [ 826.424438] ? __local_bh_enable_ip+0x15a/0x270 [ 826.429120] ? _raw_spin_unlock_bh+0x31/0x40 [ 826.433544] ? __local_bh_enable_ip+0x15a/0x270 [ 826.438238] ? mark_held_locks+0x100/0x100 [ 826.442494] ? mark_held_locks+0x100/0x100 [ 826.446772] ? _raw_spin_unlock_bh+0x31/0x40 [ 826.451213] ? release_sock+0x156/0x1c0 [ 826.455223] ? __local_bh_enable_ip+0x15a/0x270 [ 826.459917] ? _raw_spin_unlock_bh+0x31/0x40 [ 826.464353] inet_sendmsg+0x141/0x5d0 [ 826.468207] ? inet_sendmsg+0x141/0x5d0 [ 826.472202] ? ipip_gro_receive+0x100/0x100 [ 826.476547] sock_sendmsg+0xd7/0x130 [ 826.480290] ___sys_sendmsg+0x803/0x920 [ 826.484293] ? copy_msghdr_from_user+0x430/0x430 [ 826.489073] ? lock_downgrade+0x880/0x880 [ 826.493237] ? kasan_check_read+0x11/0x20 [ 826.497406] ? __fget+0x367/0x540 [ 826.500897] ? __fget_light+0x1a9/0x230 [ 826.504900] ? __fdget+0x1b/0x20 [ 826.508277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.513832] __sys_sendmsg+0x105/0x1d0 [ 826.517728] ? __ia32_sys_shutdown+0x80/0x80 [ 826.522138] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 826.526896] ? do_syscall_64+0x26/0x620 [ 826.530872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.536224] ? do_syscall_64+0x26/0x620 [ 826.540209] __x64_sys_sendmsg+0x78/0xb0 [ 826.544264] do_syscall_64+0xfd/0x620 [ 826.548096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.553281] RIP: 0033:0x45af49 [ 826.556562] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 826.575463] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 826.583182] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 826.590443] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 826.597904] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 826.605170] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 826.612518] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:03 executing program 2 (fault-call:3 fault-nth:53): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfffffff5) 10:24:03 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xbf0e}, 0x0) 10:24:03 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5726, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x7}, 0x38000, 0x0, 0x0, 0x0, 0x100000001, 0x20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000200)={0x6, 'ip6gretap0\x00', {0x7}, 0x6}) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "6c8b31d6afd5752181fcfc9001"}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "975f0159f4"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x2001000}, 0x4000) 10:24:03 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x2, 0x7f}, {0x8, 0xac}], r1}, 0x18, 0x2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 826.712985] encrypted_key: master key parameter is missing 10:24:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') socket$kcm(0x29, 0x0, 0x0) 10:24:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa0000302ff) 10:24:04 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xc486}, 0x0) 10:24:04 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5c9e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 826.790158] FAULT_INJECTION: forcing a failure. [ 826.790158] name failslab, interval 1, probability 0, space 0, times 0 [ 826.845738] CPU: 0 PID: 19201 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 826.853591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.862962] Call Trace: [ 826.865576] dump_stack+0x197/0x210 [ 826.869244] should_fail.cold+0xa/0x1b [ 826.873158] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 826.878293] ? lock_downgrade+0x880/0x880 [ 826.882477] __should_failslab+0x121/0x190 [ 826.886737] should_failslab+0x9/0x14 [ 826.890562] kmem_cache_alloc_node_trace+0x274/0x720 [ 826.895686] ? __alloc_skb+0xd5/0x5f0 [ 826.899513] __kmalloc_node_track_caller+0x3d/0x80 [ 826.904470] __kmalloc_reserve.isra.0+0x40/0xf0 [ 826.909163] __alloc_skb+0x10b/0x5f0 [ 826.912891] ? skb_trim+0x190/0x190 [ 826.916557] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 826.921590] ? skb_put+0x183/0x1e0 [ 826.925149] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 826.930190] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.934561] ? ip6_setup_cork+0x1860/0x1860 [ 826.938910] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 826.943783] ip6_make_skb+0x32f/0x561 [ 826.947599] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.951947] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.956295] ? ip6_push_pending_frames+0xf0/0xf0 [ 826.961083] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 826.965953] ? ip6_dst_lookup_flow+0x220/0x220 [ 826.970555] ? ipv6_fixup_options+0x14/0x180 [ 826.974993] udpv6_sendmsg+0x225b/0x2a00 [ 826.979081] ? firmware_map_remove+0x1a7/0x1a7 [ 826.983686] ? ip_reply_glue_bits+0xc0/0xc0 [ 826.988042] ? udp_v6_get_port+0x6b0/0x6b0 [ 826.992298] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 826.996898] ? retint_kernel+0x2d/0x2d [ 827.000804] ? trace_hardirqs_on_caller+0x6a/0x220 [ 827.005757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.010536] ? retint_kernel+0x2d/0x2d [ 827.014452] ? release_sock+0x156/0x1c0 [ 827.018455] ? __local_bh_enable_ip+0x15a/0x270 [ 827.023139] ? _raw_spin_unlock_bh+0x31/0x40 [ 827.027564] inet_sendmsg+0x141/0x5d0 [ 827.031382] ? inet_sendmsg+0x141/0x5d0 [ 827.035375] ? ipip_gro_receive+0x100/0x100 [ 827.042843] sock_sendmsg+0xd7/0x130 [ 827.046582] ___sys_sendmsg+0x803/0x920 [ 827.050578] ? copy_msghdr_from_user+0x430/0x430 [ 827.055362] ? lock_downgrade+0x880/0x880 [ 827.059542] ? kasan_check_read+0x11/0x20 [ 827.063711] ? __fget+0x367/0x540 [ 827.067194] ? __fget_light+0x1a9/0x230 [ 827.071187] ? __fdget+0x1b/0x20 [ 827.074593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.080505] __sys_sendmsg+0x105/0x1d0 [ 827.084421] ? __ia32_sys_shutdown+0x80/0x80 [ 827.088865] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:24:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:04 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xc698}, 0x0) [ 827.093643] ? do_syscall_64+0x26/0x620 [ 827.097746] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.103130] ? do_syscall_64+0x26/0x620 [ 827.107134] __x64_sys_sendmsg+0x78/0xb0 [ 827.111267] do_syscall_64+0xfd/0x620 [ 827.115097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.120438] RIP: 0033:0x45af49 [ 827.123651] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:24:04 executing program 2 (fault-call:3 fault-nth:54): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x80542, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x5) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:04 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xc9fe}, 0x0) 10:24:04 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5e88, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:04 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) [ 827.142567] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 827.150290] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 827.157548] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 827.164861] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 827.172139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 827.179450] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7ffffffff000) [ 827.241530] encrypted_key: master key parameter is missing [ 827.280086] encrypted_key: master key parameter is missing 10:24:04 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000200)="e5f8d9982b20fe03f446e9c04bf89889ecce5c4a9b2c5963b38a6c47050000000000000061245e9fc473b3537d1f209acf09e16801e2e336d28589b9d2cefed7589a2e2422771aaa589d14fd6c64dfa92521cc809ed10a0b631ceaed006d25670c33e636893e64fac6c97747ef54e2ebfaa102eb5df7920dfdde64e27ca2422667419f7db1253b00606896a28d333eade34cbaea9c2ee3b31cad022f314b36296c88eec2891c624e53a97a807bdfbc7a2a3912faac2f18a5ab9cfecc2a565e4441fcac317356f15fc641f0c15d", 0x38e, 0xfffffffffffffffe) 10:24:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x10000000000000) 10:24:04 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:04 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xce3b}, 0x0) 10:24:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000340)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000280)=""/161, 0xa1}], 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0xd1b, 0x3, 0x4, 0x40, 0x2, {r1, r2/1000+30000}, {0x3, 0x235544f2dec8a035, 0x0, 0x0, 0x3f, 0x7, "ab7289a0"}, 0x400, 0x3, @offset=0x2, 0x0, 0x0, r3}) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e20, 0xffff, @remote}, 0x1c) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 827.419932] FAULT_INJECTION: forcing a failure. [ 827.419932] name failslab, interval 1, probability 0, space 0, times 0 10:24:04 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0x4, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 827.473870] [U]  [ 827.476160] CPU: 0 PID: 19245 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 827.476173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.476178] Call Trace: [ 827.476203] dump_stack+0x197/0x210 [ 827.499552] should_fail.cold+0xa/0x1b [ 827.500571] [U]  [ 827.503457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 827.503477] ? lock_downgrade+0x880/0x880 [ 827.503503] __should_failslab+0x121/0x190 [ 827.519207] should_failslab+0x9/0x14 [ 827.523026] kmem_cache_alloc_node_trace+0x274/0x720 [ 827.528148] ? __alloc_skb+0xd5/0x5f0 [ 827.531976] __kmalloc_node_track_caller+0x3d/0x80 [ 827.536933] __kmalloc_reserve.isra.0+0x40/0xf0 [ 827.541624] __alloc_skb+0x10b/0x5f0 [ 827.545359] ? skb_trim+0x190/0x190 [ 827.549008] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.554038] ? skb_put+0x183/0x1e0 [ 827.557599] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 827.562729] ? ip_reply_glue_bits+0xc0/0xc0 [ 827.567083] ? ip6_setup_cork+0x1860/0x1860 [ 827.571427] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 827.576280] ? lock_downgrade+0x880/0x880 [ 827.580445] ip6_make_skb+0x32f/0x561 [ 827.584262] ? ip_reply_glue_bits+0xc0/0xc0 [ 827.588605] ? ip_reply_glue_bits+0xc0/0xc0 [ 827.592942] ? ip6_push_pending_frames+0xf0/0xf0 [ 827.597714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.602491] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 827.607696] ? retint_kernel+0x2d/0x2d [ 827.611604] ? ip6_dst_lookup_flow+0x220/0x220 [ 827.616208] udpv6_sendmsg+0x225b/0x2a00 [ 827.620296] ? ip_reply_glue_bits+0xc0/0xc0 [ 827.624644] ? udp_v6_get_port+0x6b0/0x6b0 [ 827.628909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.633673] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.638452] ? trace_hardirqs_on_caller+0x6a/0x220 [ 827.643453] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.648252] ? retint_kernel+0x2d/0x2d [ 827.652170] ? release_sock+0x156/0x1c0 [ 827.656174] ? __local_bh_enable_ip+0x15a/0x270 [ 827.660869] ? _raw_spin_unlock_bh+0x31/0x40 [ 827.665298] inet_sendmsg+0x141/0x5d0 [ 827.669118] ? inet_sendmsg+0x141/0x5d0 [ 827.673112] ? ipip_gro_receive+0x100/0x100 [ 827.677444] sock_sendmsg+0xd7/0x130 [ 827.681217] ___sys_sendmsg+0x803/0x920 [ 827.685186] ? copy_msghdr_from_user+0x430/0x430 [ 827.689960] ? lock_downgrade+0x880/0x880 [ 827.694105] ? kasan_check_read+0x11/0x20 [ 827.698245] ? __fget+0x367/0x540 [ 827.701694] ? __fget_light+0x1a9/0x230 [ 827.705657] ? __fdget+0x1b/0x20 [ 827.709012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.714564] __sys_sendmsg+0x105/0x1d0 [ 827.718452] ? __ia32_sys_shutdown+0x80/0x80 [ 827.722872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.727626] ? do_syscall_64+0x26/0x620 [ 827.731596] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.736953] ? do_syscall_64+0x26/0x620 [ 827.740922] __x64_sys_sendmsg+0x78/0xb0 [ 827.744993] do_syscall_64+0xfd/0x620 [ 827.748810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.754009] RIP: 0033:0x45af49 [ 827.757221] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.776492] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 827.784189] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 827.791446] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 827.798705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 827.805961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 827.813217] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:05 executing program 2 (fault-call:3 fault-nth:55): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000fabed22ac3"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 10:24:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x91, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x40030000000000) 10:24:05 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xcf76}, 0x0) 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6216, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 827.923369] encrypted_key: insufficient parameters specified [ 827.953040] FAULT_INJECTION: forcing a failure. [ 827.953040] name failslab, interval 1, probability 0, space 0, times 0 10:24:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0xfffffff7, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 827.971908] encrypted_key: insufficient parameters specified [ 827.993071] CPU: 1 PID: 19287 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 828.000916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.010284] Call Trace: [ 828.012893] dump_stack+0x197/0x210 [ 828.016544] should_fail.cold+0xa/0x1b [ 828.020467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.025588] ? lock_downgrade+0x880/0x880 [ 828.029767] __should_failslab+0x121/0x190 [ 828.034024] should_failslab+0x9/0x14 [ 828.037845] kmem_cache_alloc_node_trace+0x274/0x720 [ 828.042958] ? __alloc_skb+0xd5/0x5f0 [ 828.046774] __kmalloc_node_track_caller+0x3d/0x80 [ 828.051726] __kmalloc_reserve.isra.0+0x40/0xf0 [ 828.056421] __alloc_skb+0x10b/0x5f0 [ 828.060155] ? skb_trim+0x190/0x190 [ 828.063802] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 828.068845] ? skb_put+0x183/0x1e0 10:24:05 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000014c0)={0x0, 'veth0_to_hsr\x00', {0x1}, 0x20}) preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001380)=[{{&(0x7f0000000080)=@l2, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/106, 0x6a}], 0x1, &(0x7f00000004c0)=""/137, 0x89}, 0x3}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000380)=""/10, 0xa}, {&(0x7f00000003c0)=""/4, 0x4}, {&(0x7f0000000440)=""/12, 0xc}, {&(0x7f0000000580)=""/194, 0xc2}, {&(0x7f0000000680)=""/175, 0xaf}, {&(0x7f0000000740)=""/141, 0x8d}], 0x6, &(0x7f0000000880)=""/58, 0x3a}, 0xc25}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000008c0)=""/141, 0x8d}, {&(0x7f0000000980)=""/141, 0x8d}, {&(0x7f0000000a40)=""/248, 0xf8}, {&(0x7f0000000b40)=""/124, 0x7c}], 0x4}, 0xd513}, {{&(0x7f0000000c00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000c80)=""/85, 0x55}, {&(0x7f0000000d00)=""/221, 0xdd}, {&(0x7f0000000e00)=""/106, 0x6a}, {&(0x7f0000000e80)=""/59, 0x3b}, {&(0x7f0000000ec0)=""/85, 0x55}, {&(0x7f0000000f40)=""/188, 0xbc}, {&(0x7f0000001000)=""/195, 0xc3}, {&(0x7f0000001100)=""/195, 0xc3}], 0x8, &(0x7f0000001280)=""/193, 0xc1}, 0x3f}], 0x4, 0x745045d8cf5ac8a6, &(0x7f0000001480)={0x77359400}) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x3, 0x3, 0x1, 0x4800, r1}) write$binfmt_misc(r3, &(0x7f00000001c0)={'syz1', "72eb3b1d278569dc9a5a6b4d99b275da89cacbd4f3dc44d2150537681b0b765a07920fd1bb20bc0409d7aad93900b79e6d75222c8da82765037148171e9924df3bee9de1aad97a72bfc78d0f330f0f2ec5a5a09a0b9f700778aab737396e9eb38e2316d8e00daadbf9b50bbf39d13452cae443c5270d9d88fc502a3a85e210820b969a97b14c2a6482f85ed4e6c98133548206f171ec236b5519c591e64ebcfe0dfa16681de25ffcb24b04c27b24e262e23ff0b135c33297fe88eba39f19290448679e0f7fd69f"}, 0xcb) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x662b, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000040)="a83f58e4a6bc7f6faaa9a3f97899a9ddf554bc4490b796e32583164e4ab52936ad09bfc5f3b7cbff5db19d2f93a3c2fd7c2ef4e20d92441eba2354a37eac9b14a60d01f257e8d220e1de703af73de1d6ab56e05b42394f9871d2ac8b9c3f05724d4e5564aba2537de2c8041415812d1721985e29004fa3ffed558c8434c7b95b81eb37b320551b11828aab3278b012a03876ecd9a5c3efa8d6dda7dbe77c8831f98fdf45d26c900139bfdd156fe68ba17e1500e34aca79e494ebfcb40b6a30d09c8786", 0xc3, 0xfffffffffffffffe) [ 828.072414] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 828.075956] encrypted_key: master key parameter is missing [ 828.077455] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.077486] ? ip6_setup_cork+0x1860/0x1860 [ 828.091755] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 828.096616] ? lock_downgrade+0x880/0x880 [ 828.100805] ip6_make_skb+0x32f/0x561 [ 828.104622] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.108967] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.113317] ? ip6_push_pending_frames+0xf0/0xf0 [ 828.118105] ? find_held_lock+0x35/0x130 [ 828.122205] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 828.127060] ? ip6_dst_lookup_flow+0x220/0x220 [ 828.131664] udpv6_sendmsg+0x225b/0x2a00 [ 828.135760] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.140114] ? udp_v6_get_port+0x6b0/0x6b0 [ 828.144374] ? __local_bh_enable_ip+0x15a/0x270 [ 828.149159] ? _raw_spin_unlock_bh+0x31/0x40 [ 828.153591] ? __local_bh_enable_ip+0x15a/0x270 [ 828.158294] ? mark_held_locks+0x100/0x100 [ 828.162553] ? mark_held_locks+0x100/0x100 [ 828.166806] ? _raw_spin_unlock_bh+0x31/0x40 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x678e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 828.171261] ? release_sock+0x156/0x1c0 [ 828.175289] ? __local_bh_enable_ip+0x15a/0x270 [ 828.179980] ? _raw_spin_unlock_bh+0x31/0x40 [ 828.184425] inet_sendmsg+0x141/0x5d0 [ 828.188249] ? inet_sendmsg+0x141/0x5d0 [ 828.192248] ? ipip_gro_receive+0x100/0x100 [ 828.196599] sock_sendmsg+0xd7/0x130 [ 828.200339] ___sys_sendmsg+0x803/0x920 [ 828.204332] ? copy_msghdr_from_user+0x430/0x430 [ 828.209116] ? lock_downgrade+0x880/0x880 [ 828.213295] ? kasan_check_read+0x11/0x20 [ 828.217462] ? __fget+0x367/0x540 [ 828.220946] ? __fget_light+0x1a9/0x230 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6d06, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 828.224945] ? __fdget+0x1b/0x20 [ 828.228335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.233888] __sys_sendmsg+0x105/0x1d0 [ 828.237787] ? __ia32_sys_shutdown+0x80/0x80 [ 828.242243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.247021] ? do_syscall_64+0x26/0x620 [ 828.251015] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.256402] ? do_syscall_64+0x26/0x620 [ 828.260400] __x64_sys_sendmsg+0x78/0xb0 [ 828.264483] do_syscall_64+0xfd/0x620 [ 828.268305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.273511] RIP: 0033:0x45af49 [ 828.276722] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.295666] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 828.303412] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 828.310874] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 828.318159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 828.325446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 828.332732] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:05 executing program 2 (fault-call:3 fault-nth:56): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x9, 0x6, 0x40, 0x4, 0x0, 0x1, 0x400, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x5, @perf_bp={&(0x7f0000000000), 0x14}, 0x800, 0xfff, 0x1ff, 0x6, 0xffffffffffffff7f, 0x95ab, 0x4}, r1, 0xf, r2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6e7d, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xd4ee}, 0x0) 10:24:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf0ff7f00000000) 10:24:05 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000000)="4df200ccf6a68938f8557a64091d527f7b9423bbcedafe9f0d85c6fb473d87e9e3d5f913b6349ee27842a9142ca08954d750265107567a1398775b2dc44f1d07bd2cd4241b6c34a772598ef403ea4c46ac3678eb0f593179a2dac7a1351fd9c412384d5e4b836d7e258410ad3f51209d5be8e242f2348082ce964fad5899f38331", 0x81, 0x800, &(0x7f00000000c0)={0xa, 0x4e24, 0x2, @loopback, 0xac}, 0x1c) 10:24:05 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x727e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:05 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000200)="e5f8d9982b20fe03f446e9c04bf89889ecce5c4a9b2c5963b38a6c47050000000000000061245e9fc473b3537d1f209acf09e16801e2e336d28589b9d2cefed7589a2e2422771aaa589d14fd6c64dfa92521cc809ed10a0b631ceaed006d25670c33e636893e64fac6c97747ef54e2ebfaa102eb5df7920dfdde64e27ca2422667419f7db1253b00606896a28d333eade34cbaea9c2ee3b31cad022f314b36296c88eec2891c624e53a97a807bdfbc7a2a3912faac2f18a5ab9cfecc2a565e4441fcac317356f15fc641f0c15d", 0x38e, 0xfffffffffffffffe) [ 828.487579] encrypted_key: master key parameter is missing [ 828.517501] FAULT_INJECTION: forcing a failure. [ 828.517501] name failslab, interval 1, probability 0, space 0, times 0 [ 828.531135] encrypted_key: master key parameter is missing [ 828.572203] CPU: 1 PID: 19332 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 828.580051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.589418] Call Trace: [ 828.592031] dump_stack+0x197/0x210 [ 828.595688] should_fail.cold+0xa/0x1b [ 828.599604] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 828.600061] [U]  [ 828.604737] ? lock_downgrade+0x880/0x880 [ 828.604766] __should_failslab+0x121/0x190 [ 828.604784] should_failslab+0x9/0x14 10:24:05 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000200)="e5f8d9982b20fe03f446e9c04bf89889ecce5c4a9b2c5963b38a6c47050000000000000061245e9fc473b3537d1f209acf09e16801e2e336d28589b9d2cefed7589a2e2422771aaa589d14fd6c64dfa92521cc809ed10a0b631ceaed006d25670c33e636893e64fac6c97747ef54e2ebfaa102eb5df7920dfdde64e27ca2422667419f7db1253b00606896a28d333eade34cbaea9c2ee3b31cad022f314b36296c88eec2891c624e53a97a807bdfbc7a2a3912faac2f18a5ab9cfecc2a565e4441fcac317356f15fc641f0c15d", 0x38e, 0xfffffffffffffffe) 10:24:05 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000200)="e5f8d9982b20fe03f446e9c04bf89889ecce5c4a9b2c5963b38a6c47050000000000000061245e9fc473b3537d1f209acf09e16801e2e336d28589b9d2cefed7589a2e2422771aaa589d14fd6c64dfa92521cc809ed10a0b631ceaed006d25670c33e636893e64fac6c97747ef54e2ebfaa102eb5df7920dfdde64e27ca2422667419f7db1253b00606896a28d333eade34cbaea9c2ee3b31cad022f314b36296c88eec2891c624e53a97a807bdfbc7a2a3912faac2f18a5ab9cfecc2a565e4441fcac317356f15fc641f0c15d", 0x38e, 0xfffffffffffffffe) [ 828.619304] kmem_cache_alloc_node+0x26c/0x710 [ 828.623910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.629478] __alloc_skb+0xd5/0x5f0 [ 828.633130] ? skb_trim+0x190/0x190 [ 828.636780] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 828.641833] ? skb_put+0x183/0x1e0 [ 828.645445] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 828.649728] [U]  [ 828.650480] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.650508] ? ip6_setup_cork+0x1860/0x1860 [ 828.661193] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 828.666054] ? lock_downgrade+0x880/0x880 10:24:05 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 828.670229] ip6_make_skb+0x32f/0x561 [ 828.674136] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.678481] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.682831] ? ip6_push_pending_frames+0xf0/0xf0 [ 828.687605] ? find_held_lock+0x35/0x130 [ 828.690937] [U]  [ 828.691691] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 828.691711] ? ip6_dst_lookup_flow+0x220/0x220 [ 828.691733] udpv6_sendmsg+0x225b/0x2a00 [ 828.707266] ? ip_reply_glue_bits+0xc0/0xc0 [ 828.711615] ? udp_v6_get_port+0x6b0/0x6b0 [ 828.715869] ? __local_bh_enable_ip+0x15a/0x270 10:24:06 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 828.720553] ? _raw_spin_unlock_bh+0x31/0x40 [ 828.724981] ? __local_bh_enable_ip+0x15a/0x270 [ 828.729675] ? mark_held_locks+0x100/0x100 [ 828.729810] [U]  [ 828.734027] ? mark_held_locks+0x100/0x100 [ 828.734044] ? _raw_spin_unlock_bh+0x31/0x40 [ 828.734078] ? release_sock+0x156/0x1c0 [ 828.748743] ? __local_bh_enable_ip+0x15a/0x270 [ 828.753605] ? _raw_spin_unlock_bh+0x31/0x40 [ 828.758038] inet_sendmsg+0x141/0x5d0 [ 828.761867] ? inet_sendmsg+0x141/0x5d0 [ 828.765874] ? ipip_gro_receive+0x100/0x100 [ 828.770218] sock_sendmsg+0xd7/0x130 [ 828.773959] ___sys_sendmsg+0x803/0x920 [ 828.777956] ? copy_msghdr_from_user+0x430/0x430 [ 828.782737] ? lock_downgrade+0x880/0x880 [ 828.786904] ? kasan_check_read+0x11/0x20 [ 828.791073] ? __fget+0x367/0x540 [ 828.794924] ? __fget_light+0x1a9/0x230 [ 828.798914] ? __fdget+0x1b/0x20 [ 828.802290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.807855] __sys_sendmsg+0x105/0x1d0 [ 828.811774] ? __ia32_sys_shutdown+0x80/0x80 [ 828.816380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.821250] ? do_syscall_64+0x26/0x620 [ 828.825246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.830634] ? do_syscall_64+0x26/0x620 [ 828.834646] __x64_sys_sendmsg+0x78/0xb0 [ 828.838730] do_syscall_64+0xfd/0x620 [ 828.842563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.847760] RIP: 0033:0x45af49 [ 828.851103] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.870022] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 828.877729] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 828.885003] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 828.892277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 828.899540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 828.906901] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:06 executing program 2 (fault-call:3 fault-nth:57): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657720646567044fa674e769253041c12d6a01b91149b2f48b3a3dfaa5e831fad1247e10b3bc7aa1a35e4fc885d60c8d8af695173d4441c26ea40f5c428bad0d0ddb2b034d2d4eba4b101caa684d733a204ab3c4814e55cdf86a313469334ff23fa2340de78e820852838dc2cf5fdffd84751776d386812b"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:06 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:06 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7620, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf0ffffff7f0000) 10:24:06 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xd68d}, 0x0) 10:24:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x100000000000000) 10:24:06 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x76cf, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 829.027196] encrypted_key: insufficient parameters specified [ 829.059919] FAULT_INJECTION: forcing a failure. [ 829.059919] name failslab, interval 1, probability 0, space 0, times 0 10:24:06 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xde30}, 0x0) 10:24:06 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6efe916cde5b65772064656661756c74"], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000001c0)={{0x1, 0x100000, 0xa, 0x51, 0x4, 0x1, 0x5, 0x60, 0x0, 0xd5, 0x8, 0x8}, {0x3000, 0x4, 0x131b9a611816187a, 0x0, 0x33, 0x20, 0xff, 0x81, 0x77, 0x7, 0x1, 0x98}, {0xd000, 0x7000, 0x10, 0xab, 0x3, 0x3e, 0x81, 0x40, 0x1, 0x4, 0x68, 0x71}, {0x100000, 0x5000, 0xb, 0x3, 0x0, 0x20, 0x2, 0xbf, 0x1, 0x2, 0x37, 0x2}, {0x5000, 0xd000, 0xe, 0x0, 0x3, 0x1, 0x0, 0x4, 0x9, 0x0, 0x8d, 0x6}, {0x2, 0x1800, 0x3, 0x81, 0x7f, 0x0, 0x1, 0x0, 0x7, 0x3}, {0x4, 0xf000, 0x10, 0x1f, 0x8, 0x6, 0xf7, 0x7f, 0x8, 0x5, 0x3f}, {0xd000, 0xf000, 0x10, 0x2, 0x20, 0x14, 0x1f, 0x83, 0x61, 0xfd, 0x1, 0x2}, {0x0, 0xd000}, {0x1000, 0x10f000}, 0x20050021, 0x0, 0xd000, 0x4000, 0x4, 0x880, 0xf000, [0x100, 0x9, 0x4, 0xc4]}) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100), 0x2) r2 = creat(&(0x7f0000000040)='./file0\x00', 0xb2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x6) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000300)=0x3ff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 829.120323] CPU: 1 PID: 19368 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 829.128162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.137532] Call Trace: [ 829.140147] dump_stack+0x197/0x210 [ 829.143812] should_fail.cold+0xa/0x1b [ 829.147739] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.152870] ? lock_downgrade+0x880/0x880 [ 829.157057] __should_failslab+0x121/0x190 [ 829.161330] should_failslab+0x9/0x14 [ 829.165151] kmem_cache_alloc_node+0x26c/0x710 10:24:06 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xe682}, 0x0) [ 829.169768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 829.175330] __alloc_skb+0xd5/0x5f0 [ 829.175341] encrypted_key: insufficient parameters specified [ 829.178964] ? skb_trim+0x190/0x190 [ 829.178984] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 829.179000] ? skb_put+0x183/0x1e0 [ 829.179025] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 829.194429] encrypted_key: insufficient parameters specified [ 829.196999] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.197028] ? ip6_setup_cork+0x1860/0x1860 [ 829.216591] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 829.221455] ? lock_downgrade+0x880/0x880 [ 829.225630] ip6_make_skb+0x32f/0x561 [ 829.229447] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.233794] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.238139] ? ip6_push_pending_frames+0xf0/0xf0 [ 829.242936] ? find_held_lock+0x35/0x130 [ 829.248497] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 829.253377] ? ip6_dst_lookup_flow+0x220/0x220 [ 829.257991] udpv6_sendmsg+0x225b/0x2a00 [ 829.262080] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.268601] ? udp_v6_get_port+0x6b0/0x6b0 [ 829.272858] ? __local_bh_enable_ip+0x15a/0x270 [ 829.277553] ? _raw_spin_unlock_bh+0x31/0x40 [ 829.281983] ? __local_bh_enable_ip+0x15a/0x270 [ 829.286678] ? mark_held_locks+0x100/0x100 [ 829.290951] ? mark_held_locks+0x100/0x100 [ 829.295196] ? _raw_spin_unlock_bh+0x31/0x40 [ 829.299741] ? release_sock+0x156/0x1c0 [ 829.303761] ? __local_bh_enable_ip+0x15a/0x270 [ 829.308449] ? _raw_spin_unlock_bh+0x31/0x40 [ 829.312882] inet_sendmsg+0x141/0x5d0 [ 829.316701] ? inet_sendmsg+0x141/0x5d0 [ 829.320703] ? ipip_gro_receive+0x100/0x100 [ 829.325046] sock_sendmsg+0xd7/0x130 [ 829.328781] ___sys_sendmsg+0x803/0x920 [ 829.332788] ? copy_msghdr_from_user+0x430/0x430 [ 829.337572] ? lock_downgrade+0x880/0x880 [ 829.341749] ? kasan_check_read+0x11/0x20 [ 829.345912] ? __fget+0x367/0x540 [ 829.349403] ? __fget_light+0x1a9/0x230 [ 829.353399] ? __fdget+0x1b/0x20 [ 829.356791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 829.362353] __sys_sendmsg+0x105/0x1d0 [ 829.366253] ? __ia32_sys_shutdown+0x80/0x80 [ 829.370687] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.375464] ? do_syscall_64+0x26/0x620 [ 829.379458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.384838] ? do_syscall_64+0x26/0x620 [ 829.388824] __x64_sys_sendmsg+0x78/0xb0 [ 829.392899] do_syscall_64+0xfd/0x620 [ 829.396718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.401930] RIP: 0033:0x45af49 [ 829.405135] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 829.424137] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 829.431870] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 829.439158] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 829.446444] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 829.453736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 829.461022] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:06 executing program 2 (fault-call:3 fault-nth:58): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 3: keyctl$setperm(0x5, 0x0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, 0x0, r0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r1, r2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1, r1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000002c0)="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"/276, 0xffffffffffffff26, 0xfffffffffffffffe) 10:24:06 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xee25}, 0x0) 10:24:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x200000000000000) 10:24:06 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x77f6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff}) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 829.560618] [U]  10:24:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x300000000000000) 10:24:06 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:06 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7805, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:06 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xeed4}, 0x0) 10:24:06 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new0default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 829.667260] FAULT_INJECTION: forcing a failure. [ 829.667260] name failslab, interval 1, probability 0, space 0, times 0 [ 829.684960] [U]  [ 829.732304] CPU: 0 PID: 19406 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 829.740149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.749512] Call Trace: [ 829.752121] dump_stack+0x197/0x210 [ 829.755778] should_fail.cold+0xa/0x1b [ 829.759693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 829.764816] ? lock_downgrade+0x880/0x880 [ 829.769424] __should_failslab+0x121/0x190 [ 829.773696] should_failslab+0x9/0x14 [ 829.777518] kmem_cache_alloc_node_trace+0x274/0x720 10:24:07 executing program 0: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 829.782634] ? retint_kernel+0x2d/0x2d [ 829.786556] __kmalloc_node_track_caller+0x3d/0x80 [ 829.791507] __kmalloc_reserve.isra.0+0x40/0xf0 [ 829.796190] __alloc_skb+0x10b/0x5f0 [ 829.799921] ? skb_trim+0x190/0x190 [ 829.803567] ? __ip6_append_data.isra.0+0x1b66/0x2fc0 [ 829.808805] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 829.813832] ? skb_put+0x183/0x1e0 [ 829.817397] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 829.822437] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.827057] ? ip6_setup_cork+0x1860/0x1860 [ 829.831398] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 829.836271] ip6_make_skb+0x32f/0x561 [ 829.840089] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.843585] [U]  [ 829.844429] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.844451] ? ip6_push_pending_frames+0xf0/0xf0 [ 829.844470] ? find_held_lock+0x35/0x130 [ 829.859653] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 829.864518] ? ip6_dst_lookup_flow+0x220/0x220 [ 829.869125] udpv6_sendmsg+0x225b/0x2a00 [ 829.873212] ? lockdep_hardirqs_on+0x415/0x5d0 [ 829.877812] ? ip_reply_glue_bits+0xc0/0xc0 [ 829.882245] ? udp_v6_get_port+0x6b0/0x6b0 [ 829.886509] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.888204] encrypted_key: insufficient parameters specified [ 829.891292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.891313] ? trace_hardirqs_on_caller+0x6a/0x220 [ 829.891335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.911557] ? retint_kernel+0x2d/0x2d [ 829.915471] ? release_sock+0x156/0x1c0 [ 829.919476] ? __local_bh_enable_ip+0x15a/0x270 [ 829.924158] ? _raw_spin_unlock_bh+0x31/0x40 [ 829.928592] inet_sendmsg+0x141/0x5d0 [ 829.932409] ? inet_sendmsg+0x141/0x5d0 [ 829.936400] ? ipip_gro_receive+0x100/0x100 [ 829.940748] sock_sendmsg+0xd7/0x130 [ 829.944481] ___sys_sendmsg+0x803/0x920 [ 829.948481] ? copy_msghdr_from_user+0x430/0x430 [ 829.953264] ? lock_downgrade+0x880/0x880 [ 829.957431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.962207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 829.966981] ? lockdep_hardirqs_on+0x415/0x5d0 [ 829.971577] ? retint_kernel+0x2d/0x2d [ 829.975477] ? trace_hardirqs_on_caller+0x6a/0x220 [ 829.980450] ? sockfd_lookup_light+0xde/0x180 [ 829.984962] ? sockfd_lookup_light+0x103/0x180 [ 829.989576] __sys_sendmsg+0x105/0x1d0 [ 829.993474] ? __ia32_sys_shutdown+0x80/0x80 [ 829.997908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 830.002686] ? do_syscall_64+0x26/0x620 [ 830.006676] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.012050] ? do_syscall_64+0x26/0x620 [ 830.016032] __x64_sys_sendmsg+0x78/0xb0 [ 830.020102] do_syscall_64+0xfd/0x620 [ 830.023920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.029119] RIP: 0033:0x45af49 [ 830.032410] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.051769] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 830.059499] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 830.066785] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 830.074154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:24:07 executing program 2 (fault-call:3 fault-nth:59): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x78c2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:07 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r0, r1, 0x0) keyctl$clear(0x7, r0) 10:24:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x400000000000000) [ 830.081526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 830.088810] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:07 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xf677}, 0x0) [ 830.136999] encrypted_key: master key parameter is missing [ 830.149214] [U]  [ 830.183905] encrypted_key: master key parameter is missing [ 830.205332] FAULT_INJECTION: forcing a failure. [ 830.205332] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 830.217189] CPU: 1 PID: 19445 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 830.225029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.234655] Call Trace: [ 830.238582] dump_stack+0x197/0x210 [ 830.242238] should_fail.cold+0xa/0x1b [ 830.246152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.251279] ? mark_held_locks+0x100/0x100 [ 830.255535] ? __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 830.260743] ? ip6_make_skb+0x32f/0x561 [ 830.264742] __alloc_pages_nodemask+0x1ee/0x750 [ 830.269442] ? __alloc_pages_slowpath+0x2870/0x2870 [ 830.274478] ? find_held_lock+0x35/0x130 [ 830.278578] cache_grow_begin+0x91/0x8c0 [ 830.282662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.288221] ? check_preemption_disabled+0x48/0x290 [ 830.293264] kmem_cache_alloc_node_trace+0x655/0x720 [ 830.298406] __kmalloc_node_track_caller+0x3d/0x80 [ 830.303355] __kmalloc_reserve.isra.0+0x40/0xf0 [ 830.308049] __alloc_skb+0x10b/0x5f0 [ 830.311787] ? skb_trim+0x190/0x190 [ 830.315424] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 830.320456] ? skb_put+0x183/0x1e0 [ 830.324032] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 830.329079] ? ip_reply_glue_bits+0xc0/0xc0 [ 830.333433] ? ip6_setup_cork+0x1860/0x1860 [ 830.337778] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 830.342647] ? lock_downgrade+0x880/0x880 [ 830.346817] ip6_make_skb+0x32f/0x561 [ 830.350632] ? ip_reply_glue_bits+0xc0/0xc0 [ 830.354978] ? ip_reply_glue_bits+0xc0/0xc0 [ 830.359330] ? ip6_push_pending_frames+0xf0/0xf0 [ 830.364112] ? find_held_lock+0x35/0x130 [ 830.368207] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 830.373075] ? ip6_dst_lookup_flow+0x220/0x220 [ 830.377697] udpv6_sendmsg+0x225b/0x2a00 [ 830.381797] ? ip_reply_glue_bits+0xc0/0xc0 [ 830.386149] ? udp_v6_get_port+0x6b0/0x6b0 [ 830.390409] ? __local_bh_enable_ip+0x15a/0x270 [ 830.395093] ? _raw_spin_unlock_bh+0x31/0x40 [ 830.399521] ? __local_bh_enable_ip+0x15a/0x270 [ 830.404217] ? mark_held_locks+0x100/0x100 [ 830.408464] ? mark_held_locks+0x100/0x100 [ 830.412717] ? _raw_spin_unlock_bh+0x31/0x40 [ 830.417162] ? release_sock+0x156/0x1c0 [ 830.421167] ? __local_bh_enable_ip+0x15a/0x270 [ 830.425855] ? _raw_spin_unlock_bh+0x31/0x40 [ 830.430286] inet_sendmsg+0x141/0x5d0 [ 830.434112] ? inet_sendmsg+0x141/0x5d0 [ 830.438112] ? ipip_gro_receive+0x100/0x100 [ 830.442454] sock_sendmsg+0xd7/0x130 [ 830.446192] ___sys_sendmsg+0x803/0x920 [ 830.450189] ? copy_msghdr_from_user+0x430/0x430 [ 830.454962] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 830.460090] ? lock_downgrade+0x880/0x880 [ 830.464260] ? __fget+0x367/0x540 [ 830.467744] ? __fget_light+0x1a9/0x230 [ 830.471738] ? __fdget+0x1b/0x20 [ 830.475129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.480691] __sys_sendmsg+0x105/0x1d0 [ 830.484594] ? __ia32_sys_shutdown+0x80/0x80 [ 830.489031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 830.493805] ? do_syscall_64+0x26/0x620 [ 830.497791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.503162] ? do_syscall_64+0x26/0x620 [ 830.507155] __x64_sys_sendmsg+0x78/0xb0 [ 830.511241] do_syscall_64+0xfd/0x620 [ 830.515065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.520264] RIP: 0033:0x45af49 [ 830.523470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.542384] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 830.550109] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 830.557391] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 830.564674] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 830.571970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:24:07 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7d6e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7e72, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfe1a}, 0x0) 10:24:07 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfe80}, 0x0) 10:24:07 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x80fe, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfec9}, 0x0) [ 830.579864] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:07 executing program 2 (fault-call:3 fault-nth:60): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x82e6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:07 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:07 executing program 3: inotify_init1(0x800) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='neg d[fault'], 0x1, 0x0) sched_yield() add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:07 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x34000}, 0x0) 10:24:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x500000000000000) [ 830.733408] encrypted_key: master key parameter 'd[fault' is invalid 10:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x600000000000000) 10:24:08 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x8615, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:08 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x100000}, 0x0) 10:24:08 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:08 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2, 0x400000) ioctl$sock_bt_hci(r0, 0xa0066cae, &(0x7f0000000040)="058b64225b06f933c6d1f69a271219a62749b93e7faaf25ef6558fb99a8296b8") keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 830.864037] FAULT_INJECTION: forcing a failure. [ 830.864037] name failslab, interval 1, probability 0, space 0, times 0 [ 830.927856] CPU: 1 PID: 19495 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 830.935781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.945344] Call Trace: [ 830.947998] dump_stack+0x197/0x210 [ 830.951807] should_fail.cold+0xa/0x1b [ 830.955556] encrypted_key: master key parameter is missing [ 830.955719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 830.955740] ? lock_downgrade+0x880/0x880 [ 830.971770] __should_failslab+0x121/0x190 10:24:08 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x26, 0x4) [ 830.976028] should_failslab+0x9/0x14 [ 830.979846] kmem_cache_alloc_node_trace+0x274/0x720 [ 830.984972] ? __alloc_skb+0xd5/0x5f0 [ 830.988808] __kmalloc_node_track_caller+0x3d/0x80 [ 830.993776] __kmalloc_reserve.isra.0+0x40/0xf0 [ 830.995405] encrypted_key: master key parameter is missing [ 830.998471] __alloc_skb+0x10b/0x5f0 [ 830.998491] ? skb_trim+0x190/0x190 [ 830.998509] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 830.998527] ? skb_put+0x183/0x1e0 [ 831.006201] encrypted_key: master key parameter is missing [ 831.007861] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 831.007889] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.007915] ? ip6_setup_cork+0x1860/0x1860 [ 831.039420] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 831.044297] ? lock_downgrade+0x880/0x880 [ 831.048475] ip6_make_skb+0x32f/0x561 [ 831.052296] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.056640] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.060977] ? ip6_push_pending_frames+0xf0/0xf0 [ 831.065742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.070523] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 831.075386] ? retint_kernel+0x2d/0x2d [ 831.079305] ? ip6_dst_lookup_flow+0x220/0x220 [ 831.083920] udpv6_sendmsg+0x225b/0x2a00 [ 831.088010] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 831.092620] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.096972] ? udp_v6_get_port+0x6b0/0x6b0 [ 831.101378] ? __local_bh_enable_ip+0x15a/0x270 [ 831.106067] ? _raw_spin_unlock_bh+0x31/0x40 [ 831.110529] ? __local_bh_enable_ip+0x15a/0x270 [ 831.115233] ? mark_held_locks+0x100/0x100 [ 831.119495] ? mark_held_locks+0xb1/0x100 [ 831.123679] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.128472] ? release_sock+0x156/0x1c0 [ 831.132500] ? __local_bh_enable_ip+0x15a/0x270 [ 831.137198] ? _raw_spin_unlock_bh+0x31/0x40 [ 831.141643] inet_sendmsg+0x141/0x5d0 [ 831.145464] ? inet_sendmsg+0x141/0x5d0 [ 831.149471] ? ipip_gro_receive+0x100/0x100 [ 831.153843] sock_sendmsg+0xd7/0x130 [ 831.157679] ___sys_sendmsg+0x803/0x920 [ 831.161668] ? copy_msghdr_from_user+0x430/0x430 [ 831.166481] ? lock_downgrade+0x880/0x880 [ 831.170623] ? kasan_check_read+0x11/0x20 [ 831.174776] ? __fget+0x367/0x540 [ 831.178243] ? __fget_light+0x1a9/0x230 [ 831.182206] ? __fdget+0x1b/0x20 [ 831.185563] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.191097] __sys_sendmsg+0x105/0x1d0 [ 831.194975] ? __ia32_sys_shutdown+0x80/0x80 [ 831.199380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.204907] ? do_syscall_64+0x26/0x620 [ 831.208871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.214222] ? do_syscall_64+0x26/0x620 [ 831.218189] __x64_sys_sendmsg+0x78/0xb0 [ 831.222254] do_syscall_64+0xfd/0x620 [ 831.226059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.231259] RIP: 0033:0x45af49 [ 831.234445] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.253367] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 831.261261] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 831.268582] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:24:08 executing program 2 (fault-call:3 fault-nth:61): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:08 executing program 3: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x66d000000000000) 10:24:08 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:08 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x86c4, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:08 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x400300}, 0x0) [ 831.275892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 831.283181] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 831.290455] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 831.363564] encrypted_key: insufficient parameters specified [ 831.399317] encrypted_key: insufficient parameters specified [ 831.402163] FAULT_INJECTION: forcing a failure. 10:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x700000000000000) 10:24:08 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 831.402163] name failslab, interval 1, probability 0, space 0, times 0 10:24:08 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x52802, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) keyctl$chown(0x4, r0, r2, 0x0) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x202002) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r3, r4, 0x0) keyctl$instantiate(0xc, r3, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9e0000, 0x6, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x980929, 0x1c, [], @string=&(0x7f0000000040)}}) ioctl$IMHOLD_L1(r5, 0x80044948, &(0x7f00000001c0)=0xff) 10:24:08 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x885e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:08 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xf0ff7f}, 0x0) [ 831.464774] CPU: 1 PID: 19526 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 831.472628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.482001] Call Trace: [ 831.484614] dump_stack+0x197/0x210 [ 831.488268] should_fail.cold+0xa/0x1b [ 831.492178] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 831.497310] ? lock_downgrade+0x880/0x880 [ 831.501497] __should_failslab+0x121/0x190 [ 831.505757] should_failslab+0x9/0x14 [ 831.509582] kmem_cache_alloc_node+0x26c/0x710 [ 831.514206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.519001] __alloc_skb+0xd5/0x5f0 [ 831.522647] ? skb_trim+0x190/0x190 [ 831.526296] ? __ip6_append_data.isra.0+0x1902/0x2fc0 [ 831.531512] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 831.536572] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.540927] ? ip6_setup_cork+0x1860/0x1860 [ 831.545276] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 831.550137] ? lock_downgrade+0x880/0x880 [ 831.554310] ip6_make_skb+0x32f/0x561 [ 831.558134] ? ip_reply_glue_bits+0xc0/0xc0 10:24:08 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x8dd6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 831.562661] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.567001] ? ip6_push_pending_frames+0xf0/0xf0 [ 831.571792] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.576144] udpv6_sendmsg+0x225b/0x2a00 [ 831.580225] ? firmware_map_remove+0x1a7/0x1a7 [ 831.584826] ? ip_reply_glue_bits+0xc0/0xc0 [ 831.589174] ? udp_v6_get_port+0x6b0/0x6b0 [ 831.593430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.598210] ? retint_kernel+0x2d/0x2d [ 831.602117] ? trace_hardirqs_on_caller+0x6a/0x220 [ 831.607064] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.611848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.616623] ? lockdep_hardirqs_on+0x415/0x5d0 [ 831.621231] ? retint_kernel+0x2d/0x2d [ 831.625132] ? trace_hardirqs_on_caller+0x6a/0x220 [ 831.630095] ? __local_bh_enable_ip+0x18e/0x270 [ 831.634815] ? _raw_spin_unlock_bh+0x31/0x40 [ 831.639253] inet_sendmsg+0x141/0x5d0 [ 831.643083] ? inet_sendmsg+0x141/0x5d0 [ 831.647082] ? ipip_gro_receive+0x100/0x100 [ 831.651431] sock_sendmsg+0xd7/0x130 [ 831.655177] ___sys_sendmsg+0x803/0x920 [ 831.659180] ? copy_msghdr_from_user+0x430/0x430 [ 831.663965] ? lock_downgrade+0x880/0x880 [ 831.668137] ? kasan_check_read+0x11/0x20 [ 831.672306] ? __fget+0x367/0x540 [ 831.675796] ? __fget_light+0x1a9/0x230 [ 831.679795] ? __fdget+0x1b/0x20 [ 831.683179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.686211] [U]  [ 831.688754] __sys_sendmsg+0x105/0x1d0 [ 831.688773] ? __ia32_sys_shutdown+0x80/0x80 [ 831.688803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 831.688818] ? do_syscall_64+0x26/0x620 [ 831.688837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.713354] ? do_syscall_64+0x26/0x620 [ 831.713798] encrypted_key: master key parameter is missing [ 831.717523] __x64_sys_sendmsg+0x78/0xb0 [ 831.717545] do_syscall_64+0xfd/0x620 [ 831.717566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.731109] encrypted_key: master key parameter is missing [ 831.736217] RIP: 0033:0x45af49 [ 831.736234] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.736243] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 831.736256] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 831.736269] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 831.786309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 831.793597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 831.800883] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:09 executing program 2 (fault-call:3 fault-nth:62): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1000000}, 0x0) 10:24:09 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x8e67, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:09 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 10:24:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x800000000000000) [ 831.939985] [U]  10:24:09 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:09 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x934e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x900000000000000) 10:24:09 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2000000}, 0x0) 10:24:09 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 831.989924] FAULT_INJECTION: forcing a failure. [ 831.989924] name failslab, interval 1, probability 0, space 0, times 0 [ 832.077913] CPU: 0 PID: 19574 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 832.085769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.095137] Call Trace: [ 832.097753] dump_stack+0x197/0x210 [ 832.101409] should_fail.cold+0xa/0x1b [ 832.105320] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.110449] ? lock_downgrade+0x880/0x880 [ 832.114639] __should_failslab+0x121/0x190 [ 832.118900] should_failslab+0x9/0x14 [ 832.122725] kmem_cache_alloc_node_trace+0x274/0x720 [ 832.127847] ? __alloc_skb+0xd5/0x5f0 [ 832.131685] __kmalloc_node_track_caller+0x3d/0x80 [ 832.136899] __kmalloc_reserve.isra.0+0x40/0xf0 [ 832.141589] __alloc_skb+0x10b/0x5f0 [ 832.145322] ? skb_trim+0x190/0x190 [ 832.148966] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.153986] ? skb_put+0x183/0x1e0 [ 832.157537] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 832.162577] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.166928] ? ip6_setup_cork+0x1860/0x1860 [ 832.171272] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 832.176139] ? lock_downgrade+0x880/0x880 [ 832.180316] ip6_make_skb+0x32f/0x561 [ 832.184138] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.188487] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.192831] ? ip6_push_pending_frames+0xf0/0xf0 [ 832.197599] ? find_held_lock+0x35/0x130 [ 832.201693] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 832.206662] ? ip6_dst_lookup_flow+0x220/0x220 [ 832.211289] udpv6_sendmsg+0x225b/0x2a00 [ 832.215384] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.219731] ? udp_v6_get_port+0x6b0/0x6b0 [ 832.223987] ? __local_bh_enable_ip+0x15a/0x270 10:24:09 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x960a, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 832.229767] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.234193] ? __local_bh_enable_ip+0x15a/0x270 [ 832.238893] ? mark_held_locks+0x100/0x100 [ 832.243148] ? mark_held_locks+0x100/0x100 [ 832.247401] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.248990] [U]  [ 832.251871] ? release_sock+0x156/0x1c0 [ 832.251906] ? __local_bh_enable_ip+0x15a/0x270 [ 832.262596] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.267938] inet_sendmsg+0x141/0x5d0 [ 832.271763] ? inet_sendmsg+0x141/0x5d0 [ 832.275754] ? ipip_gro_receive+0x100/0x100 [ 832.280100] sock_sendmsg+0xd7/0x130 [ 832.283837] ___sys_sendmsg+0x803/0x920 [ 832.287835] ? copy_msghdr_from_user+0x430/0x430 [ 832.292614] ? lock_downgrade+0x880/0x880 [ 832.296786] ? kasan_check_read+0x11/0x20 [ 832.300953] ? __fget+0x367/0x540 [ 832.304438] ? __fget_light+0x1a9/0x230 [ 832.308440] ? __fdget+0x1b/0x20 [ 832.311832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.317391] __sys_sendmsg+0x105/0x1d0 [ 832.321299] ? __ia32_sys_shutdown+0x80/0x80 [ 832.325739] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 832.330511] ? do_syscall_64+0x26/0x620 [ 832.334504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.339891] ? do_syscall_64+0x26/0x620 [ 832.343890] __x64_sys_sendmsg+0x78/0xb0 [ 832.347972] do_syscall_64+0xfd/0x620 [ 832.351792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.356998] RIP: 0033:0x45af49 [ 832.360200] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.379139] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 832.386870] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 832.394151] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 832.401436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 832.408729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 832.416012] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:09 executing program 2 (fault-call:3 fault-nth:63): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 0: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa00000000000000) 10:24:09 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 10:24:09 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x96b9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3000000}, 0x0) [ 832.529239] [U]  [ 832.557101] FAULT_INJECTION: forcing a failure. [ 832.557101] name failslab, interval 1, probability 0, space 0, times 0 [ 832.578591] CPU: 0 PID: 19613 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 832.586429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.595794] Call Trace: [ 832.598405] dump_stack+0x197/0x210 [ 832.602063] should_fail.cold+0xa/0x1b [ 832.605980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 832.611109] ? lock_downgrade+0x880/0x880 [ 832.615283] __should_failslab+0x121/0x190 [ 832.619532] should_failslab+0x9/0x14 [ 832.623356] kmem_cache_alloc_node+0x26c/0x710 [ 832.628046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.633814] __alloc_skb+0xd5/0x5f0 [ 832.637466] ? skb_trim+0x190/0x190 [ 832.641116] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.646154] ? skb_put+0x183/0x1e0 [ 832.649722] __ip6_append_data.isra.0+0x23c1/0x2fc0 10:24:09 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4000000}, 0x0) 10:24:09 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:09 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x98c6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:09 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 832.654769] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.659297] ? ip6_setup_cork+0x1860/0x1860 [ 832.663663] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 832.668617] ? lock_downgrade+0x880/0x880 [ 832.672796] ip6_make_skb+0x32f/0x561 [ 832.676638] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.680984] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.685326] ? ip6_push_pending_frames+0xf0/0xf0 [ 832.690100] ? find_held_lock+0x35/0x130 [ 832.694186] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 832.699051] ? ip6_dst_lookup_flow+0x220/0x220 [ 832.703661] udpv6_sendmsg+0x225b/0x2a00 10:24:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe00000000000000) [ 832.707749] ? ip_reply_glue_bits+0xc0/0xc0 [ 832.712121] ? udp_v6_get_port+0x6b0/0x6b0 [ 832.716442] ? __local_bh_enable_ip+0x15a/0x270 [ 832.721133] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.725557] ? __local_bh_enable_ip+0x15a/0x270 [ 832.730251] ? mark_held_locks+0x100/0x100 [ 832.734513] ? mark_held_locks+0x100/0x100 [ 832.738769] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.743213] ? release_sock+0x156/0x1c0 [ 832.747231] ? __local_bh_enable_ip+0x15a/0x270 [ 832.751925] ? _raw_spin_unlock_bh+0x31/0x40 [ 832.756366] inet_sendmsg+0x141/0x5d0 [ 832.760185] ? inet_sendmsg+0x141/0x5d0 [ 832.764308] ? ipip_gro_receive+0x100/0x100 [ 832.768654] sock_sendmsg+0xd7/0x130 [ 832.772386] ___sys_sendmsg+0x803/0x920 [ 832.776381] ? copy_msghdr_from_user+0x430/0x430 [ 832.781163] ? lock_downgrade+0x880/0x880 [ 832.785336] ? kasan_check_read+0x11/0x20 [ 832.789507] ? __fget+0x367/0x540 [ 832.793513] ? __fget_light+0x1a9/0x230 [ 832.797507] ? __fdget+0x1b/0x20 [ 832.800911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.806472] __sys_sendmsg+0x105/0x1d0 [ 832.810469] ? __ia32_sys_shutdown+0x80/0x80 [ 832.814943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 832.819720] ? do_syscall_64+0x26/0x620 [ 832.823730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.829111] ? do_syscall_64+0x26/0x620 [ 832.833115] __x64_sys_sendmsg+0x78/0xb0 [ 832.837493] do_syscall_64+0xfd/0x620 [ 832.841315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.846607] RIP: 0033:0x45af49 10:24:10 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5000000}, 0x0) [ 832.849816] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.868731] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 832.876462] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 832.883764] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 832.891076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 832.898364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 832.905656] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:10 executing program 2 (fault-call:3 fault-nth:64): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:10 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:10 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 10:24:10 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x9e3e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe10000000000000) 10:24:10 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6000000}, 0x0) 10:24:10 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff, 0x0, 0xffffffffffffffff}) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:10 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x66d0000}, 0x0) 10:24:10 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 10:24:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xebf000000000000) 10:24:10 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x9e5c, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 833.193606] FAULT_INJECTION: forcing a failure. [ 833.193606] name failslab, interval 1, probability 0, space 0, times 0 [ 833.250813] CPU: 0 PID: 19655 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 833.258666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.268037] Call Trace: [ 833.270643] dump_stack+0x197/0x210 [ 833.274328] should_fail.cold+0xa/0x1b [ 833.278265] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.283479] ? lock_downgrade+0x880/0x880 [ 833.287660] __should_failslab+0x121/0x190 [ 833.291916] should_failslab+0x9/0x14 [ 833.295744] kmem_cache_alloc_node_trace+0x274/0x720 [ 833.300887] ? __alloc_skb+0xd5/0x5f0 [ 833.304719] __kmalloc_node_track_caller+0x3d/0x80 [ 833.309669] __kmalloc_reserve.isra.0+0x40/0xf0 [ 833.314377] __alloc_skb+0x10b/0x5f0 [ 833.318124] ? skb_trim+0x190/0x190 [ 833.321776] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 833.326809] ? skb_put+0x183/0x1e0 [ 833.330388] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 833.335432] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.339792] ? ip6_setup_cork+0x1860/0x1860 [ 833.344133] ? ip6_autoflowlabel.part.0+0x70/0x70 10:24:10 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7000000}, 0x0) [ 833.348989] ? lock_downgrade+0x880/0x880 [ 833.353164] ip6_make_skb+0x32f/0x561 [ 833.356978] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.361321] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.365766] ? ip6_push_pending_frames+0xf0/0xf0 [ 833.370543] ? find_held_lock+0x35/0x130 [ 833.374628] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 833.379501] ? ip6_dst_lookup_flow+0x220/0x220 [ 833.384110] udpv6_sendmsg+0x225b/0x2a00 [ 833.388198] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.392543] ? udp_v6_get_port+0x6b0/0x6b0 [ 833.396809] ? __local_bh_enable_ip+0x15a/0x270 [ 833.401494] ? _raw_spin_unlock_bh+0x31/0x40 [ 833.405920] ? __local_bh_enable_ip+0x15a/0x270 [ 833.410628] ? mark_held_locks+0x100/0x100 [ 833.414884] ? mark_held_locks+0x100/0x100 [ 833.419135] ? _raw_spin_unlock_bh+0x31/0x40 [ 833.423585] ? release_sock+0x156/0x1c0 [ 833.427595] ? __local_bh_enable_ip+0x15a/0x270 [ 833.432279] ? _raw_spin_unlock_bh+0x31/0x40 [ 833.436719] inet_sendmsg+0x141/0x5d0 [ 833.440545] ? inet_sendmsg+0x141/0x5d0 [ 833.444538] ? ipip_gro_receive+0x100/0x100 [ 833.448883] sock_sendmsg+0xd7/0x130 [ 833.452647] ___sys_sendmsg+0x803/0x920 [ 833.456644] ? copy_msghdr_from_user+0x430/0x430 [ 833.461429] ? lock_downgrade+0x880/0x880 [ 833.465603] ? kasan_check_read+0x11/0x20 [ 833.469853] ? __fget+0x367/0x540 [ 833.473336] ? __fget_light+0x1a9/0x230 [ 833.477324] ? __fdget+0x1b/0x20 [ 833.480722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 833.486311] __sys_sendmsg+0x105/0x1d0 [ 833.490233] ? __ia32_sys_shutdown+0x80/0x80 [ 833.494676] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 833.499458] ? do_syscall_64+0x26/0x620 [ 833.503556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.508941] ? do_syscall_64+0x26/0x620 [ 833.512939] __x64_sys_sendmsg+0x78/0xb0 [ 833.517033] do_syscall_64+0xfd/0x620 [ 833.520879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.526084] RIP: 0033:0x45af49 [ 833.529292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.550400] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 833.558131] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 833.565429] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 833.572828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 833.580119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 833.587405] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:10 executing program 2 (fault-call:3 fault-nth:65): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1000000000000000) 10:24:10 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8000000}, 0x0) 10:24:10 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa3b6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x806, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r5, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1, 0x4c) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60822560c6f34d8c}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}}, 0x0) connect$inet6(r4, &(0x7f00000002c0), 0x1c) ppoll(&(0x7f0000000040)=[{r4, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc08c5336, &(0x7f0000000100)={{}, 'port0\x00'}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x280, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000500)={{0x1, 0x0, 0xffffffff, 0xf4, '\x00', 0x8001}, 0x4, 0x30, 0x7f, r8, 0x4, 0x4, 'syz1\x00', &(0x7f0000000240)=['net/igmp\x00', 'nl80211\x00', '\x00', 'nl80211\x00'], 0x1a, [], [0x2, 0xfff, 0x6, 0xed]}) setsockopt$inet6_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000040)="2aa083402c8144f82e1587602a30f27193", 0x11) r9 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000003d40)=[{{0x0, 0x8d761e3f, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 10:24:10 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x3, 0x2, 0x4, 0x6010, 0x5, {0x77359400}, {0x6, 0x8, 0x1, 0x2, 0xff, 0x9, "00bd3e60"}, 0x6, 0x4, @planes=&(0x7f0000000040)={0x6, 0x4da3, @mem_offset=0x100, 0x80000000}, 0xff}) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 833.694886] [U]  10:24:11 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1f0e49d8c0c992662ba640c6476c4c4771000000e373000074"], 0x1, 0x0) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:11 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x9000000}, 0x0) [ 833.718353] FAULT_INJECTION: forcing a failure. [ 833.718353] name failslab, interval 1, probability 0, space 0, times 0 10:24:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1100000000000000) [ 833.829506] CPU: 1 PID: 19692 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 833.837362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.837848] [U]  [ 833.846720] Call Trace: [ 833.846748] dump_stack+0x197/0x210 [ 833.846772] should_fail.cold+0xa/0x1b [ 833.858929] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 833.864056] ? lock_downgrade+0x880/0x880 [ 833.868231] __should_failslab+0x121/0x190 [ 833.872497] should_failslab+0x9/0x14 [ 833.876322] kmem_cache_alloc_node_trace+0x274/0x720 [ 833.881452] ? __alloc_skb+0xd5/0x5f0 [ 833.885275] __kmalloc_node_track_caller+0x3d/0x80 [ 833.890226] __kmalloc_reserve.isra.0+0x40/0xf0 [ 833.894919] __alloc_skb+0x10b/0x5f0 [ 833.898664] ? skb_trim+0x190/0x190 [ 833.902310] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 833.907340] ? skb_put+0x183/0x1e0 [ 833.910898] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 833.915956] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.920323] ? ip6_setup_cork+0x1860/0x1860 [ 833.924666] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 833.929615] ? lock_downgrade+0x880/0x880 [ 833.932325] [U]  [ 833.933793] ip6_make_skb+0x32f/0x561 [ 833.933808] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.933828] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.948330] ? ip6_push_pending_frames+0xf0/0xf0 [ 833.953124] ? find_held_lock+0x35/0x130 [ 833.957207] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 833.962071] ? ip6_dst_lookup_flow+0x220/0x220 [ 833.966676] udpv6_sendmsg+0x225b/0x2a00 [ 833.970758] ? ip_reply_glue_bits+0xc0/0xc0 [ 833.975104] ? udp_v6_get_port+0x6b0/0x6b0 [ 833.979360] ? __local_bh_enable_ip+0x15a/0x270 [ 833.984046] ? _raw_spin_unlock_bh+0x31/0x40 [ 833.988471] ? __local_bh_enable_ip+0x15a/0x270 [ 833.993256] ? mark_held_locks+0x100/0x100 [ 833.997515] ? mark_held_locks+0x100/0x100 [ 834.001861] ? _raw_spin_unlock_bh+0x31/0x40 [ 834.006300] ? release_sock+0x156/0x1c0 [ 834.010305] ? __local_bh_enable_ip+0x15a/0x270 [ 834.014994] ? _raw_spin_unlock_bh+0x31/0x40 [ 834.017882] [U]  [ 834.019420] inet_sendmsg+0x141/0x5d0 [ 834.019435] ? inet_sendmsg+0x141/0x5d0 [ 834.019452] ? ipip_gro_receive+0x100/0x100 [ 834.033576] sock_sendmsg+0xd7/0x130 [ 834.037311] ___sys_sendmsg+0x803/0x920 [ 834.041320] ? copy_msghdr_from_user+0x430/0x430 [ 834.046101] ? lock_downgrade+0x880/0x880 [ 834.050264] ? kasan_check_read+0x11/0x20 [ 834.054432] ? __fget+0x367/0x540 [ 834.057913] ? __fget_light+0x1a9/0x230 [ 834.061910] ? __fdget+0x1b/0x20 [ 834.065290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 834.070847] __sys_sendmsg+0x105/0x1d0 [ 834.074756] ? __ia32_sys_shutdown+0x80/0x80 [ 834.079196] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.083963] ? do_syscall_64+0x26/0x620 [ 834.087949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.093325] ? do_syscall_64+0x26/0x620 [ 834.097324] __x64_sys_sendmsg+0x78/0xb0 [ 834.101403] do_syscall_64+0xfd/0x620 [ 834.105234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.110435] RIP: 0033:0x45af49 10:24:11 executing program 3: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1662000000000000) 10:24:11 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 834.113640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 834.132555] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 834.140298] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 834.147701] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 834.154990] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 834.162274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 834.169558] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:11 executing program 2 (fault-call:3 fault-nth:66): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:11 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1e05000000000000) 10:24:11 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa000000}, 0x0) [ 834.486488] FAULT_INJECTION: forcing a failure. [ 834.486488] name failslab, interval 1, probability 0, space 0, times 0 10:24:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x806, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r5, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1, 0x4c) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60822560c6f34d8c}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}}, 0x0) connect$inet6(r4, &(0x7f00000002c0), 0x1c) ppoll(&(0x7f0000000040)=[{r4, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc08c5336, &(0x7f0000000100)={{}, 'port0\x00'}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x280, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000500)={{0x1, 0x0, 0xffffffff, 0xf4, '\x00', 0x8001}, 0x4, 0x30, 0x7f, r8, 0x4, 0x4, 'syz1\x00', &(0x7f0000000240)=['net/igmp\x00', 'nl80211\x00', '\x00', 'nl80211\x00'], 0x1a, [], [0x2, 0xfff, 0x6, 0xed]}) setsockopt$inet6_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000040)="2aa083402c8144f82e1587602a30f27193", 0x11) r9 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000003d40)=[{{0x0, 0x8d761e3f, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 10:24:11 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa6ae, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:11 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x1eb4000000000000) 10:24:11 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xe100000}, 0x0) [ 834.563997] CPU: 0 PID: 19730 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 834.571968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.581336] Call Trace: [ 834.583953] dump_stack+0x197/0x210 [ 834.587638] should_fail.cold+0xa/0x1b [ 834.591558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 834.596687] ? lock_downgrade+0x880/0x880 [ 834.600886] __should_failslab+0x121/0x190 [ 834.605139] should_failslab+0x9/0x14 [ 834.608955] kmem_cache_alloc_node_trace+0x274/0x720 [ 834.614079] ? __alloc_skb+0xd5/0x5f0 [ 834.617908] __kmalloc_node_track_caller+0x3d/0x80 [ 834.622865] __kmalloc_reserve.isra.0+0x40/0xf0 [ 834.627563] __alloc_skb+0x10b/0x5f0 [ 834.631302] ? skb_trim+0x190/0x190 [ 834.634966] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.640017] ? skb_put+0x183/0x1e0 [ 834.643590] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 834.648671] ? ip_reply_glue_bits+0xc0/0xc0 [ 834.653031] ? ip6_setup_cork+0x1860/0x1860 [ 834.657382] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 834.662275] ip6_make_skb+0x32f/0x561 [ 834.666108] ? ip_reply_glue_bits+0xc0/0xc0 [ 834.670448] ? ip_reply_glue_bits+0xc0/0xc0 [ 834.674805] ? ip6_push_pending_frames+0xf0/0xf0 [ 834.679681] ? ip6_sk_dst_lookup_flow+0xca/0xad0 [ 834.684456] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 834.689489] ? ip6_dst_lookup_flow+0x220/0x220 [ 834.694099] udpv6_sendmsg+0x225b/0x2a00 [ 834.698180] ? retint_kernel+0x2d/0x2d [ 834.702079] ? ip_reply_glue_bits+0xc0/0xc0 [ 834.706422] ? udp_v6_get_port+0x6b0/0x6b0 [ 834.710680] ? __local_bh_enable_ip+0x15a/0x270 [ 834.715349] ? _raw_spin_unlock_bh+0x31/0x40 [ 834.719770] ? __local_bh_enable_ip+0x15a/0x270 [ 834.724449] ? mark_held_locks+0xb1/0x100 [ 834.728612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.733372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.738150] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 834.742758] ? release_sock+0x156/0x1c0 [ 834.746757] ? __local_bh_enable_ip+0x15a/0x270 [ 834.751459] ? _raw_spin_unlock_bh+0x31/0x40 [ 834.755885] inet_sendmsg+0x141/0x5d0 [ 834.759682] ? inet_sendmsg+0x141/0x5d0 [ 834.763680] ? ipip_gro_receive+0x100/0x100 [ 834.768012] sock_sendmsg+0xd7/0x130 [ 834.772078] ___sys_sendmsg+0x803/0x920 [ 834.776072] ? copy_msghdr_from_user+0x430/0x430 [ 834.780848] ? lock_downgrade+0x880/0x880 [ 834.785011] ? kasan_check_read+0x11/0x20 [ 834.789161] ? __fget+0x367/0x540 [ 834.792643] ? __fget_light+0x1a9/0x230 [ 834.796641] ? __fdget+0x1b/0x20 [ 834.800015] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 834.805554] __sys_sendmsg+0x105/0x1d0 [ 834.809451] ? __ia32_sys_shutdown+0x80/0x80 [ 834.813897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 834.818669] ? do_syscall_64+0x26/0x620 [ 834.822651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.828033] ? do_syscall_64+0x26/0x620 [ 834.832026] __x64_sys_sendmsg+0x78/0xb0 [ 834.836116] do_syscall_64+0xfd/0x620 [ 834.839918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.845111] RIP: 0033:0x45af49 10:24:12 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xebf0000}, 0x0) [ 834.848300] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 834.867203] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 834.874917] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 834.882178] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 834.889434] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 834.896691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 834.903950] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2000000000000000) 10:24:12 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa805, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:12 executing program 2 (fault-call:3 fault-nth:67): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:12 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:12 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x10000000}, 0x0) 10:24:12 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa92e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r1, 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x806, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r5, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1, 0x4c) sendmsg$IPVS_CMD_NEW_DEST(r5, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60822560c6f34d8c}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}}, 0x0) connect$inet6(r4, &(0x7f00000002c0), 0x1c) ppoll(&(0x7f0000000040)=[{r4, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc08c5336, &(0x7f0000000100)={{}, 'port0\x00'}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x280, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000500)={{0x1, 0x0, 0xffffffff, 0xf4, '\x00', 0x8001}, 0x4, 0x30, 0x7f, r8, 0x4, 0x4, 'syz1\x00', &(0x7f0000000240)=['net/igmp\x00', 'nl80211\x00', '\x00', 'nl80211\x00'], 0x1a, [], [0x2, 0xfff, 0x6, 0xed]}) setsockopt$inet6_dccp_buf(r4, 0x21, 0x2, &(0x7f0000000040)="2aa083402c8144f82e1587602a30f27193", 0x11) r9 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000003d40)=[{{0x0, 0x8d761e3f, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 10:24:12 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:12 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x11000000}, 0x0) 10:24:12 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xae51, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2657000000000000) [ 835.361649] [U]  [ 835.380631] FAULT_INJECTION: forcing a failure. [ 835.380631] name failslab, interval 1, probability 0, space 0, times 0 10:24:12 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x16620000}, 0x0) 10:24:12 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 835.495065] CPU: 1 PID: 19784 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 835.502911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.512283] Call Trace: [ 835.514898] dump_stack+0x197/0x210 [ 835.518547] should_fail.cold+0xa/0x1b [ 835.522456] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 835.527580] ? lock_downgrade+0x880/0x880 [ 835.531754] __should_failslab+0x121/0x190 [ 835.536007] should_failslab+0x9/0x14 [ 835.539823] kmem_cache_alloc_node+0x26c/0x710 [ 835.544509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 835.550068] __alloc_skb+0xd5/0x5f0 [ 835.553715] ? skb_trim+0x190/0x190 [ 835.557366] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 835.562399] ? skb_put+0x183/0x1e0 [ 835.565959] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 835.570999] ? ip_reply_glue_bits+0xc0/0xc0 [ 835.575351] ? ip6_setup_cork+0x1860/0x1860 [ 835.579702] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 835.584565] ? lock_downgrade+0x880/0x880 [ 835.588750] ip6_make_skb+0x32f/0x561 [ 835.592826] ? ip_reply_glue_bits+0xc0/0xc0 [ 835.597181] ? ip_reply_glue_bits+0xc0/0xc0 [ 835.601526] ? ip6_push_pending_frames+0xf0/0xf0 [ 835.606319] ? find_held_lock+0x35/0x130 [ 835.610398] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 835.615254] ? ip6_dst_lookup_flow+0x220/0x220 [ 835.619853] udpv6_sendmsg+0x225b/0x2a00 [ 835.623937] ? ip_reply_glue_bits+0xc0/0xc0 [ 835.628300] ? udp_v6_get_port+0x6b0/0x6b0 [ 835.632559] ? __local_bh_enable_ip+0x15a/0x270 [ 835.637359] ? _raw_spin_unlock_bh+0x31/0x40 [ 835.641789] ? __local_bh_enable_ip+0x15a/0x270 [ 835.646485] ? mark_held_locks+0x100/0x100 [ 835.650744] ? mark_held_locks+0x100/0x100 [ 835.654996] ? _raw_spin_unlock_bh+0x31/0x40 [ 835.659432] ? release_sock+0x156/0x1c0 [ 835.663441] ? __local_bh_enable_ip+0x15a/0x270 [ 835.668127] ? _raw_spin_unlock_bh+0x31/0x40 [ 835.672561] inet_sendmsg+0x141/0x5d0 [ 835.676383] ? inet_sendmsg+0x141/0x5d0 [ 835.680374] ? ipip_gro_receive+0x100/0x100 [ 835.684717] sock_sendmsg+0xd7/0x130 [ 835.688461] ___sys_sendmsg+0x803/0x920 [ 835.692546] ? copy_msghdr_from_user+0x430/0x430 [ 835.697327] ? lock_downgrade+0x880/0x880 [ 835.701495] ? kasan_check_read+0x11/0x20 [ 835.705761] ? __fget+0x367/0x540 [ 835.709249] ? __fget_light+0x1a9/0x230 [ 835.713247] ? __fdget+0x1b/0x20 [ 835.716634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 835.722186] __sys_sendmsg+0x105/0x1d0 [ 835.726090] ? __ia32_sys_shutdown+0x80/0x80 [ 835.730525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 835.735295] ? do_syscall_64+0x26/0x620 [ 835.739279] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:24:12 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xaea6, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 835.744655] ? do_syscall_64+0x26/0x620 [ 835.748644] __x64_sys_sendmsg+0x78/0xb0 [ 835.752726] do_syscall_64+0xfd/0x620 [ 835.756550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.761757] RIP: 0033:0x45af49 [ 835.764961] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 835.783874] RSP: 002b:00007f3cc8a61c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:13 executing program 2 (fault-call:3 fault-nth:68): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2ea9000000000000) 10:24:13 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xb41e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 835.791631] RAX: ffffffffffffffda RBX: 00007f3cc8a61c90 RCX: 000000000045af49 [ 835.798915] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 835.806194] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 835.813480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a626d4 [ 835.820763] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000004 [ 835.963834] FAULT_INJECTION: forcing a failure. [ 835.963834] name failslab, interval 1, probability 0, space 0, times 0 [ 836.046408] CPU: 0 PID: 19818 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 836.054260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.063626] Call Trace: [ 836.066247] dump_stack+0x197/0x210 [ 836.069918] should_fail.cold+0xa/0x1b [ 836.073828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 836.078950] ? lock_downgrade+0x880/0x880 [ 836.083125] __should_failslab+0x121/0x190 [ 836.087371] should_failslab+0x9/0x14 [ 836.091304] kmem_cache_alloc_node+0x26c/0x710 [ 836.095906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 836.100687] __alloc_skb+0xd5/0x5f0 [ 836.104331] ? skb_trim+0x190/0x190 [ 836.107973] ? __ip6_append_data.isra.0+0x2120/0x2fc0 [ 836.113179] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 836.118228] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.122582] ? ip6_setup_cork+0x1860/0x1860 [ 836.126931] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 836.131786] ? lock_downgrade+0x880/0x880 [ 836.135950] ip6_make_skb+0x32f/0x561 [ 836.139779] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.144122] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.148459] ? ip6_push_pending_frames+0xf0/0xf0 [ 836.153229] ? find_held_lock+0x35/0x130 [ 836.157308] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 836.162168] ? ip6_dst_lookup_flow+0x220/0x220 [ 836.166769] udpv6_sendmsg+0x225b/0x2a00 [ 836.170850] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.175189] ? udp_v6_get_port+0x6b0/0x6b0 [ 836.179446] ? __local_bh_enable_ip+0x15a/0x270 [ 836.184129] ? _raw_spin_unlock_bh+0x31/0x40 [ 836.189506] ? __local_bh_enable_ip+0x15a/0x270 [ 836.194186] ? mark_held_locks+0x100/0x100 [ 836.198429] ? mark_held_locks+0xb1/0x100 [ 836.202595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 836.207381] ? release_sock+0x156/0x1c0 [ 836.211361] ? __local_bh_enable_ip+0x15a/0x270 [ 836.216146] ? _raw_spin_unlock_bh+0x31/0x40 [ 836.220566] inet_sendmsg+0x141/0x5d0 [ 836.224425] ? inet_sendmsg+0x141/0x5d0 [ 836.228391] ? ipip_gro_receive+0x100/0x100 [ 836.232704] sock_sendmsg+0xd7/0x130 [ 836.236424] ___sys_sendmsg+0x803/0x920 [ 836.240394] ? copy_msghdr_from_user+0x430/0x430 [ 836.245196] ? lock_downgrade+0x880/0x880 [ 836.249349] ? kasan_check_read+0x11/0x20 [ 836.253509] ? __fget+0x367/0x540 [ 836.257047] ? __fget_light+0x1a9/0x230 [ 836.261029] ? __fdget+0x1b/0x20 [ 836.264529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 836.270060] __sys_sendmsg+0x105/0x1d0 [ 836.273955] ? __ia32_sys_shutdown+0x80/0x80 [ 836.278368] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 836.283130] ? do_syscall_64+0x26/0x620 [ 836.287095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.292469] ? do_syscall_64+0x26/0x620 [ 836.296435] __x64_sys_sendmsg+0x78/0xb0 [ 836.300487] do_syscall_64+0xfd/0x620 [ 836.304277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.309463] RIP: 0033:0x45af49 [ 836.312655] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 836.331687] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 836.339482] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 836.346752] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 836.354034] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 836.361292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 836.368559] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r5}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x40, r2, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1e050000}, 0x0) 10:24:13 executing program 2 (fault-call:3 fault-nth:69): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x364c000000000000) 10:24:13 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 10:24:13 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xb6a3, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 10:24:13 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xb996, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:13 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x1eb40000}, 0x0) 10:24:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3e9e000000000000) [ 836.524160] FAULT_INJECTION: forcing a failure. [ 836.524160] name failslab, interval 1, probability 0, space 0, times 0 [ 836.587951] CPU: 1 PID: 19836 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 836.595793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.605164] Call Trace: [ 836.607773] dump_stack+0x197/0x210 [ 836.611431] should_fail.cold+0xa/0x1b [ 836.615343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 836.620486] ? lock_downgrade+0x880/0x880 [ 836.623022] batman_adv: Cannot find parent device [ 836.624654] __should_failslab+0x121/0x190 [ 836.624675] should_failslab+0x9/0x14 10:24:13 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) [ 836.624691] kmem_cache_alloc_node+0x26c/0x710 [ 836.624711] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 836.624738] __alloc_skb+0xd5/0x5f0 [ 836.651367] ? skb_trim+0x190/0x190 [ 836.655019] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 836.660051] ? skb_put+0x183/0x1e0 [ 836.663645] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 836.668690] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.673041] ? ip6_setup_cork+0x1860/0x1860 [ 836.677388] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 836.682247] ? lock_downgrade+0x880/0x880 [ 836.686444] ip6_make_skb+0x32f/0x561 [ 836.690259] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.694605] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.698959] ? ip6_push_pending_frames+0xf0/0xf0 [ 836.703823] ? find_held_lock+0x35/0x130 [ 836.707915] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 836.712787] ? ip6_dst_lookup_flow+0x220/0x220 [ 836.717397] udpv6_sendmsg+0x225b/0x2a00 [ 836.721486] ? ip_reply_glue_bits+0xc0/0xc0 [ 836.725835] ? udp_v6_get_port+0x6b0/0x6b0 [ 836.730090] ? __local_bh_enable_ip+0x15a/0x270 10:24:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xbe46, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 836.734782] ? _raw_spin_unlock_bh+0x31/0x40 [ 836.739212] ? __local_bh_enable_ip+0x15a/0x270 [ 836.743909] ? mark_held_locks+0x100/0x100 [ 836.748166] ? mark_held_locks+0x100/0x100 [ 836.752426] ? _raw_spin_unlock_bh+0x31/0x40 [ 836.756867] ? release_sock+0x156/0x1c0 [ 836.760870] ? __local_bh_enable_ip+0x15a/0x270 [ 836.765557] ? _raw_spin_unlock_bh+0x31/0x40 [ 836.769992] inet_sendmsg+0x141/0x5d0 [ 836.773810] ? inet_sendmsg+0x141/0x5d0 [ 836.777804] ? ipip_gro_receive+0x100/0x100 [ 836.782148] sock_sendmsg+0xd7/0x130 [ 836.785887] ___sys_sendmsg+0x803/0x920 [ 836.789883] ? copy_msghdr_from_user+0x430/0x430 [ 836.794666] ? lock_downgrade+0x880/0x880 [ 836.798835] ? kasan_check_read+0x11/0x20 [ 836.803007] ? __fget+0x367/0x540 [ 836.806502] ? __fget_light+0x1a9/0x230 [ 836.810496] ? __fdget+0x1b/0x20 [ 836.813874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 836.819427] __sys_sendmsg+0x105/0x1d0 [ 836.823349] ? __ia32_sys_shutdown+0x80/0x80 [ 836.827787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 836.832555] ? do_syscall_64+0x26/0x620 [ 836.836541] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.841920] ? do_syscall_64+0x26/0x620 [ 836.846096] __x64_sys_sendmsg+0x78/0xb0 [ 836.850173] do_syscall_64+0xfd/0x620 [ 836.853988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.859180] RIP: 0033:0x45af49 [ 836.862389] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 836.881302] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 836.889028] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 836.896366] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 836.903627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 836.910887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 836.918144] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r5}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x40, r2, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 10:24:14 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x20000000}, 0x0) 10:24:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3f00000000000000) 10:24:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xbf0e, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 2 (fault-call:3 fault-nth:70): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xc278, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x20000180}, 0x0) [ 837.102697] FAULT_INJECTION: forcing a failure. [ 837.102697] name failslab, interval 1, probability 0, space 0, times 0 [ 837.135002] CPU: 1 PID: 19870 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 837.142823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.152190] Call Trace: [ 837.154804] dump_stack+0x197/0x210 [ 837.158459] should_fail.cold+0xa/0x1b [ 837.162371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 837.175835] ? lock_downgrade+0x880/0x880 [ 837.180028] __should_failslab+0x121/0x190 [ 837.184284] should_failslab+0x9/0x14 [ 837.188100] kmem_cache_alloc_node_trace+0x274/0x720 [ 837.193224] ? __alloc_skb+0xd5/0x5f0 [ 837.197049] __kmalloc_node_track_caller+0x3d/0x80 [ 837.202002] __kmalloc_reserve.isra.0+0x40/0xf0 [ 837.206701] __alloc_skb+0x10b/0x5f0 [ 837.210433] ? skb_trim+0x190/0x190 [ 837.214073] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 837.218940] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.223974] ? skb_put+0x183/0x1e0 [ 837.227532] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 837.232565] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.236926] ? ip6_setup_cork+0x1860/0x1860 [ 837.241255] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 837.246117] ? lock_downgrade+0x880/0x880 [ 837.250286] ip6_make_skb+0x32f/0x561 [ 837.254090] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.258425] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.262767] ? ip6_push_pending_frames+0xf0/0xf0 [ 837.267542] ? find_held_lock+0x35/0x130 [ 837.271612] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 837.276465] ? ip6_dst_lookup_flow+0x220/0x220 [ 837.281059] udpv6_sendmsg+0x225b/0x2a00 [ 837.285129] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.289460] ? udp_v6_get_port+0x6b0/0x6b0 [ 837.293725] ? __local_bh_enable_ip+0x15a/0x270 [ 837.298396] ? _raw_spin_unlock_bh+0x31/0x40 [ 837.302807] ? __local_bh_enable_ip+0x15a/0x270 [ 837.307486] ? mark_held_locks+0x100/0x100 [ 837.311721] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 837.316481] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 837.321065] ? retint_kernel+0x2d/0x2d [ 837.324968] ? release_sock+0x156/0x1c0 [ 837.328960] ? __local_bh_enable_ip+0x15a/0x270 [ 837.333632] ? _raw_spin_unlock_bh+0x31/0x40 [ 837.338052] inet_sendmsg+0x141/0x5d0 [ 837.341862] ? inet_sendmsg+0x141/0x5d0 [ 837.345887] ? ipip_gro_receive+0x100/0x100 [ 837.350229] sock_sendmsg+0xd7/0x130 [ 837.353957] ___sys_sendmsg+0x803/0x920 [ 837.357941] ? copy_msghdr_from_user+0x430/0x430 [ 837.362726] ? lock_downgrade+0x880/0x880 [ 837.366974] ? kasan_check_read+0x11/0x20 [ 837.371134] ? __fget+0x367/0x540 [ 837.374613] ? __fget_light+0x1a9/0x230 [ 837.378597] ? __fdget+0x1b/0x20 [ 837.381983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 837.387528] __sys_sendmsg+0x105/0x1d0 [ 837.391425] ? __ia32_sys_shutdown+0x80/0x80 [ 837.395839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 837.400618] __x64_sys_sendmsg+0x78/0xb0 [ 837.404689] do_syscall_64+0xfd/0x620 [ 837.408497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.413682] RIP: 0033:0x45af49 [ 837.416883] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 837.435795] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 837.443507] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 10:24:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xc486, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x26570000}, 0x0) [ 837.450777] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 837.458041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 837.465312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 837.472580] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x365) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r5}]]}}}]}, 0x48}, 0x1, 0x3e0}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x40, r2, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4000000000000000) [ 837.564089] encrypted_key: master key parameter is missing 10:24:14 executing program 2 (fault-call:3 fault-nth:71): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:14 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x2ea90000}, 0x0) 10:24:14 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xc698, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 837.755885] batman_adv: Cannot find parent device [ 837.795453] FAULT_INJECTION: forcing a failure. [ 837.795453] name failslab, interval 1, probability 0, space 0, times 0 [ 837.842858] CPU: 0 PID: 19904 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 837.850711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.860083] Call Trace: [ 837.862694] dump_stack+0x197/0x210 [ 837.866352] should_fail.cold+0xa/0x1b [ 837.870264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 837.875396] __should_failslab+0x121/0x190 [ 837.879654] should_failslab+0x9/0x14 [ 837.883475] kmem_cache_alloc_node+0x26c/0x710 [ 837.888074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 837.893639] __alloc_skb+0xd5/0x5f0 [ 837.897291] ? skb_trim+0x190/0x190 [ 837.900938] ? __sanitizer_cov_trace_cmp4+0x11/0x20 [ 837.905977] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.911149] ? skb_put+0x183/0x1e0 [ 837.914726] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 837.919776] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.924138] ? ip6_setup_cork+0x1860/0x1860 [ 837.928488] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 837.933463] ip6_make_skb+0x32f/0x561 [ 837.937288] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.941664] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.946012] ? ip6_push_pending_frames+0xf0/0xf0 [ 837.950798] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 837.955668] ? ip6_dst_lookup_flow+0x220/0x220 [ 837.960272] ? fl6_update_dst+0x19/0x2c0 [ 837.964462] udpv6_sendmsg+0x225b/0x2a00 [ 837.968555] ? ip_reply_glue_bits+0xc0/0xc0 [ 837.972905] ? udp_v6_get_port+0x6b0/0x6b0 [ 837.977178] ? mark_held_locks+0xb1/0x100 [ 837.981360] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 837.985958] ? retint_kernel+0x2d/0x2d [ 837.989867] ? trace_hardirqs_on_caller+0x6a/0x220 [ 837.994915] ? mark_held_locks+0x100/0x100 [ 837.999173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 838.004145] ? retint_kernel+0x2d/0x2d [ 838.008055] ? trace_hardirqs_on_caller+0x6a/0x220 [ 838.013039] inet_sendmsg+0x141/0x5d0 [ 838.016968] ? inet_sendmsg+0x141/0x5d0 [ 838.020961] ? ipip_gro_receive+0x100/0x100 [ 838.025302] sock_sendmsg+0xd7/0x130 [ 838.029041] ___sys_sendmsg+0x803/0x920 [ 838.033047] ? copy_msghdr_from_user+0x430/0x430 [ 838.037905] ? lock_downgrade+0x880/0x880 [ 838.042083] ? kasan_check_read+0x11/0x20 [ 838.046257] ? __fget+0x367/0x540 [ 838.049744] ? retint_kernel+0x2d/0x2d [ 838.053727] ? __fget_light+0x1a9/0x230 [ 838.057734] ? __fdget+0x1b/0x20 [ 838.061110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.066658] __sys_sendmsg+0x105/0x1d0 [ 838.070543] ? __ia32_sys_shutdown+0x80/0x80 [ 838.074958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 838.079718] ? do_syscall_64+0x26/0x620 [ 838.083685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.089160] ? do_syscall_64+0x26/0x620 [ 838.093153] __x64_sys_sendmsg+0x78/0xb0 [ 838.097227] do_syscall_64+0xfd/0x620 [ 838.101026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.106212] RIP: 0033:0x45af49 [ 838.110264] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.129555] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:15 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x364c0000}, 0x0) 10:24:15 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xc9fe, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 838.137260] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 838.144803] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 838.152074] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 838.159346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 838.166620] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 10:24:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4641000000000000) 10:24:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000000)={{0x9, 0x6}, 0x20}, 0x10) 10:24:15 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3e9e0000}, 0x0) 10:24:15 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xce3b, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:15 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4d16ff7f00000000) [ 838.466237] [U]  10:24:15 executing program 2 (fault-call:3 fault-nth:72): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:15 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xcf76, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:15 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 838.504134] encrypted_key: master key parameter is missing 10:24:15 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x3f000000}, 0x0) 10:24:15 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 838.600461] [U]  [ 838.663912] FAULT_INJECTION: forcing a failure. [ 838.663912] name failslab, interval 1, probability 0, space 0, times 0 [ 838.690857] CPU: 1 PID: 19954 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 838.698713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.708177] Call Trace: [ 838.710787] dump_stack+0x197/0x210 [ 838.714457] should_fail.cold+0xa/0x1b [ 838.718381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 838.723504] ? lock_downgrade+0x880/0x880 [ 838.727682] __should_failslab+0x121/0x190 [ 838.731942] should_failslab+0x9/0x14 [ 838.735755] kmem_cache_alloc_node_trace+0x274/0x720 [ 838.740896] ? __alloc_skb+0xd5/0x5f0 [ 838.744740] __kmalloc_node_track_caller+0x3d/0x80 [ 838.749689] __kmalloc_reserve.isra.0+0x40/0xf0 [ 838.754412] __alloc_skb+0x10b/0x5f0 [ 838.758268] ? skb_trim+0x190/0x190 10:24:15 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xd4ee, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xd68d, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 838.762027] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.767055] ? skb_put+0x183/0x1e0 [ 838.770620] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 838.775664] ? ip_reply_glue_bits+0xc0/0xc0 [ 838.780015] ? ip6_setup_cork+0x1860/0x1860 [ 838.784349] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 838.789204] ? lock_downgrade+0x880/0x880 [ 838.793377] ip6_make_skb+0x32f/0x561 [ 838.797192] ? ip_reply_glue_bits+0xc0/0xc0 [ 838.801535] ? ip_reply_glue_bits+0xc0/0xc0 [ 838.805870] ? ip6_push_pending_frames+0xf0/0xf0 [ 838.810643] ? find_held_lock+0x35/0x130 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xde30, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 838.814724] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 838.819583] ? ip6_dst_lookup_flow+0x220/0x220 [ 838.824186] udpv6_sendmsg+0x225b/0x2a00 [ 838.828278] ? ip_reply_glue_bits+0xc0/0xc0 [ 838.832804] ? udp_v6_get_port+0x6b0/0x6b0 [ 838.837085] ? __local_bh_enable_ip+0x15a/0x270 [ 838.841769] ? _raw_spin_unlock_bh+0x31/0x40 [ 838.846196] ? __local_bh_enable_ip+0x15a/0x270 [ 838.850891] ? mark_held_locks+0x100/0x100 [ 838.855170] ? mark_held_locks+0x100/0x100 [ 838.859505] ? _raw_spin_unlock_bh+0x31/0x40 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xe682, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x40000000}, 0x0) [ 838.863944] ? release_sock+0x156/0x1c0 [ 838.867950] ? __local_bh_enable_ip+0x15a/0x270 [ 838.872636] ? _raw_spin_unlock_bh+0x31/0x40 [ 838.877068] inet_sendmsg+0x141/0x5d0 [ 838.880885] ? inet_sendmsg+0x141/0x5d0 [ 838.884880] ? ipip_gro_receive+0x100/0x100 [ 838.889223] sock_sendmsg+0xd7/0x130 [ 838.892956] ___sys_sendmsg+0x803/0x920 [ 838.896948] ? copy_msghdr_from_user+0x430/0x430 [ 838.901839] ? lock_downgrade+0x880/0x880 [ 838.906017] ? kasan_check_read+0x11/0x20 [ 838.910227] ? __fget+0x367/0x540 [ 838.913714] ? __fget_light+0x1a9/0x230 [ 838.917694] ? __fdget+0x1b/0x20 [ 838.921070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.926628] __sys_sendmsg+0x105/0x1d0 [ 838.930544] ? __ia32_sys_shutdown+0x80/0x80 [ 838.934983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 838.939755] ? do_syscall_64+0x26/0x620 [ 838.943749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.949135] ? do_syscall_64+0x26/0x620 [ 838.953132] __x64_sys_sendmsg+0x78/0xb0 [ 838.957214] do_syscall_64+0xfd/0x620 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xee25, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 838.961044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.966416] RIP: 0033:0x45af49 [ 838.969615] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.988704] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 838.996435] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 839.003751] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:24:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4e93000000000000) [ 839.011041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 839.018323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 839.025632] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:16 executing program 2 (fault-call:3 fault-nth:73): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x46410000}, 0x0) 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xeed4, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x2, 0x3) 10:24:16 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) [ 839.154825] [U]  10:24:16 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4d16ff7f}, 0x0) 10:24:16 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x2, 0x3) 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xf677, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x5636000000000000) 10:24:16 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4b47, 0x3) [ 839.263728] FAULT_INJECTION: forcing a failure. [ 839.263728] name failslab, interval 1, probability 0, space 0, times 0 [ 839.361474] CPU: 0 PID: 19999 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 839.369321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.378684] Call Trace: [ 839.381298] dump_stack+0x197/0x210 [ 839.384952] should_fail.cold+0xa/0x1b [ 839.388867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 839.393994] ? lock_downgrade+0x880/0x880 [ 839.398172] __should_failslab+0x121/0x190 [ 839.402425] should_failslab+0x9/0x14 [ 839.406242] kmem_cache_alloc_node+0x26c/0x710 [ 839.410848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.416417] __alloc_skb+0xd5/0x5f0 [ 839.420059] ? skb_trim+0x190/0x190 [ 839.423700] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 839.428728] ? skb_put+0x183/0x1e0 [ 839.432285] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 839.437325] ? ip_reply_glue_bits+0xc0/0xc0 [ 839.441676] ? ip6_setup_cork+0x1860/0x1860 [ 839.446021] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 839.450884] ? lock_downgrade+0x880/0x880 [ 839.455053] ip6_make_skb+0x32f/0x561 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xfe1a, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:16 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xfe80, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 839.458876] ? ip_reply_glue_bits+0xc0/0xc0 [ 839.463218] ? ip_reply_glue_bits+0xc0/0xc0 [ 839.467563] ? ip6_push_pending_frames+0xf0/0xf0 [ 839.472346] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 839.477208] ? ip6_dst_lookup_flow+0x220/0x220 [ 839.481801] ? selinux_sk_getsecid+0x77/0xc0 [ 839.486225] udpv6_sendmsg+0x225b/0x2a00 [ 839.490306] ? ip_reply_glue_bits+0xc0/0xc0 [ 839.494657] ? udp_v6_get_port+0x6b0/0x6b0 [ 839.498924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 839.503810] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 839.508589] ? trace_hardirqs_on_caller+0x6a/0x220 [ 839.513542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 839.518319] ? retint_kernel+0x2d/0x2d [ 839.522232] ? release_sock+0x156/0x1c0 [ 839.526234] ? __local_bh_enable_ip+0x15a/0x270 [ 839.530916] ? _raw_spin_unlock_bh+0x31/0x40 [ 839.535346] inet_sendmsg+0x141/0x5d0 [ 839.539165] ? inet_sendmsg+0x141/0x5d0 [ 839.543156] ? ipip_gro_receive+0x100/0x100 [ 839.547499] sock_sendmsg+0xd7/0x130 [ 839.551230] ___sys_sendmsg+0x803/0x920 [ 839.555227] ? copy_msghdr_from_user+0x430/0x430 [ 839.560010] ? lock_downgrade+0x880/0x880 [ 839.564172] ? kasan_check_read+0x11/0x20 [ 839.568340] ? __fget+0x367/0x540 [ 839.571825] ? __fget_light+0x1a9/0x230 [ 839.575821] ? __fdget+0x1b/0x20 [ 839.579201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.584756] __sys_sendmsg+0x105/0x1d0 [ 839.588655] ? __ia32_sys_shutdown+0x80/0x80 [ 839.593081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 839.597862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 839.602624] ? do_syscall_64+0x26/0x620 [ 839.606610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.612144] ? do_syscall_64+0x26/0x620 [ 839.616140] __x64_sys_sendmsg+0x78/0xb0 [ 839.620219] do_syscall_64+0xfd/0x620 [ 839.624037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.629237] RIP: 0033:0x45af49 [ 839.632445] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 839.651359] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:17 executing program 2 (fault-call:3 fault-nth:74): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xfec9, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4b47, 0x3) 10:24:17 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4e930000}, 0x0) 10:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x5e88000000000000) 10:24:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4b49, 0x3) [ 839.659218] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 839.666504] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 839.673786] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 839.681069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 839.688347] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4b49, 0x3) 10:24:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5409, 0x3) 10:24:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x34000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:17 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x56360000}, 0x0) [ 839.885496] FAULT_INJECTION: forcing a failure. [ 839.885496] name failslab, interval 1, probability 0, space 0, times 0 [ 839.939939] CPU: 0 PID: 20044 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 839.947789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.957154] Call Trace: [ 839.959776] dump_stack+0x197/0x210 [ 839.963473] should_fail.cold+0xa/0x1b [ 839.967390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 839.972515] ? lock_downgrade+0x880/0x880 [ 839.976694] __should_failslab+0x121/0x190 [ 839.980944] should_failslab+0x9/0x14 [ 839.984758] kmem_cache_alloc_node_trace+0x274/0x720 [ 839.989879] ? __alloc_skb+0xd5/0x5f0 [ 839.993698] __kmalloc_node_track_caller+0x3d/0x80 [ 839.998650] __kmalloc_reserve.isra.0+0x40/0xf0 [ 840.003346] __alloc_skb+0x10b/0x5f0 [ 840.007086] ? skb_trim+0x190/0x190 [ 840.010728] ? __ip6_append_data.isra.0+0x20ae/0x2fc0 [ 840.015927] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 840.020957] ? skb_put+0x183/0x1e0 [ 840.024520] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 840.029564] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.033913] ? ip6_setup_cork+0x1860/0x1860 [ 840.038259] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 840.043118] ? lock_downgrade+0x880/0x880 [ 840.047287] ip6_make_skb+0x32f/0x561 [ 840.051103] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.055448] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.059802] ? ip6_push_pending_frames+0xf0/0xf0 [ 840.064590] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.069459] udpv6_sendmsg+0x225b/0x2a00 [ 840.073539] ? firmware_map_remove+0x1a7/0x1a7 [ 840.078139] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.082488] ? udp_v6_get_port+0x6b0/0x6b0 10:24:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5409, 0x3) 10:24:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x3) [ 840.086745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.091526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.096332] ? trace_hardirqs_on_caller+0x6a/0x220 [ 840.101303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.106085] ? retint_kernel+0x2d/0x2d [ 840.109998] ? release_sock+0x156/0x1c0 [ 840.114006] ? __local_bh_enable_ip+0x15a/0x270 [ 840.118693] ? _raw_spin_unlock_bh+0x31/0x40 [ 840.123131] inet_sendmsg+0x141/0x5d0 [ 840.126947] ? inet_sendmsg+0x141/0x5d0 [ 840.130968] ? ipip_gro_receive+0x100/0x100 [ 840.135314] sock_sendmsg+0xd7/0x130 [ 840.139045] ___sys_sendmsg+0x803/0x920 [ 840.143045] ? copy_msghdr_from_user+0x430/0x430 [ 840.147824] ? lock_downgrade+0x880/0x880 [ 840.152014] ? rcu_dynticks_curr_cpu_in_eqs+0x7a/0xb0 [ 840.157223] ? __fget+0x367/0x540 [ 840.160714] ? __fget_light+0x1a9/0x230 [ 840.165143] ? __fdget+0x1b/0x20 [ 840.168549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.174120] __sys_sendmsg+0x105/0x1d0 [ 840.178028] ? __ia32_sys_shutdown+0x80/0x80 [ 840.182461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.187235] ? do_syscall_64+0x26/0x620 [ 840.191222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.196599] ? do_syscall_64+0x26/0x620 [ 840.200590] __x64_sys_sendmsg+0x78/0xb0 [ 840.204667] do_syscall_64+0xfd/0x620 [ 840.208480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.213683] RIP: 0033:0x45af49 [ 840.216889] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.235803] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 840.243615] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 840.250891] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 840.258157] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 840.265478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 840.272781] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:17 executing program 2 (fault-call:3 fault-nth:75): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:17 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x5e880000}, 0x0) 10:24:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540b, 0x3) 10:24:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540c, 0x3) 10:24:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x100000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6000000000000000) 10:24:17 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540d, 0x3) 10:24:17 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540c, 0x3) 10:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x662b000000000000) 10:24:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x400300, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 840.439876] FAULT_INJECTION: forcing a failure. [ 840.439876] name failslab, interval 1, probability 0, space 0, times 0 10:24:17 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x60000000}, 0x0) [ 840.535575] CPU: 1 PID: 20079 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 840.543419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.552791] Call Trace: [ 840.555405] dump_stack+0x197/0x210 [ 840.559060] should_fail.cold+0xa/0x1b [ 840.563088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 840.568215] ? lock_downgrade+0x880/0x880 [ 840.572398] __should_failslab+0x121/0x190 [ 840.576648] should_failslab+0x9/0x14 [ 840.580461] kmem_cache_alloc_node+0x26c/0x710 10:24:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6e7d000000000000) [ 840.585071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.590630] __alloc_skb+0xd5/0x5f0 [ 840.594270] ? skb_trim+0x190/0x190 [ 840.597919] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 840.602949] ? skb_put+0x183/0x1e0 [ 840.606509] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 840.611547] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.615888] ? ip6_setup_cork+0x1860/0x1860 [ 840.620229] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 840.625092] ? lock_downgrade+0x880/0x880 [ 840.629277] ip6_make_skb+0x32f/0x561 [ 840.633096] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.637445] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.641791] ? ip6_push_pending_frames+0xf0/0xf0 [ 840.646563] ? find_held_lock+0x35/0x130 [ 840.650647] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 840.655525] ? ip6_dst_lookup_flow+0x220/0x220 [ 840.660130] udpv6_sendmsg+0x225b/0x2a00 [ 840.664211] ? ip_reply_glue_bits+0xc0/0xc0 [ 840.668561] ? udp_v6_get_port+0x6b0/0x6b0 [ 840.672809] ? __local_bh_enable_ip+0x15a/0x270 [ 840.677500] ? _raw_spin_unlock_bh+0x31/0x40 [ 840.681927] ? __local_bh_enable_ip+0x15a/0x270 [ 840.686628] ? mark_held_locks+0x100/0x100 [ 840.690882] ? mark_held_locks+0x100/0x100 [ 840.695126] ? _raw_spin_unlock_bh+0x31/0x40 [ 840.699572] ? release_sock+0x156/0x1c0 [ 840.703595] ? __local_bh_enable_ip+0x15a/0x270 [ 840.708288] ? _raw_spin_unlock_bh+0x31/0x40 [ 840.712724] inet_sendmsg+0x141/0x5d0 [ 840.716552] ? inet_sendmsg+0x141/0x5d0 [ 840.720552] ? ipip_gro_receive+0x100/0x100 [ 840.724894] sock_sendmsg+0xd7/0x130 [ 840.728632] ___sys_sendmsg+0x803/0x920 [ 840.732635] ? copy_msghdr_from_user+0x430/0x430 [ 840.737414] ? lock_downgrade+0x880/0x880 [ 840.741586] ? kasan_check_read+0x11/0x20 [ 840.745753] ? __fget+0x367/0x540 [ 840.749245] ? __fget_light+0x1a9/0x230 [ 840.753247] ? __fdget+0x1b/0x20 [ 840.756626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.762182] __sys_sendmsg+0x105/0x1d0 [ 840.766087] ? __ia32_sys_shutdown+0x80/0x80 [ 840.770528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 840.775299] ? do_syscall_64+0x26/0x620 [ 840.779287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.784671] ? do_syscall_64+0x26/0x620 [ 840.788648] __x64_sys_sendmsg+0x78/0xb0 [ 840.792699] do_syscall_64+0xfd/0x620 [ 840.796487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.801667] RIP: 0033:0x45af49 [ 840.804891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.823813] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:18 executing program 2 (fault-call:3 fault-nth:76): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7620000000000000) 10:24:18 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xf0ff7f, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:18 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x662b0000}, 0x0) 10:24:18 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540e, 0x3) 10:24:18 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540d, 0x3) [ 840.831555] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 840.838815] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 840.846081] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 840.853345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 840.860718] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:18 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x6e7d0000}, 0x0) 10:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x76cf000000000000) 10:24:18 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0x3) 10:24:18 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540e, 0x3) 10:24:18 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 841.076580] FAULT_INJECTION: forcing a failure. [ 841.076580] name failslab, interval 1, probability 0, space 0, times 0 [ 841.148018] CPU: 0 PID: 20119 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 841.155882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.165255] Call Trace: [ 841.167878] dump_stack+0x197/0x210 [ 841.171532] should_fail.cold+0xa/0x1b [ 841.175443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 841.180624] __should_failslab+0x121/0x190 [ 841.184884] should_failslab+0x9/0x14 [ 841.188707] kmem_cache_alloc_node_trace+0x274/0x720 [ 841.193832] ? __alloc_skb+0xd5/0x5f0 [ 841.197659] __kmalloc_node_track_caller+0x3d/0x80 [ 841.202607] __kmalloc_reserve.isra.0+0x40/0xf0 [ 841.207297] __alloc_skb+0x10b/0x5f0 [ 841.211026] ? skb_trim+0x190/0x190 [ 841.214683] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 841.219743] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.224094] ? ip6_setup_cork+0x1860/0x1860 [ 841.228441] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 841.233312] ip6_make_skb+0x32f/0x561 [ 841.237134] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.241483] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.245829] ? ip6_push_pending_frames+0xf0/0xf0 [ 841.250614] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 841.255476] ? ip6_dst_lookup_flow+0x220/0x220 [ 841.260080] udpv6_sendmsg+0x225b/0x2a00 [ 841.264162] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.268516] ? udp_v6_get_port+0x6b0/0x6b0 [ 841.272778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.277552] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.282331] ? trace_hardirqs_on_caller+0x6a/0x220 [ 841.287282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.292052] ? retint_kernel+0x2d/0x2d 10:24:18 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540f, 0x3) [ 841.295962] ? release_sock+0x156/0x1c0 [ 841.299974] ? __local_bh_enable_ip+0x15a/0x270 [ 841.304662] ? _raw_spin_unlock_bh+0x31/0x40 [ 841.309098] inet_sendmsg+0x141/0x5d0 [ 841.312911] ? inet_sendmsg+0x141/0x5d0 [ 841.316904] ? ipip_gro_receive+0x100/0x100 [ 841.321252] sock_sendmsg+0xd7/0x130 [ 841.324982] ___sys_sendmsg+0x803/0x920 [ 841.328968] ? copy_msghdr_from_user+0x430/0x430 [ 841.333743] ? lock_downgrade+0x880/0x880 [ 841.337921] ? kasan_check_read+0x11/0x20 [ 841.342088] ? __fget+0x367/0x540 [ 841.345569] ? __fget_light+0x1a9/0x230 [ 841.349560] ? __fdget+0x1b/0x20 [ 841.352942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.358499] __sys_sendmsg+0x105/0x1d0 [ 841.362405] ? __ia32_sys_shutdown+0x80/0x80 [ 841.366848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.371623] ? do_syscall_64+0x26/0x620 [ 841.375615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.381003] ? do_syscall_64+0x26/0x620 [ 841.384990] __x64_sys_sendmsg+0x78/0xb0 [ 841.389072] do_syscall_64+0xfd/0x620 [ 841.392895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.398096] RIP: 0033:0x45af49 [ 841.401299] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.420229] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 841.427951] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 841.435238] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:24:18 executing program 2 (fault-call:3 fault-nth:77): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7805000000000000) 10:24:18 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x76200000}, 0x0) 10:24:18 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5410, 0x3) 10:24:18 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:18 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5410, 0x3) [ 841.442609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 841.449886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 841.457165] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:18 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 841.559107] FAULT_INJECTION: forcing a failure. [ 841.559107] name failslab, interval 1, probability 0, space 0, times 0 10:24:18 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5411, 0x3) 10:24:18 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x76cf0000}, 0x0) [ 841.627967] CPU: 0 PID: 20159 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 841.635817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.645188] Call Trace: [ 841.647806] dump_stack+0x197/0x210 [ 841.651460] should_fail.cold+0xa/0x1b [ 841.655387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 841.660513] ? lock_downgrade+0x880/0x880 [ 841.664961] __should_failslab+0x121/0x190 [ 841.669212] should_failslab+0x9/0x14 [ 841.673031] kmem_cache_alloc_node+0x26c/0x710 10:24:18 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 841.677633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.683192] __alloc_skb+0xd5/0x5f0 [ 841.686836] ? skb_trim+0x190/0x190 [ 841.690481] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 841.695511] ? skb_put+0x183/0x1e0 [ 841.699076] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 841.704115] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.708469] ? ip6_setup_cork+0x1860/0x1860 [ 841.712813] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 841.717675] ? lock_downgrade+0x880/0x880 [ 841.721856] ip6_make_skb+0x32f/0x561 10:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7e72000000000000) 10:24:19 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5411, 0x3) [ 841.725688] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.730989] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.735328] ? ip6_push_pending_frames+0xf0/0xf0 [ 841.740124] ? find_held_lock+0x35/0x130 [ 841.744208] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 841.749072] ? ip6_dst_lookup_flow+0x220/0x220 [ 841.753706] udpv6_sendmsg+0x225b/0x2a00 [ 841.757794] ? ip_reply_glue_bits+0xc0/0xc0 [ 841.762139] ? udp_v6_get_port+0x6b0/0x6b0 [ 841.766400] ? __local_bh_enable_ip+0x15a/0x270 [ 841.771085] ? _raw_spin_unlock_bh+0x31/0x40 [ 841.775512] ? __local_bh_enable_ip+0x15a/0x270 [ 841.780227] ? mark_held_locks+0x100/0x100 [ 841.784603] ? mark_held_locks+0x100/0x100 [ 841.788861] ? _raw_spin_unlock_bh+0x31/0x40 [ 841.793305] ? release_sock+0x156/0x1c0 [ 841.797317] ? __local_bh_enable_ip+0x15a/0x270 [ 841.802006] ? _raw_spin_unlock_bh+0x31/0x40 [ 841.806441] inet_sendmsg+0x141/0x5d0 [ 841.810260] ? inet_sendmsg+0x141/0x5d0 [ 841.814253] ? ipip_gro_receive+0x100/0x100 [ 841.818595] sock_sendmsg+0xd7/0x130 [ 841.822333] ___sys_sendmsg+0x803/0x920 [ 841.826329] ? copy_msghdr_from_user+0x430/0x430 [ 841.831110] ? lock_downgrade+0x880/0x880 [ 841.835280] ? kasan_check_read+0x11/0x20 [ 841.839448] ? __fget+0x367/0x540 [ 841.842963] ? __fget_light+0x1a9/0x230 [ 841.846958] ? __fdget+0x1b/0x20 [ 841.850340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.855916] __sys_sendmsg+0x105/0x1d0 [ 841.859840] ? __ia32_sys_shutdown+0x80/0x80 [ 841.864282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.869077] ? do_syscall_64+0x26/0x620 [ 841.873073] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.878453] ? do_syscall_64+0x26/0x620 [ 841.882449] __x64_sys_sendmsg+0x78/0xb0 [ 841.886533] do_syscall_64+0xfd/0x620 [ 841.890352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.895554] RIP: 0033:0x45af49 [ 841.898759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.917675] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:19 executing program 2 (fault-call:3 fault-nth:78): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:19 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x78050000}, 0x0) 10:24:19 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5412, 0x3) 10:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8001002000000000) 10:24:19 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:19 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5412, 0x3) [ 841.925402] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 841.932698] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 841.939985] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 841.947282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 841.954566] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:19 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5413, 0x3) 10:24:19 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5413, 0x3) 10:24:19 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8615000000000000) [ 842.095993] FAULT_INJECTION: forcing a failure. [ 842.095993] name failslab, interval 1, probability 0, space 0, times 0 10:24:19 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7e720000}, 0x0) 10:24:19 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x3) [ 842.235453] CPU: 1 PID: 20199 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 842.243303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.252676] Call Trace: [ 842.255289] dump_stack+0x197/0x210 [ 842.258945] should_fail.cold+0xa/0x1b [ 842.262865] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 842.267989] ? lock_downgrade+0x880/0x880 [ 842.272166] __should_failslab+0x121/0x190 [ 842.276423] should_failslab+0x9/0x14 [ 842.280236] kmem_cache_alloc_node_trace+0x274/0x720 [ 842.285358] ? __alloc_skb+0xd5/0x5f0 [ 842.289177] __kmalloc_node_track_caller+0x3d/0x80 [ 842.294123] __kmalloc_reserve.isra.0+0x40/0xf0 [ 842.298837] __alloc_skb+0x10b/0x5f0 [ 842.302585] ? skb_trim+0x190/0x190 [ 842.306233] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.311270] ? skb_put+0x183/0x1e0 [ 842.314838] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 842.319887] ? ip_reply_glue_bits+0xc0/0xc0 [ 842.324242] ? ip6_setup_cork+0x1860/0x1860 [ 842.328586] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 842.333454] ? lock_downgrade+0x880/0x880 [ 842.337626] ip6_make_skb+0x32f/0x561 [ 842.341443] ? ip_reply_glue_bits+0xc0/0xc0 [ 842.345793] ? ip_reply_glue_bits+0xc0/0xc0 [ 842.350128] ? ip6_push_pending_frames+0xf0/0xf0 [ 842.354899] ? find_held_lock+0x35/0x130 [ 842.358981] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 842.363847] ? ip6_dst_lookup_flow+0x220/0x220 [ 842.368453] udpv6_sendmsg+0x225b/0x2a00 [ 842.372537] ? ip_reply_glue_bits+0xc0/0xc0 [ 842.376882] ? udp_v6_get_port+0x6b0/0x6b0 [ 842.381129] ? __local_bh_enable_ip+0x15a/0x270 [ 842.385811] ? _raw_spin_unlock_bh+0x31/0x40 [ 842.390236] ? __local_bh_enable_ip+0x15a/0x270 [ 842.394936] ? mark_held_locks+0x100/0x100 [ 842.399309] ? mark_held_locks+0x100/0x100 [ 842.403561] ? _raw_spin_unlock_bh+0x31/0x40 [ 842.408008] ? release_sock+0x156/0x1c0 [ 842.421905] ? __local_bh_enable_ip+0x15a/0x270 [ 842.426592] ? _raw_spin_unlock_bh+0x31/0x40 [ 842.431005] inet_sendmsg+0x141/0x5d0 [ 842.434811] ? inet_sendmsg+0x141/0x5d0 [ 842.438865] ? ipip_gro_receive+0x100/0x100 [ 842.443183] sock_sendmsg+0xd7/0x130 [ 842.446902] ___sys_sendmsg+0x803/0x920 [ 842.451590] ? copy_msghdr_from_user+0x430/0x430 [ 842.456360] ? lock_downgrade+0x880/0x880 [ 842.460499] ? kasan_check_read+0x11/0x20 [ 842.464643] ? __fget+0x367/0x540 [ 842.468092] ? __fget_light+0x1a9/0x230 [ 842.472053] ? __fdget+0x1b/0x20 [ 842.475423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 842.480954] __sys_sendmsg+0x105/0x1d0 [ 842.484845] ? __ia32_sys_shutdown+0x80/0x80 [ 842.489247] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 842.493989] ? do_syscall_64+0x26/0x620 [ 842.497951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.503303] ? do_syscall_64+0x26/0x620 [ 842.507267] __x64_sys_sendmsg+0x78/0xb0 [ 842.511842] do_syscall_64+0xfd/0x620 [ 842.515641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.520836] RIP: 0033:0x45af49 [ 842.524043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.544246] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 842.551957] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 842.559213] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 842.566470] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 842.573732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 842.581023] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:19 executing program 2 (fault-call:3 fault-nth:79): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:19 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5415, 0x3) 10:24:19 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7fff15a2}, 0x0) 10:24:19 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x66d0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:19 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5414, 0x3) 10:24:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x86c4000000000000) 10:24:20 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5415, 0x3) 10:24:20 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x3) 10:24:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8dffffff00000000) 10:24:20 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7fff164d}, 0x0) [ 842.781056] FAULT_INJECTION: forcing a failure. [ 842.781056] name failslab, interval 1, probability 0, space 0, times 0 [ 842.830324] CPU: 0 PID: 20238 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 842.838354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.847735] Call Trace: [ 842.850347] dump_stack+0x197/0x210 [ 842.854006] should_fail.cold+0xa/0x1b [ 842.857939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 842.863069] ? __nf_conntrack_find_get+0xe45/0x1960 [ 842.868113] __should_failslab+0x121/0x190 [ 842.872368] should_failslab+0x9/0x14 [ 842.876193] kmem_cache_alloc+0x47/0x700 10:24:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8e67000000000000) [ 842.880268] ? kasan_check_read+0x11/0x20 [ 842.884441] __nf_conntrack_alloc+0xdb/0x680 [ 842.888878] init_conntrack+0xfd4/0x1340 [ 842.892961] ? nf_conntrack_alloc+0x50/0x50 [ 842.897304] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 842.902345] nf_conntrack_in+0x98b/0xe90 [ 842.907043] ? nf_conntrack_update+0x990/0x990 [ 842.911643] ? ip6t_error+0x1/0x40 [ 842.915220] ipv6_conntrack_in+0x61/0x90 [ 842.919298] nf_hook_slow+0xbc/0x1e0 [ 842.923031] __ip6_local_out+0x464/0x8a0 [ 842.927116] ? dst_output+0x150/0x150 10:24:20 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x7ffff000}, 0x0) [ 842.930936] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 842.935287] ip6_local_out+0x2d/0x184 [ 842.939104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 842.944791] ip6_send_skb+0xbb/0x300 [ 842.948529] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 842.953317] udpv6_sendmsg+0x22ad/0x2a00 [ 842.957396] ? firmware_map_remove+0x1a7/0x1a7 [ 842.961998] ? ip_reply_glue_bits+0xc0/0xc0 [ 842.966342] ? udp_v6_get_port+0x6b0/0x6b0 [ 842.970595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 842.975367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 842.980141] ? trace_hardirqs_on_caller+0x6a/0x220 [ 842.985100] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 842.989876] ? retint_kernel+0x2d/0x2d [ 842.993781] ? release_sock+0x156/0x1c0 [ 842.997782] ? __local_bh_enable_ip+0x15a/0x270 [ 843.002473] ? _raw_spin_unlock_bh+0x31/0x40 [ 843.006909] inet_sendmsg+0x141/0x5d0 [ 843.010730] ? inet_sendmsg+0x141/0x5d0 [ 843.014722] ? ipip_gro_receive+0x100/0x100 [ 843.019073] sock_sendmsg+0xd7/0x130 [ 843.022807] ___sys_sendmsg+0x803/0x920 [ 843.026805] ? copy_msghdr_from_user+0x430/0x430 [ 843.031590] ? lock_downgrade+0x880/0x880 [ 843.035756] ? kasan_check_read+0x11/0x20 [ 843.039922] ? __fget+0x367/0x540 [ 843.043409] ? __fget_light+0x1a9/0x230 [ 843.047402] ? __fdget+0x1b/0x20 [ 843.050781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.056340] __sys_sendmsg+0x105/0x1d0 [ 843.060243] ? __ia32_sys_shutdown+0x80/0x80 [ 843.064686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 843.069479] __x64_sys_sendmsg+0x78/0xb0 [ 843.073565] ? do_syscall_64+0x5b/0x620 [ 843.077695] do_syscall_64+0xfd/0x620 [ 843.081495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.086766] RIP: 0033:0x45af49 [ 843.089950] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.108934] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.116631] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 843.123890] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 10:24:20 executing program 2 (fault-call:3 fault-nth:80): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x960a000000000000) 10:24:20 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x80010020}, 0x0) 10:24:20 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5418, 0x3) 10:24:20 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5416, 0x3) 10:24:20 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 843.131159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 843.138416] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 843.145688] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:20 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541b, 0x3) 10:24:20 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5418, 0x3) 10:24:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x96b9000000000000) 10:24:20 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x8000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:20 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x86150000}, 0x0) [ 843.321542] FAULT_INJECTION: forcing a failure. [ 843.321542] name failslab, interval 1, probability 0, space 0, times 0 [ 843.422162] CPU: 1 PID: 20278 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 843.430014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.439384] Call Trace: [ 843.441999] dump_stack+0x197/0x210 [ 843.445653] should_fail.cold+0xa/0x1b [ 843.449574] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 843.454700] ? should_fail+0x14d/0x85c [ 843.458608] ? __nf_conntrack_find_get+0xe45/0x1960 [ 843.463725] __should_failslab+0x121/0x190 [ 843.467995] should_failslab+0x9/0x14 [ 843.472067] __kmalloc_track_caller+0x6d/0x750 [ 843.476675] ? lock_downgrade+0x880/0x880 [ 843.480850] ? nf_ct_ext_add+0x2a9/0x62f [ 843.484935] __krealloc+0x71/0xc0 [ 843.488412] nf_ct_ext_add+0x2a9/0x62f [ 843.492318] init_conntrack+0x5f4/0x1340 [ 843.496400] ? nf_conntrack_alloc+0x50/0x50 [ 843.500743] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 843.505784] nf_conntrack_in+0x98b/0xe90 [ 843.509874] ? nf_conntrack_update+0x990/0x990 [ 843.514471] ? ip6t_error+0x1/0x40 [ 843.518053] ipv6_conntrack_in+0x61/0x90 [ 843.522124] nf_hook_slow+0xbc/0x1e0 [ 843.525857] __ip6_local_out+0x464/0x8a0 [ 843.529939] ? dst_output+0x150/0x150 [ 843.533759] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 843.538094] ? ip6_make_skb+0x370/0x561 [ 843.542079] ? ip_reply_glue_bits+0xc0/0xc0 [ 843.546416] ip6_local_out+0x2d/0x184 [ 843.550230] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.555787] ip6_send_skb+0xbb/0x300 [ 843.559532] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 843.564302] ? ip6_dst_lookup_flow+0x220/0x220 [ 843.568914] udpv6_sendmsg+0x22ad/0x2a00 10:24:20 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541b, 0x3) [ 843.572986] ? ip_reply_glue_bits+0xc0/0xc0 [ 843.577403] ? udp_v6_get_port+0x6b0/0x6b0 [ 843.581651] ? __local_bh_enable_ip+0x15a/0x270 [ 843.586338] ? _raw_spin_unlock_bh+0x31/0x40 [ 843.590761] ? __local_bh_enable_ip+0x15a/0x270 [ 843.595458] ? mark_held_locks+0x100/0x100 [ 843.599712] ? mark_held_locks+0x100/0x100 [ 843.603958] ? _raw_spin_unlock_bh+0x31/0x40 [ 843.608390] ? release_sock+0x156/0x1c0 [ 843.612394] ? __local_bh_enable_ip+0x15a/0x270 [ 843.617083] ? _raw_spin_unlock_bh+0x31/0x40 [ 843.621509] inet_sendmsg+0x141/0x5d0 [ 843.625296] ? inet_sendmsg+0x141/0x5d0 [ 843.629257] ? ipip_gro_receive+0x100/0x100 [ 843.633569] sock_sendmsg+0xd7/0x130 [ 843.637273] ___sys_sendmsg+0x803/0x920 [ 843.641239] ? copy_msghdr_from_user+0x430/0x430 [ 843.646043] ? lock_downgrade+0x880/0x880 [ 843.650192] ? kasan_check_read+0x11/0x20 [ 843.654340] ? __fget+0x367/0x540 [ 843.657805] ? __fget_light+0x1a9/0x230 [ 843.661792] ? __fdget+0x1b/0x20 [ 843.665146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.670700] __sys_sendmsg+0x105/0x1d0 [ 843.674573] ? __ia32_sys_shutdown+0x80/0x80 [ 843.678976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 843.683726] ? do_syscall_64+0x26/0x620 [ 843.687689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.693036] ? do_syscall_64+0x26/0x620 [ 843.697009] __x64_sys_sendmsg+0x78/0xb0 [ 843.701077] do_syscall_64+0xfd/0x620 [ 843.704864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.710036] RIP: 0033:0x45af49 [ 843.713211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.732096] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.739885] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 843.747328] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 843.754593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 843.761906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 843.769167] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:21 executing program 2 (fault-call:3 fault-nth:81): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:21 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541d, 0x3) 10:24:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541d, 0x3) 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x86c40000}, 0x0) 10:24:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9e5c000000000000) 10:24:21 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x9000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:21 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x3) 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8a7d0000}, 0x0) 10:24:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x541e, 0x3) [ 843.937224] FAULT_INJECTION: forcing a failure. [ 843.937224] name failslab, interval 1, probability 0, space 0, times 0 [ 843.972352] CPU: 0 PID: 20314 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 10:24:21 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xa000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 843.980206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.989573] Call Trace: [ 843.992190] dump_stack+0x197/0x210 [ 843.995844] should_fail.cold+0xa/0x1b [ 843.999761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 844.004897] ? lock_downgrade+0x880/0x880 [ 844.009074] __should_failslab+0x121/0x190 [ 844.013322] should_failslab+0x9/0x14 [ 844.017137] kmem_cache_alloc_node_trace+0x274/0x720 [ 844.022254] ? __alloc_skb+0xd5/0x5f0 [ 844.026089] __kmalloc_node_track_caller+0x3d/0x80 [ 844.031040] __kmalloc_reserve.isra.0+0x40/0xf0 10:24:21 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5421, 0x3) [ 844.035738] __alloc_skb+0x10b/0x5f0 [ 844.039484] ? skb_trim+0x190/0x190 [ 844.043125] ? __ip6_append_data.isra.0+0x1a1e/0x2fc0 [ 844.048334] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 844.053369] ? skb_put+0x183/0x1e0 [ 844.056930] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 844.061963] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.066320] ? ip6_setup_cork+0x1860/0x1860 [ 844.070664] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 844.075616] ? lock_downgrade+0x880/0x880 [ 844.079787] ip6_make_skb+0x32f/0x561 [ 844.083598] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.087948] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.092301] ? ip6_push_pending_frames+0xf0/0xf0 [ 844.097082] ? ip6_sk_dst_lookup_flow+0x5d5/0xad0 [ 844.101977] ? ip6_sk_dst_lookup_flow+0x55e/0xad0 [ 844.106843] ? ip6_dst_lookup_flow+0x220/0x220 [ 844.111713] udpv6_sendmsg+0x225b/0x2a00 [ 844.115798] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.120144] ? udp_v6_get_port+0x6b0/0x6b0 [ 844.124394] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 844.128997] ? retint_kernel+0x2d/0x2d [ 844.132899] ? trace_hardirqs_on_caller+0x6a/0x220 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8dffffff}, 0x0) [ 844.137852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 844.142632] ? retint_kernel+0x2d/0x2d [ 844.146550] ? release_sock+0x156/0x1c0 [ 844.150557] ? __local_bh_enable_ip+0x15a/0x270 [ 844.155242] ? _raw_spin_unlock_bh+0x31/0x40 [ 844.159690] inet_sendmsg+0x141/0x5d0 [ 844.163619] ? inet_sendmsg+0x141/0x5d0 [ 844.167609] ? ipip_gro_receive+0x100/0x100 [ 844.171945] sock_sendmsg+0xd7/0x130 [ 844.175683] ___sys_sendmsg+0x803/0x920 [ 844.179687] ? copy_msghdr_from_user+0x430/0x430 [ 844.184472] ? lock_downgrade+0x880/0x880 [ 844.188640] ? kasan_check_read+0x11/0x20 [ 844.192810] ? __fget+0x367/0x540 [ 844.196288] ? __fget_light+0x1a9/0x230 [ 844.200277] ? __fdget+0x1b/0x20 [ 844.203659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.209216] __sys_sendmsg+0x105/0x1d0 [ 844.213313] ? __ia32_sys_shutdown+0x80/0x80 [ 844.217744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 844.222536] __x64_sys_sendmsg+0x78/0xb0 [ 844.226626] ? do_syscall_64+0x5b/0x620 [ 844.230631] do_syscall_64+0xfd/0x620 [ 844.234473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.239689] RIP: 0033:0x45af49 [ 844.242908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.261825] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.269559] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 844.276841] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 844.284123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 844.291409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 844.298697] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:21 executing program 2 (fault-call:3 fault-nth:82): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa215ff7f00000000) 10:24:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5421, 0x3) 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x8e670000}, 0x0) 10:24:21 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xe100000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:21 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5422, 0x3) 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x960a0000}, 0x0) 10:24:21 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5423, 0x3) 10:24:21 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5422, 0x3) 10:24:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa6ae000000000000) 10:24:21 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0xebf0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 844.527183] FAULT_INJECTION: forcing a failure. [ 844.527183] name failslab, interval 1, probability 0, space 0, times 0 [ 844.627720] CPU: 1 PID: 20352 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 844.635586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.644949] Call Trace: [ 844.647554] dump_stack+0x197/0x210 [ 844.651208] should_fail.cold+0xa/0x1b [ 844.655124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 844.660244] ? should_fail+0x14d/0x85c [ 844.664145] ? __nf_conntrack_find_get+0xe45/0x1960 [ 844.669181] __should_failslab+0x121/0x190 [ 844.673438] should_failslab+0x9/0x14 [ 844.677253] __kmalloc_track_caller+0x6d/0x750 [ 844.681858] ? lock_downgrade+0x880/0x880 [ 844.686019] ? nf_ct_ext_add+0x2a9/0x62f [ 844.690101] __krealloc+0x71/0xc0 [ 844.693572] nf_ct_ext_add+0x2a9/0x62f [ 844.697485] init_conntrack+0x5f4/0x1340 [ 844.701569] ? nf_conntrack_alloc+0x50/0x50 [ 844.705911] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 844.710948] nf_conntrack_in+0x98b/0xe90 [ 844.715035] ? nf_conntrack_update+0x990/0x990 [ 844.719633] ? ip6t_error+0x1/0x40 [ 844.723202] ipv6_conntrack_in+0x61/0x90 [ 844.727273] nf_hook_slow+0xbc/0x1e0 [ 844.731006] __ip6_local_out+0x464/0x8a0 [ 844.735079] ? dst_output+0x150/0x150 [ 844.738895] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 844.743233] ? ip6_make_skb+0x370/0x561 [ 844.747229] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.751574] ip6_local_out+0x2d/0x184 [ 844.755385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.760944] ip6_send_skb+0xbb/0x300 [ 844.764681] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 844.769466] ? ip6_dst_lookup_flow+0x220/0x220 [ 844.774071] udpv6_sendmsg+0x22ad/0x2a00 10:24:21 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x96b90000}, 0x0) [ 844.778142] ? ip_reply_glue_bits+0xc0/0xc0 [ 844.782497] ? udp_v6_get_port+0x6b0/0x6b0 [ 844.786746] ? __local_bh_enable_ip+0x15a/0x270 [ 844.791438] ? _raw_spin_unlock_bh+0x31/0x40 [ 844.795863] ? __local_bh_enable_ip+0x15a/0x270 [ 844.800557] ? mark_held_locks+0x100/0x100 [ 844.804809] ? mark_held_locks+0x100/0x100 [ 844.809058] ? _raw_spin_unlock_bh+0x31/0x40 [ 844.813507] ? release_sock+0x156/0x1c0 [ 844.817519] ? __local_bh_enable_ip+0x15a/0x270 [ 844.822313] ? _raw_spin_unlock_bh+0x31/0x40 [ 844.826768] inet_sendmsg+0x141/0x5d0 [ 844.830590] ? inet_sendmsg+0x141/0x5d0 [ 844.834580] ? ipip_gro_receive+0x100/0x100 [ 844.838922] sock_sendmsg+0xd7/0x130 [ 844.842662] ___sys_sendmsg+0x803/0x920 [ 844.846657] ? copy_msghdr_from_user+0x430/0x430 [ 844.851438] ? lock_downgrade+0x880/0x880 [ 844.855606] ? kasan_check_read+0x11/0x20 [ 844.859774] ? __fget+0x367/0x540 [ 844.863268] ? __fget_light+0x1a9/0x230 [ 844.867248] ? __fdget+0x1b/0x20 [ 844.870604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.876136] __sys_sendmsg+0x105/0x1d0 [ 844.880011] ? __ia32_sys_shutdown+0x80/0x80 [ 844.884417] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 844.889160] ? do_syscall_64+0x26/0x620 [ 844.893127] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.898478] ? do_syscall_64+0x26/0x620 [ 844.902458] __x64_sys_sendmsg+0x78/0xb0 [ 844.906508] do_syscall_64+0xfd/0x620 [ 844.910305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.915481] RIP: 0033:0x45af49 [ 844.918661] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.937563] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.945277] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 844.952561] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 844.959825] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 844.967092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:24:22 executing program 2 (fault-call:3 fault-nth:83): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5423, 0x3) 10:24:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xaa05000000000000) 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x9e5c0000}, 0x0) 10:24:22 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5424, 0x3) 10:24:22 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x10000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 844.974354] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5424, 0x3) 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa215ff7f}, 0x0) [ 845.106007] FAULT_INJECTION: forcing a failure. [ 845.106007] name failslab, interval 1, probability 0, space 0, times 0 [ 845.117498] CPU: 1 PID: 20394 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 845.125309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.134680] Call Trace: [ 845.137322] dump_stack+0x197/0x210 [ 845.140982] should_fail.cold+0xa/0x1b [ 845.144898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 845.150035] __should_failslab+0x121/0x190 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5425, 0x3) [ 845.154295] should_failslab+0x9/0x14 [ 845.158110] kmem_cache_alloc+0x47/0x700 [ 845.162190] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 845.167503] ? br_allowed_ingress+0x1630/0x1630 [ 845.172209] skb_clone+0x156/0x3e0 [ 845.175776] deliver_clone+0x46/0xc0 [ 845.179513] br_flood+0x4da/0x710 [ 845.182997] br_dev_xmit+0xeeb/0x1490 [ 845.186817] ? br_poll_controller+0x10/0x10 [ 845.191153] ? __lock_is_held+0xb6/0x140 [ 845.195263] dev_hard_start_xmit+0x1a5/0x970 [ 845.199690] ? check_preemption_disabled+0x48/0x290 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa6ae0000}, 0x0) [ 845.204764] __dev_queue_xmit+0x2704/0x2fe0 [ 845.209101] ? mark_held_locks+0x100/0x100 [ 845.213367] ? netdev_pick_tx+0x300/0x300 [ 845.217539] ? ip6_fragment+0x2a6a/0x3770 [ 845.221722] ? find_held_lock+0x35/0x130 [ 845.225806] ? ip6_fragment+0x2a6a/0x3770 [ 845.230096] ? ip6_finish_output2+0x1790/0x2560 [ 845.234786] ? ip6_fragment+0x2a6a/0x3770 [ 845.238955] ? ip6_finish_output2+0x1790/0x2560 [ 845.243669] dev_queue_xmit+0x18/0x20 [ 845.247487] ? dev_queue_xmit+0x18/0x20 [ 845.251481] ip6_finish_output2+0x1309/0x2560 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5427, 0x3) [ 845.256004] ? ip6_copy_metadata+0xd10/0xd10 [ 845.260440] ? ip6_copy_metadata+0x89e/0xd10 [ 845.264879] ? ip6_forward_finish+0x4d0/0x4d0 [ 845.269392] ? kasan_check_read+0x11/0x20 [ 845.273577] ip6_fragment+0x2a6a/0x3770 [ 845.277566] ? ip6_fragment+0x2a6a/0x3770 [ 845.281737] ? ip6_copy_metadata+0xd10/0xd10 [ 845.286169] ? ip6_forward+0x34f0/0x34f0 [ 845.290365] ? kasan_check_read+0x11/0x20 [ 845.294585] ip6_finish_output+0x6a7/0xbe0 [ 845.298847] ip6_output+0x235/0x7c0 [ 845.302503] ? ip6_finish_output+0xbe0/0xbe0 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xa8050000}, 0x0) [ 845.306938] ? ip6_fragment+0x3770/0x3770 [ 845.311104] ? ip6_make_skb+0x370/0x561 [ 845.315104] ? ip_reply_glue_bits+0xc0/0xc0 [ 845.319448] ip6_local_out+0xbb/0x184 [ 845.323551] ip6_send_skb+0xbb/0x300 [ 845.327319] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 845.332097] ? ip6_dst_lookup_flow+0x220/0x220 [ 845.336701] udpv6_sendmsg+0x22ad/0x2a00 [ 845.340800] ? ip_reply_glue_bits+0xc0/0xc0 [ 845.345150] ? udp_v6_get_port+0x6b0/0x6b0 [ 845.349407] ? __local_bh_enable_ip+0x15a/0x270 [ 845.354091] ? _raw_spin_unlock_bh+0x31/0x40 [ 845.358514] ? __local_bh_enable_ip+0x15a/0x270 [ 845.363204] ? mark_held_locks+0x100/0x100 [ 845.367461] ? mark_held_locks+0x100/0x100 [ 845.371903] ? _raw_spin_unlock_bh+0x31/0x40 [ 845.376437] ? release_sock+0x156/0x1c0 [ 845.380451] ? __local_bh_enable_ip+0x15a/0x270 [ 845.385142] ? _raw_spin_unlock_bh+0x31/0x40 [ 845.389578] inet_sendmsg+0x141/0x5d0 [ 845.393396] ? inet_sendmsg+0x141/0x5d0 [ 845.397389] ? ipip_gro_receive+0x100/0x100 [ 845.401730] sock_sendmsg+0xd7/0x130 [ 845.405459] ___sys_sendmsg+0x803/0x920 [ 845.409452] ? copy_msghdr_from_user+0x430/0x430 [ 845.414228] ? lock_downgrade+0x880/0x880 [ 845.418396] ? kasan_check_read+0x11/0x20 [ 845.422562] ? __fget+0x367/0x540 [ 845.426046] ? __fget_light+0x1a9/0x230 [ 845.430124] ? __fdget+0x1b/0x20 [ 845.433507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.439069] __sys_sendmsg+0x105/0x1d0 [ 845.442975] ? __ia32_sys_shutdown+0x80/0x80 [ 845.447421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.452197] ? do_syscall_64+0x26/0x620 [ 845.456189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.461569] ? do_syscall_64+0x26/0x620 [ 845.465563] __x64_sys_sendmsg+0x78/0xb0 [ 845.469648] do_syscall_64+0xfd/0x620 [ 845.473473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.478671] RIP: 0033:0x45af49 [ 845.481879] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:24:22 executing program 2 (fault-call:3 fault-nth:84): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5428, 0x3) 10:24:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xae51000000000000) 10:24:22 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5425, 0x3) 10:24:22 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x11000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xae510000}, 0x0) [ 845.503575] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 845.511277] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 845.518552] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 845.525824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 845.533097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 845.540422] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:22 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5427, 0x3) 10:24:22 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5429, 0x3) 10:24:22 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xb6a30000}, 0x0) [ 845.739490] FAULT_INJECTION: forcing a failure. [ 845.739490] name failslab, interval 1, probability 0, space 0, times 0 [ 845.750909] CPU: 0 PID: 20430 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 845.758717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.768084] Call Trace: [ 845.770693] dump_stack+0x197/0x210 [ 845.774346] should_fail.cold+0xa/0x1b [ 845.778256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 845.783384] ? retint_kernel+0x2d/0x2d 10:24:23 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5428, 0x3) [ 845.787290] __should_failslab+0x121/0x190 [ 845.791541] should_failslab+0x9/0x14 [ 845.795364] kmem_cache_alloc+0x47/0x700 [ 845.799435] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 845.804297] ? br_allowed_ingress+0x1630/0x1630 [ 845.808991] skb_clone+0x156/0x3e0 [ 845.812549] deliver_clone+0x46/0xc0 [ 845.816280] br_flood+0x4da/0x710 [ 845.819755] br_dev_xmit+0xeeb/0x1490 [ 845.823567] ? br_poll_controller+0x10/0x10 [ 845.827900] ? __lock_is_held+0xb6/0x140 [ 845.831992] dev_hard_start_xmit+0x1a5/0x970 10:24:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xb6a3000000000000) 10:24:23 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5437, 0x3) [ 845.836415] ? check_preemption_disabled+0x48/0x290 [ 845.841462] __dev_queue_xmit+0x2704/0x2fe0 [ 845.845800] ? mark_held_locks+0x100/0x100 [ 845.850049] ? trace_hardirqs_on_caller+0x6a/0x220 [ 845.855003] ? netdev_pick_tx+0x300/0x300 [ 845.859169] ? trace_hardirqs_on_caller+0x6a/0x220 [ 845.864124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.868898] ? retint_kernel+0x2d/0x2d [ 845.872814] dev_queue_xmit+0x18/0x20 [ 845.876640] ? dev_queue_xmit+0x18/0x20 [ 845.880642] ip6_finish_output2+0x1309/0x2560 [ 845.885163] ? ip6_copy_metadata+0xd10/0xd10 [ 845.889587] ? ip6_copy_metadata+0x89e/0xd10 [ 845.894024] ? ip6_forward_finish+0x4d0/0x4d0 [ 845.898546] ip6_fragment+0x2a6a/0x3770 [ 845.902623] ? ip6_fragment+0x2a6a/0x3770 [ 845.906889] ? ip6_copy_metadata+0xd10/0xd10 [ 845.911415] ? ip6_forward+0x34f0/0x34f0 [ 845.915498] ? ip6_mtu+0xb9/0x460 [ 845.918980] ip6_finish_output+0x6a7/0xbe0 [ 845.923262] ip6_output+0x235/0x7c0 [ 845.926910] ? ip6_finish_output+0xbe0/0xbe0 [ 845.931340] ? ip6_fragment+0x3770/0x3770 [ 845.935516] ip6_local_out+0xbb/0x184 [ 845.939344] ip6_send_skb+0xbb/0x300 [ 845.943077] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 845.947330] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 3 [ 845.948113] udpv6_sendmsg+0x22ad/0x2a00 [ 845.948128] ? retint_kernel+0x2d/0x2d [ 845.948147] ? ip_reply_glue_bits+0xc0/0xc0 [ 845.948166] ? udp_v6_get_port+0x6b0/0x6b0 [ 845.948183] ? __local_bh_enable_ip+0x15a/0x270 [ 845.948194] ? _raw_spin_unlock_bh+0x31/0x40 [ 845.948205] ? __local_bh_enable_ip+0x15a/0x270 [ 845.948221] ? mark_held_locks+0x100/0x100 [ 845.948233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.948245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.948257] ? lockdep_hardirqs_on+0x415/0x5d0 [ 845.948267] ? retint_kernel+0x2d/0x2d [ 845.948279] ? trace_hardirqs_on_caller+0x6a/0x220 [ 845.948301] ? __local_bh_enable_ip+0x18e/0x270 [ 845.948313] ? _raw_spin_unlock_bh+0x31/0x40 [ 845.948328] inet_sendmsg+0x141/0x5d0 [ 845.948339] ? inet_sendmsg+0x141/0x5d0 [ 845.948351] ? ipip_gro_receive+0x100/0x100 [ 845.948364] sock_sendmsg+0xd7/0x130 [ 845.948378] ___sys_sendmsg+0x803/0x920 [ 845.948392] ? copy_msghdr_from_user+0x430/0x430 [ 845.948406] ? lock_downgrade+0x880/0x880 [ 845.948419] ? kasan_check_read+0x11/0x20 [ 845.948432] ? __fget+0x367/0x540 [ 845.948446] ? retint_kernel+0x2d/0x2d [ 845.948458] ? __fget_light+0x1a9/0x230 [ 845.948470] ? __fdget+0x1b/0x20 [ 845.948481] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.948492] __sys_sendmsg+0x105/0x1d0 [ 845.948502] ? __ia32_sys_shutdown+0x80/0x80 [ 845.948519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 845.948531] ? do_syscall_64+0x26/0x620 [ 845.948542] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.948553] ? do_syscall_64+0x26/0x620 [ 845.948564] __x64_sys_sendmsg+0x78/0xb0 [ 845.948577] do_syscall_64+0xfd/0x620 [ 845.948589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.948598] RIP: 0033:0x45af49 [ 845.948610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.948616] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 845.948628] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 845.948635] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 845.948641] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 845.948647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 845.948654] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 [ 846.182147] [ 846.182151] ====================================================== [ 846.182154] WARNING: possible circular locking dependency detected [ 846.182156] 4.19.95-syzkaller #0 Not tainted [ 846.182160] ------------------------------------------------------ [ 846.182163] syz-executor.0/20443 is trying to acquire lock: [ 846.182165] 00000000dcf4b214 (console_owner){-.-.}, at: vprintk_emit+0x3d5/0x6d0 [ 846.182173] [ 846.182176] but task is already holding lock: [ 846.182178] 000000008511e674 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 846.182186] [ 846.182189] which lock already depends on the new lock. [ 846.182190] [ 846.182192] [ 846.182195] the existing dependency chain (in reverse order) is: [ 846.182196] [ 846.182197] -> #2 (&(&port->lock)->rlock){-.-.}: [ 846.182206] _raw_spin_lock_irqsave+0x95/0xcd [ 846.182208] tty_port_tty_get+0x22/0x90 [ 846.182210] tty_port_default_wakeup+0x16/0x40 [ 846.182213] tty_port_tty_wakeup+0x57/0x70 [ 846.182215] uart_write_wakeup+0x46/0x70 [ 846.182218] serial8250_tx_chars+0x495/0xaf0 [ 846.182221] serial8250_handle_irq.part.0+0x261/0x2b0 [ 846.182224] serial8250_default_handle_irq+0xc0/0x150 [ 846.182226] serial8250_interrupt+0xfc/0x1e0 [ 846.182229] __handle_irq_event_percpu+0x144/0x8f0 [ 846.182232] handle_irq_event_percpu+0x74/0x160 [ 846.182234] handle_irq_event+0xa7/0x134 [ 846.182236] handle_edge_irq+0x25e/0x8d0 [ 846.182238] handle_irq+0x39/0x50 [ 846.182241] do_IRQ+0x99/0x1d0 [ 846.182243] ret_from_intr+0x0/0x1e [ 846.182245] native_safe_halt+0xe/0x10 [ 846.182247] arch_cpu_idle+0xa/0x10 [ 846.182250] default_idle_call+0x36/0x90 [ 846.182252] do_idle+0x30c/0x4d0 [ 846.182254] cpu_startup_entry+0xc8/0xe0 [ 846.182257] start_secondary+0x3e8/0x5b0 [ 846.182259] secondary_startup_64+0xa4/0xb0 [ 846.182260] [ 846.182262] -> #1 (&port_lock_key){-.-.}: [ 846.182269] _raw_spin_lock_irqsave+0x95/0xcd [ 846.182272] serial8250_console_write+0x7ca/0x9f0 [ 846.182275] univ8250_console_write+0x5f/0x70 [ 846.182277] console_unlock+0xbdf/0x10d0 [ 846.182279] vprintk_emit+0x280/0x6d0 [ 846.182282] vprintk_default+0x28/0x30 [ 846.182284] vprintk_func+0x7e/0x189 [ 846.182286] printk+0xba/0xed [ 846.182288] register_console+0x77f/0xb90 [ 846.182291] univ8250_console_init+0x3e/0x4b [ 846.182293] console_init+0x4f7/0x761 [ 846.182296] start_kernel+0x59c/0x8c5 [ 846.182298] x86_64_start_reservations+0x29/0x2b [ 846.182301] x86_64_start_kernel+0x77/0x7b [ 846.182303] secondary_startup_64+0xa4/0xb0 [ 846.182304] [ 846.182305] -> #0 (console_owner){-.-.}: [ 846.182313] lock_acquire+0x16f/0x3f0 [ 846.182315] vprintk_emit+0x412/0x6d0 [ 846.182318] vprintk_default+0x28/0x30 [ 846.182320] vprintk_func+0x7e/0x189 [ 846.182322] printk+0xba/0xed [ 846.182325] tty_port_close_start.part.0+0x51a/0x570 [ 846.182327] tty_port_close+0x4e/0xf0 [ 846.182329] tpk_close+0x83/0x95 [ 846.182332] tty_release+0x3ba/0xe90 [ 846.182334] __fput+0x2dd/0x8b0 [ 846.182336] ____fput+0x16/0x20 [ 846.182338] task_work_run+0x145/0x1c0 [ 846.182341] exit_to_usermode_loop+0x273/0x2c0 [ 846.182343] do_syscall_64+0x53d/0x620 [ 846.182346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.182347] [ 846.182350] other info that might help us debug this: [ 846.182351] [ 846.182353] Chain exists of: [ 846.182354] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 846.182364] [ 846.182366] Possible unsafe locking scenario: [ 846.182368] [ 846.182370] CPU0 CPU1 [ 846.182372] ---- ---- [ 846.182374] lock(&(&port->lock)->rlock); [ 846.182379] lock(&port_lock_key); [ 846.182385] lock(&(&port->lock)->rlock); [ 846.182389] lock(console_owner); [ 846.182393] [ 846.182395] *** DEADLOCK *** [ 846.182397] [ 846.182399] 2 locks held by syz-executor.0/20443: [ 846.182400] #0: 0000000087032de3 (&tty->legacy_mutex){+.+.}, at: tty_lock+0x73/0xb0 [ 846.182410] #1: 000000008511e674 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 846.182420] [ 846.182422] stack backtrace: [ 846.182426] CPU: 1 PID: 20443 Comm: syz-executor.0 Not tainted 4.19.95-syzkaller #0 [ 846.182431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.182432] Call Trace: [ 846.182435] dump_stack+0x197/0x210 [ 846.182437] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 846.182440] __lock_acquire+0x2e19/0x49c0 [ 846.182442] ? mark_held_locks+0x100/0x100 [ 846.182444] ? find_held_lock+0x35/0x130 [ 846.182447] ? kvm_sched_clock_read+0x9/0x20 [ 846.182449] ? vprintk_emit+0x3ed/0x6d0 [ 846.182452] ? trace_hardirqs_off+0x62/0x220 [ 846.182454] lock_acquire+0x16f/0x3f0 [ 846.182456] ? vprintk_emit+0x3d5/0x6d0 [ 846.182459] vprintk_emit+0x412/0x6d0 [ 846.182461] ? vprintk_emit+0x3d5/0x6d0 [ 846.182463] vprintk_default+0x28/0x30 [ 846.182465] vprintk_func+0x7e/0x189 [ 846.182467] printk+0xba/0xed [ 846.182474] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 846.182476] ? kasan_check_write+0x14/0x20 [ 846.182479] ? do_raw_spin_lock+0xd7/0x250 [ 846.182481] tty_port_close_start.part.0+0x51a/0x570 [ 846.182484] tty_port_close+0x4e/0xf0 [ 846.182486] tpk_close+0x83/0x95 [ 846.182488] ? tpk_write+0x340/0x340 [ 846.182490] tty_release+0x3ba/0xe90 [ 846.182492] ? ima_file_free+0xc9/0x4a0 [ 846.182495] ? tty_release_struct+0x50/0x50 [ 846.182497] __fput+0x2dd/0x8b0 [ 846.182499] ____fput+0x16/0x20 [ 846.182501] task_work_run+0x145/0x1c0 [ 846.182504] exit_to_usermode_loop+0x273/0x2c0 [ 846.182506] do_syscall_64+0x53d/0x620 [ 846.182509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.182511] RIP: 0033:0x414ae1 [ 846.182519] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 846.182522] RSP: 002b:00007fffc0e3e5f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 846.182528] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000414ae1 [ 846.182532] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 0000000000000003 10:24:24 executing program 2 (fault-call:3 fault-nth:85): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xbe46000000000000) 10:24:24 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5429, 0x3) 10:24:24 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x16620000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xbe460000}, 0x0) [ 846.182535] RBP: 0000000000000000 R08: 0000000000760120 R09: ffffffffffffffff [ 846.182539] R10: 00007fffc0e3e6c0 R11: 0000000000000293 R12: 000000000075bf20 [ 846.182543] R13: 0000000000000003 R14: 0000000000760128 R15: 000000000075bf2c 10:24:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5441, 0x3) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xc6980000}, 0x0) 10:24:24 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5437, 0x3) 10:24:24 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1e050000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xc698000000000000) [ 846.940274] FAULT_INJECTION: forcing a failure. [ 846.940274] name failslab, interval 1, probability 0, space 0, times 0 [ 846.974939] CPU: 1 PID: 20460 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 846.982784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.992148] Call Trace: [ 846.994756] dump_stack+0x197/0x210 [ 846.998406] should_fail.cold+0xa/0x1b [ 847.001363] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 2 [ 847.002306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 847.015282] ? lock_downgrade+0x880/0x880 [ 847.019450] __should_failslab+0x121/0x190 [ 847.023700] should_failslab+0x9/0x14 [ 847.027517] kmem_cache_alloc_node_trace+0x274/0x720 [ 847.032643] ? kasan_unpoison_shadow+0x35/0x50 [ 847.037877] ? kasan_kmalloc+0xce/0xf0 [ 847.041776] __kmalloc_node_track_caller+0x3d/0x80 [ 847.046720] __kmalloc_reserve.isra.0+0x40/0xf0 [ 847.051398] __alloc_skb+0x10b/0x5f0 [ 847.055733] ? skb_trim+0x190/0x190 [ 847.059381] __ip6_append_data.isra.0+0x23c1/0x2fc0 [ 847.064408] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.068740] ? ip6_setup_cork+0x1860/0x1860 [ 847.073075] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 847.077929] ? lock_downgrade+0x880/0x880 [ 847.082092] ip6_make_skb+0x32f/0x561 [ 847.085987] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.090318] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.095698] ? ip6_push_pending_frames+0xf0/0xf0 [ 847.100472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 847.105276] ? retint_kernel+0x2d/0x2d [ 847.109187] udpv6_sendmsg+0x225b/0x2a00 [ 847.113275] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.117733] ? udp_v6_get_port+0x6b0/0x6b0 [ 847.121988] ? trace_hardirqs_on+0x67/0x220 [ 847.126326] ? mark_held_locks+0x100/0x100 [ 847.130575] ? mark_held_locks+0x100/0x100 [ 847.134814] ? _raw_spin_unlock_bh+0x31/0x40 10:24:24 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5441, 0x3) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xce3b0000}, 0x0) [ 847.139234] ? retint_kernel+0x2d/0x2d [ 847.143131] ? trace_hardirqs_on_caller+0x6a/0x220 [ 847.148180] ? __local_bh_enable_ip+0x18e/0x270 [ 847.152868] ? _raw_spin_unlock_bh+0x31/0x40 [ 847.157297] inet_sendmsg+0x141/0x5d0 [ 847.161112] ? inet_sendmsg+0x141/0x5d0 [ 847.165097] ? ipip_gro_receive+0x100/0x100 [ 847.169439] sock_sendmsg+0xd7/0x130 [ 847.173165] ___sys_sendmsg+0x803/0x920 [ 847.177167] ? copy_msghdr_from_user+0x430/0x430 [ 847.181937] ? lock_downgrade+0x880/0x880 [ 847.186091] ? __fget+0x9d/0x540 [ 847.189465] ? __fget+0x367/0x540 [ 847.192937] ? __fget_light+0x1a9/0x230 [ 847.196925] ? __fdget+0x1b/0x20 [ 847.200305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.207497] __sys_sendmsg+0x105/0x1d0 [ 847.211395] ? __ia32_sys_shutdown+0x80/0x80 [ 847.215829] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 847.221215] __x64_sys_sendmsg+0x78/0xb0 [ 847.225290] do_syscall_64+0xfd/0x620 [ 847.229103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.234297] RIP: 0033:0x45af49 [ 847.237498] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.256492] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.264185] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 847.271441] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 847.278697] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:24:24 executing program 2 (fault-call:3 fault-nth:86): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:24 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x1eb40000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5450, 0x3) 10:24:24 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5450, 0x3) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xd68d0000}, 0x0) 10:24:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xce3b000000000000) [ 847.285967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 847.293222] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5451, 0x3) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xde300000}, 0x0) [ 847.438685] FAULT_INJECTION: forcing a failure. [ 847.438685] name failslab, interval 1, probability 0, space 0, times 0 [ 847.450058] CPU: 0 PID: 20508 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 847.457872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.467232] Call Trace: [ 847.469836] dump_stack+0x197/0x210 [ 847.473493] should_fail.cold+0xa/0x1b [ 847.477400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 847.482512] ? ipv6_mc_check_mld+0x996/0xdd0 [ 847.486938] __should_failslab+0x121/0x190 [ 847.491183] should_failslab+0x9/0x14 [ 847.494981] kmem_cache_alloc+0x47/0x700 [ 847.499058] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 847.504262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.509813] ? br_allowed_ingress+0x1630/0x1630 [ 847.514497] skb_clone+0x156/0x3e0 [ 847.518052] deliver_clone+0x46/0xc0 [ 847.521781] br_flood+0x4da/0x710 [ 847.525252] br_dev_xmit+0xeeb/0x1490 [ 847.529072] ? br_poll_controller+0x10/0x10 [ 847.533405] ? netif_skb_features+0x6d1/0xbb0 10:24:24 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5452, 0x3) 10:24:24 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xe6820000}, 0x0) 10:24:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xd68d000000000000) 10:24:24 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5451, 0x3) [ 847.537916] ? netdev_set_sb_channel+0xe0/0xe0 [ 847.542581] ? validate_xmit_xfrm+0x1f7/0xda0 [ 847.547094] ? retint_kernel+0x2d/0x2d [ 847.551007] dev_hard_start_xmit+0x1a5/0x970 [ 847.555433] ? check_preemption_disabled+0x48/0x290 [ 847.560472] __dev_queue_xmit+0x2704/0x2fe0 [ 847.564808] ? mark_held_locks+0x100/0x100 [ 847.569061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 847.573838] ? netdev_pick_tx+0x300/0x300 [ 847.578009] ? lock_downgrade+0x880/0x880 [ 847.582194] ? lock_acquire+0x16f/0x3f0 [ 847.586190] ? ip6_fragment+0x2a6a/0x3770 [ 847.590352] dev_queue_xmit+0x18/0x20 [ 847.594159] ? dev_queue_xmit+0x18/0x20 [ 847.598150] ip6_finish_output2+0x1309/0x2560 [ 847.602672] ? ip6_copy_metadata+0xd10/0xd10 [ 847.607093] ? ip6_copy_metadata+0x89e/0xd10 [ 847.611514] ? ip6_forward_finish+0x4d0/0x4d0 [ 847.616028] ip6_fragment+0x2a6a/0x3770 [ 847.620280] ? ip6_fragment+0x2a6a/0x3770 [ 847.624446] ? ip6_copy_metadata+0xd10/0xd10 [ 847.628874] ? ip6_forward+0x34f0/0x34f0 [ 847.632947] ? write_comp_data+0x1e/0x70 [ 847.637033] ip6_finish_output+0x6a7/0xbe0 [ 847.641284] ip6_output+0x235/0x7c0 [ 847.644933] ? ip6_finish_output+0xbe0/0xbe0 [ 847.649359] ? ip6_fragment+0x3770/0x3770 [ 847.653518] ? ip6_make_skb+0x370/0x561 [ 847.657507] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.661842] ip6_local_out+0xbb/0x184 [ 847.665663] ip6_send_skb+0xbb/0x300 [ 847.669399] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 847.674174] ? ip6_dst_lookup_flow+0x220/0x220 [ 847.678777] udpv6_sendmsg+0x22ad/0x2a00 [ 847.682849] ? retint_kernel+0x2d/0x2d [ 847.686754] ? ip_reply_glue_bits+0xc0/0xc0 [ 847.691265] ? udp_v6_get_port+0x6b0/0x6b0 [ 847.695527] ? trace_hardirqs_on+0x67/0x220 [ 847.699868] ? mark_held_locks+0x100/0x100 [ 847.704118] ? mark_held_locks+0x100/0x100 [ 847.708360] ? _raw_spin_unlock_bh+0x31/0x40 [ 847.713251] ? retint_kernel+0x2d/0x2d [ 847.717148] ? trace_hardirqs_on_caller+0x6a/0x220 [ 847.722101] ? __local_bh_enable_ip+0x15a/0x270 [ 847.726768] ? _raw_spin_unlock_bh+0x31/0x40 [ 847.731197] inet_sendmsg+0x141/0x5d0 [ 847.735010] ? inet_sendmsg+0x141/0x5d0 [ 847.739002] ? ipip_gro_receive+0x100/0x100 [ 847.743389] sock_sendmsg+0xd7/0x130 [ 847.747089] ___sys_sendmsg+0x803/0x920 [ 847.751057] ? copy_msghdr_from_user+0x430/0x430 [ 847.755798] ? lock_downgrade+0x880/0x880 [ 847.759930] ? __fget+0x9d/0x540 [ 847.763285] ? __fget+0x367/0x540 [ 847.766741] ? __fget_light+0x1a9/0x230 [ 847.770700] ? __fdget+0x1b/0x20 [ 847.774104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.779638] __sys_sendmsg+0x105/0x1d0 [ 847.783511] ? __ia32_sys_shutdown+0x80/0x80 [ 847.787918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 847.792673] __x64_sys_sendmsg+0x78/0xb0 [ 847.796718] do_syscall_64+0xfd/0x620 [ 847.800627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.805797] RIP: 0033:0x45af49 [ 847.808988] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.827895] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:25 executing program 2 (fault-call:3 fault-nth:87): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x20000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x545d, 0x3) 10:24:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xde30000000000000) 10:24:25 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xee250000}, 0x0) 10:24:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5452, 0x3) [ 847.835611] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 847.842868] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 847.850124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 847.857379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 847.864695] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:25 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x20000180, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x545d, 0x3) 10:24:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5460, 0x3) [ 848.001656] FAULT_INJECTION: forcing a failure. [ 848.001656] name failslab, interval 1, probability 0, space 0, times 0 [ 848.013066] CPU: 0 PID: 20548 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 848.020875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.030337] Call Trace: [ 848.032947] dump_stack+0x197/0x210 [ 848.036598] should_fail.cold+0xa/0x1b [ 848.040512] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 848.045639] ? br_fdb_add.cold+0x8a/0x8a 10:24:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40049409, 0x3) 10:24:25 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x26570000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5460, 0x3) [ 848.049721] __should_failslab+0x121/0x190 [ 848.053970] should_failslab+0x9/0x14 [ 848.057774] kmem_cache_alloc+0x47/0x700 [ 848.061843] ? br_allowed_ingress+0x1630/0x1630 [ 848.066531] skb_clone+0x156/0x3e0 [ 848.070082] deliver_clone+0x46/0xc0 [ 848.073808] br_flood+0x4da/0x710 [ 848.077272] br_dev_xmit+0xeeb/0x1490 [ 848.081086] ? br_poll_controller+0x10/0x10 [ 848.085425] ? dev_hard_start_xmit+0xde/0x970 [ 848.089930] dev_hard_start_xmit+0x1a5/0x970 [ 848.094353] ? check_preemption_disabled+0x48/0x290 [ 848.099392] __dev_queue_xmit+0x2704/0x2fe0 [ 848.103729] ? mark_held_locks+0x100/0x100 [ 848.107981] ? netdev_pick_tx+0x300/0x300 [ 848.112145] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 848.116924] ? ip6_finish_output2+0x21b/0x2560 [ 848.121528] ? lock_downgrade+0x880/0x880 [ 848.125690] ? lock_acquire+0x16f/0x3f0 [ 848.129682] ? ip6_fragment+0x2a6a/0x3770 [ 848.133844] dev_queue_xmit+0x18/0x20 [ 848.137656] ? dev_queue_xmit+0x18/0x20 [ 848.141649] ip6_finish_output2+0x1309/0x2560 [ 848.146164] ? ip6_copy_metadata+0xd10/0xd10 [ 848.150589] ? ip6_copy_metadata+0x89e/0xd10 [ 848.155015] ? ip6_forward_finish+0x4d0/0x4d0 [ 848.159532] ip6_fragment+0x2a6a/0x3770 [ 848.163629] ? ip6_fragment+0x2a6a/0x3770 [ 848.167793] ? ip6_copy_metadata+0xd10/0xd10 [ 848.172219] ? ip6_forward+0x34f0/0x34f0 [ 848.176298] ip6_finish_output+0x6a7/0xbe0 [ 848.180545] ip6_output+0x235/0x7c0 [ 848.184454] ? ip6_finish_output+0xbe0/0xbe0 [ 848.188878] ? ip6_fragment+0x3770/0x3770 [ 848.193038] ? trace_hardirqs_off+0x59/0x220 [ 848.197485] ip6_local_out+0xbb/0x184 [ 848.201323] ip6_send_skb+0xbb/0x300 [ 848.205078] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 848.209877] ? ip6_dst_lookup_flow+0x220/0x220 [ 848.214525] udpv6_sendmsg+0x22ad/0x2a00 [ 848.218635] ? ip_reply_glue_bits+0xc0/0xc0 [ 848.223020] ? udp_v6_get_port+0x6b0/0x6b0 [ 848.227324] ? trace_hardirqs_on+0x67/0x220 [ 848.231738] ? mark_held_locks+0x100/0x100 [ 848.236031] ? mark_held_locks+0x100/0x100 [ 848.240316] ? _raw_spin_unlock_bh+0x31/0x40 [ 848.244781] ? udp_lib_get_port+0x876/0x19f0 [ 848.249256] ? __local_bh_enable_ip+0x15a/0x270 [ 848.253983] ? _raw_spin_unlock_bh+0x31/0x40 [ 848.258429] inet_sendmsg+0x141/0x5d0 [ 848.262388] ? inet_sendmsg+0x141/0x5d0 [ 848.266350] ? ipip_gro_receive+0x100/0x100 [ 848.270675] sock_sendmsg+0xd7/0x130 [ 848.274381] ___sys_sendmsg+0x803/0x920 [ 848.278357] ? copy_msghdr_from_user+0x430/0x430 [ 848.283107] ? lock_downgrade+0x880/0x880 [ 848.287237] ? __fget+0x9d/0x540 [ 848.290804] ? __fget+0x367/0x540 [ 848.294245] ? __fget_light+0x1a9/0x230 [ 848.298204] ? __fdget+0x1b/0x20 [ 848.301557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 848.307087] __sys_sendmsg+0x105/0x1d0 [ 848.310968] ? __ia32_sys_shutdown+0x80/0x80 [ 848.315369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 848.320731] __x64_sys_sendmsg+0x78/0xb0 [ 848.324780] do_syscall_64+0xfd/0x620 [ 848.328687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.333860] RIP: 0033:0x45af49 10:24:25 executing program 2 (fault-call:3 fault-nth:88): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xeed40000}, 0x0) 10:24:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40086602, 0x3) 10:24:25 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x2ea90000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40049409, 0x3) 10:24:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xe682000000000000) [ 848.337069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.356547] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 848.364249] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 848.371505] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 848.378760] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 848.386016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 848.393296] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xee25000000000000) 10:24:25 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xf5ffffff}, 0x0) 10:24:25 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40087602, 0x3) 10:24:25 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40086602, 0x3) 10:24:25 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x364c0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 848.591254] FAULT_INJECTION: forcing a failure. [ 848.591254] name failslab, interval 1, probability 0, space 0, times 0 [ 848.602594] CPU: 0 PID: 20586 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 848.610397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.619773] Call Trace: [ 848.622382] dump_stack+0x197/0x210 [ 848.626031] should_fail.cold+0xa/0x1b [ 848.629936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 848.635055] ? retint_kernel+0x2d/0x2d 10:24:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xeed4000000000000) [ 848.638960] __should_failslab+0x121/0x190 [ 848.643210] should_failslab+0x9/0x14 [ 848.647022] kmem_cache_alloc+0x47/0x700 [ 848.651095] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 848.656306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 848.661863] ? br_allowed_ingress+0x1630/0x1630 [ 848.666541] skb_clone+0x156/0x3e0 [ 848.670095] deliver_clone+0x46/0xc0 [ 848.673871] br_flood+0x4da/0x710 [ 848.677339] br_dev_xmit+0xeeb/0x1490 [ 848.681154] ? br_poll_controller+0x10/0x10 [ 848.685481] ? netif_skb_features+0x6d1/0xbb0 [ 848.689977] ? fib_rules_lookup+0x48a/0xc80 [ 848.694306] ? netdev_set_sb_channel+0xe0/0xe0 [ 848.698923] ? validate_xmit_xfrm+0x1f7/0xda0 [ 848.703437] ? fib_rules_net_exit+0x60/0x60 [ 848.707884] dev_hard_start_xmit+0x1a5/0x970 [ 848.712309] ? check_preemption_disabled+0x48/0x290 [ 848.717344] __dev_queue_xmit+0x2704/0x2fe0 [ 848.721691] ? mark_held_locks+0x100/0x100 [ 848.725941] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 848.730715] ? netdev_pick_tx+0x300/0x300 [ 848.734876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.740607] ? lock_downgrade+0x880/0x880 [ 848.744771] ? lock_acquire+0x16f/0x3f0 [ 848.748761] ? ip6_fragment+0x2a6a/0x3770 [ 848.752926] dev_queue_xmit+0x18/0x20 [ 848.756739] ? dev_queue_xmit+0x18/0x20 [ 848.760817] ip6_finish_output2+0x1309/0x2560 [ 848.765332] ? ip6_copy_metadata+0xd10/0xd10 [ 848.769753] ? ip6_copy_metadata+0x89e/0xd10 [ 848.774179] ? ip6_forward_finish+0x4d0/0x4d0 [ 848.778694] ip6_fragment+0x2a6a/0x3770 [ 848.782682] ? ip6_fragment+0x2a6a/0x3770 [ 848.786848] ? ip6_copy_metadata+0xd10/0xd10 [ 848.791273] ? ip6_forward+0x34f0/0x34f0 [ 848.795351] ? ip6_mtu+0xb9/0x460 [ 848.798863] ip6_finish_output+0x6a7/0xbe0 [ 848.803084] ip6_output+0x235/0x7c0 [ 848.806700] ? ip6_finish_output+0xbe0/0xbe0 [ 848.811151] ? ip6_fragment+0x3770/0x3770 [ 848.815329] ip6_local_out+0xbb/0x184 [ 848.819116] ip6_send_skb+0xbb/0x300 [ 848.822817] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 848.827560] ? ip6_dst_lookup_flow+0x220/0x220 [ 848.832189] udpv6_sendmsg+0x22ad/0x2a00 [ 848.836242] ? ip_reply_glue_bits+0xc0/0xc0 [ 848.840549] ? udp_v6_get_port+0x6b0/0x6b0 [ 848.844783] ? trace_hardirqs_on+0x67/0x220 [ 848.849222] ? mark_held_locks+0x100/0x100 [ 848.853467] ? mark_held_locks+0x100/0x100 [ 848.857703] ? _raw_spin_unlock_bh+0x31/0x40 [ 848.862206] ? udp_lib_get_port+0x876/0x19f0 [ 848.866616] ? __local_bh_enable_ip+0x15a/0x270 [ 848.871288] ? _raw_spin_unlock_bh+0x31/0x40 [ 848.875687] inet_sendmsg+0x141/0x5d0 [ 848.879472] ? inet_sendmsg+0x141/0x5d0 [ 848.883442] ? ipip_gro_receive+0x100/0x100 [ 848.887772] sock_sendmsg+0xd7/0x130 [ 848.891506] ___sys_sendmsg+0x803/0x920 [ 848.895501] ? copy_msghdr_from_user+0x430/0x430 [ 848.900263] ? lock_downgrade+0x880/0x880 [ 848.904404] ? __fget+0x233/0x540 [ 848.907878] ? __fget+0x367/0x540 [ 848.911333] ? __fget_light+0x1a9/0x230 [ 848.915342] ? __fdget+0x1b/0x20 [ 848.918695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 848.924222] __sys_sendmsg+0x105/0x1d0 [ 848.928107] ? __ia32_sys_shutdown+0x80/0x80 [ 848.932518] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 848.937882] __x64_sys_sendmsg+0x78/0xb0 [ 848.941932] do_syscall_64+0xfd/0x620 [ 848.945738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.950927] RIP: 0033:0x45af49 [ 848.954121] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 848.973013] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 848.980708] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 10:24:26 executing program 2 (fault-call:3 fault-nth:89): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:26 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xf6770000}, 0x0) 10:24:26 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3e9e0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4020940d, 0x3) 10:24:26 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x40087602, 0x3) 10:24:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf5ffffff00000000) [ 848.987988] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 848.995254] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 849.002510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 849.009771] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:26 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x4020940d, 0x3) 10:24:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045432, 0x3) 10:24:26 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfe1a0000}, 0x0) 10:24:26 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x3f000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 849.131275] FAULT_INJECTION: forcing a failure. [ 849.131275] name failslab, interval 1, probability 0, space 0, times 0 [ 849.142637] CPU: 0 PID: 20621 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 849.150469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.159831] Call Trace: [ 849.162433] dump_stack+0x197/0x210 [ 849.166083] should_fail.cold+0xa/0x1b [ 849.169992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 849.175110] ? trace_hardirqs_on_thunk+0x1a/0x1c 10:24:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045440, 0x3) [ 849.179882] __should_failslab+0x121/0x190 [ 849.184129] should_failslab+0x9/0x14 [ 849.187942] kmem_cache_alloc+0x47/0x700 [ 849.192010] ? skb_clone+0x147/0x3e0 [ 849.195727] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 849.200582] skb_clone+0x156/0x3e0 [ 849.204138] deliver_clone+0x46/0xc0 [ 849.207867] br_flood+0x4da/0x710 [ 849.211338] br_dev_xmit+0xeeb/0x1490 [ 849.215159] ? br_poll_controller+0x10/0x10 [ 849.219496] ? dev_hard_start_xmit+0x5d/0x970 [ 849.224244] dev_hard_start_xmit+0x1a5/0x970 10:24:26 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x40000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 849.228668] ? check_preemption_disabled+0x48/0x290 [ 849.233704] __dev_queue_xmit+0x2704/0x2fe0 [ 849.238044] ? mark_held_locks+0x100/0x100 [ 849.242300] ? netdev_pick_tx+0x300/0x300 [ 849.246466] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 849.251241] ? retint_kernel+0x2d/0x2d [ 849.255147] ? lock_downgrade+0x880/0x880 [ 849.259308] ? lock_acquire+0x16f/0x3f0 [ 849.263296] ? ip6_fragment+0x2a6a/0x3770 [ 849.267461] dev_queue_xmit+0x18/0x20 [ 849.271271] ? dev_queue_xmit+0x18/0x20 [ 849.275255] ip6_finish_output2+0x1309/0x2560 [ 849.279762] ? check_memory_region+0x112/0x190 [ 849.284363] ? ip6_copy_metadata+0xd10/0xd10 [ 849.288787] ? ip6_copy_metadata+0x89e/0xd10 [ 849.293216] ? ip6_forward_finish+0x4d0/0x4d0 [ 849.297728] ip6_fragment+0x2a6a/0x3770 [ 849.301707] ? ip6_fragment+0x2a6a/0x3770 [ 849.305856] ? ip6_copy_metadata+0xd10/0xd10 [ 849.310278] ? ip6_forward+0x34f0/0x34f0 [ 849.314355] ip6_finish_output+0x6a7/0xbe0 [ 849.318608] ip6_output+0x235/0x7c0 [ 849.322252] ? ip6_finish_output+0xbe0/0xbe0 [ 849.326677] ? ip6_fragment+0x3770/0x3770 [ 849.330840] ip6_local_out+0xbb/0x184 [ 849.334658] ip6_send_skb+0xbb/0x300 [ 849.338393] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 849.343160] ? ip6_dst_lookup_flow+0x220/0x220 [ 849.347765] udpv6_sendmsg+0x22ad/0x2a00 [ 849.351846] ? ip_reply_glue_bits+0xc0/0xc0 [ 849.356189] ? udp_v6_get_port+0x6b0/0x6b0 [ 849.360440] ? trace_hardirqs_on+0x67/0x220 [ 849.364786] ? mark_held_locks+0x100/0x100 [ 849.369037] ? mark_held_locks+0x100/0x100 [ 849.373286] ? retint_kernel+0x2d/0x2d [ 849.377180] ? trace_hardirqs_on_caller+0x6a/0x220 [ 849.382131] ? retint_kernel+0x2d/0x2d [ 849.386035] ? __local_bh_enable_ip+0x15a/0x270 [ 849.390713] ? _raw_spin_unlock_bh+0x31/0x40 [ 849.395179] inet_sendmsg+0x141/0x5d0 [ 849.399021] ? inet_sendmsg+0x141/0x5d0 [ 849.403015] ? ipip_gro_receive+0x100/0x100 [ 849.407355] sock_sendmsg+0xd7/0x130 [ 849.411082] ___sys_sendmsg+0x803/0x920 [ 849.415075] ? copy_msghdr_from_user+0x430/0x430 [ 849.419844] ? lock_downgrade+0x880/0x880 [ 849.424000] ? __fget+0x9d/0x540 [ 849.427379] ? __fget+0x367/0x540 [ 849.430863] ? __fget_light+0x1a9/0x230 [ 849.434836] ? __fdget+0x1b/0x20 [ 849.438203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.443752] __sys_sendmsg+0x105/0x1d0 [ 849.447654] ? __ia32_sys_shutdown+0x80/0x80 [ 849.452090] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.457471] __x64_sys_sendmsg+0x78/0xb0 [ 849.462053] do_syscall_64+0xfd/0x620 [ 849.465945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.471133] RIP: 0033:0x45af49 [ 849.474324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.493378] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.501090] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 849.508355] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 849.515624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 849.522892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 10:24:26 executing program 2 (fault-call:3 fault-nth:90): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:26 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfe800000}, 0x0) 10:24:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80086601, 0x3) 10:24:26 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x46410000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xf677000000000000) 10:24:26 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045432, 0x3) [ 849.530235] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:26 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80087601, 0x3) 10:24:26 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80045440, 0x3) 10:24:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe1a000000000000) [ 849.617060] FAULT_INJECTION: forcing a failure. [ 849.617060] name failslab, interval 1, probability 0, space 0, times 0 [ 849.642510] CPU: 0 PID: 20659 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 849.650511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.659881] Call Trace: [ 849.662540] dump_stack+0x197/0x210 10:24:26 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4d16ff7f, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:26 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfec90000}, 0x0) [ 849.666360] should_fail.cold+0xa/0x1b [ 849.670267] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 849.675492] ? ip6_make_skb+0x32f/0x561 [ 849.679486] ? udpv6_sendmsg+0x225b/0x2a00 [ 849.683737] ? inet_sendmsg+0x141/0x5d0 [ 849.687726] ? sock_sendmsg+0xd7/0x130 [ 849.691627] ? ___sys_sendmsg+0x803/0x920 [ 849.695908] __should_failslab+0x121/0x190 [ 849.700165] should_failslab+0x9/0x14 [ 849.703985] kmem_cache_alloc+0x47/0x700 [ 849.708060] ? trace_hardirqs_on+0x67/0x220 [ 849.712398] __nf_conntrack_alloc+0xdb/0x680 [ 849.716823] init_conntrack+0xfd4/0x1340 [ 849.720902] ? nf_conntrack_alloc+0x50/0x50 [ 849.725354] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 849.730382] ? flow_hash_from_keys+0x2a0/0x870 [ 849.734980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 849.740645] ? ipv6_ext_hdr+0x7e/0x90 [ 849.744575] nf_conntrack_in+0x98b/0xe90 [ 849.748670] ? nf_conntrack_update+0x990/0x990 [ 849.753275] ? ip6t_error+0x1/0x40 [ 849.756838] ipv6_conntrack_in+0x61/0x90 [ 849.761048] nf_hook_slow+0xbc/0x1e0 10:24:27 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80086601, 0x3) [ 849.764790] __ip6_local_out+0x464/0x8a0 [ 849.768869] ? dst_output+0x150/0x150 [ 849.772686] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 849.777024] ? ip6_make_skb+0x370/0x561 [ 849.781017] ? ip_reply_glue_bits+0xc0/0xc0 [ 849.785357] ip6_local_out+0x2d/0x184 [ 849.789167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.794718] ip6_send_skb+0xbb/0x300 [ 849.798532] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 849.803321] ? ip6_dst_lookup_flow+0x220/0x220 [ 849.807925] udpv6_sendmsg+0x22ad/0x2a00 [ 849.811999] ? ip_reply_glue_bits+0xc0/0xc0 [ 849.816335] ? udp_v6_get_port+0x6b0/0x6b0 [ 849.820589] ? trace_hardirqs_on+0x67/0x220 [ 849.824923] ? mark_held_locks+0x100/0x100 [ 849.829167] ? mark_held_locks+0x100/0x100 [ 849.833407] ? _raw_spin_unlock_bh+0x31/0x40 [ 849.837829] ? udp_lib_get_port+0x876/0x19f0 [ 849.842282] ? __local_bh_enable_ip+0x15a/0x270 [ 849.846959] ? _raw_spin_unlock_bh+0x31/0x40 [ 849.851385] inet_sendmsg+0x141/0x5d0 [ 849.855197] ? inet_sendmsg+0x141/0x5d0 [ 849.859187] ? ipip_gro_receive+0x100/0x100 [ 849.863525] sock_sendmsg+0xd7/0x130 [ 849.867362] ___sys_sendmsg+0x803/0x920 [ 849.871355] ? copy_msghdr_from_user+0x430/0x430 [ 849.876135] ? lock_downgrade+0x880/0x880 [ 849.880296] ? __fget+0x9d/0x540 [ 849.883678] ? __fget+0x367/0x540 [ 849.887158] ? __fget_light+0x1a9/0x230 [ 849.891144] ? __fdget+0x1b/0x20 [ 849.894525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.900078] __sys_sendmsg+0x105/0x1d0 [ 849.903977] ? __ia32_sys_shutdown+0x80/0x80 [ 849.908526] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.913909] __x64_sys_sendmsg+0x78/0xb0 [ 849.917990] do_syscall_64+0xfd/0x620 [ 849.921805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.927111] RIP: 0033:0x45af49 [ 849.930311] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 849.949408] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.957484] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 10:24:27 executing program 2 (fault-call:3 fault-nth:91): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:27 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4e930000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:27 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xffffff7f}, 0x0) 10:24:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x3) 10:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfe80000000000000) 10:24:27 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x80087601, 0x3) [ 849.964756] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 849.972016] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 849.979285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 849.986558] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:27 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xffffff8d}, 0x0) 10:24:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x3) 10:24:27 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x56360000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xfec9000000000000) [ 850.103238] FAULT_INJECTION: forcing a failure. [ 850.103238] name failslab, interval 1, probability 0, space 0, times 0 [ 850.114580] CPU: 0 PID: 20695 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 850.122385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.131750] Call Trace: [ 850.134441] dump_stack+0x197/0x210 [ 850.138094] should_fail.cold+0xa/0x1b [ 850.142008] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 850.147132] ? br_fdb_add.cold+0x8a/0x8a [ 850.151219] __should_failslab+0x121/0x190 [ 850.155465] should_failslab+0x9/0x14 [ 850.159283] kmem_cache_alloc+0x47/0x700 [ 850.163360] ? trace_hardirqs_on_caller+0x6a/0x220 [ 850.168336] ? br_allowed_ingress+0x1630/0x1630 [ 850.173022] skb_clone+0x156/0x3e0 [ 850.176579] deliver_clone+0x46/0xc0 [ 850.180308] br_flood+0x4da/0x710 [ 850.183861] br_dev_xmit+0xeeb/0x1490 [ 850.187671] ? br_poll_controller+0x10/0x10 [ 850.192001] ? __kprobes_text_end+0xa1050/0xa1050 [ 850.196858] ? validate_xmit_xfrm+0x1f7/0xda0 10:24:27 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x3) 10:24:27 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x5e880000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 850.201369] ? validate_xmit_skb+0x71e/0xd50 [ 850.205791] dev_hard_start_xmit+0x1a5/0x970 [ 850.210211] ? check_preemption_disabled+0x48/0x290 [ 850.215241] __dev_queue_xmit+0x2704/0x2fe0 [ 850.219568] ? mark_held_locks+0x100/0x100 [ 850.223817] ? netdev_pick_tx+0x300/0x300 [ 850.228258] ? lock_downgrade+0x880/0x880 [ 850.232435] ? lock_acquire+0x16f/0x3f0 [ 850.236432] ? ip6_fragment+0x2a6a/0x3770 [ 850.240597] dev_queue_xmit+0x18/0x20 [ 850.244410] ? dev_queue_xmit+0x18/0x20 [ 850.248396] ip6_finish_output2+0x1309/0x2560 [ 850.252909] ? ip6_copy_metadata+0xd10/0xd10 [ 850.257328] ? ip6_copy_metadata+0x89e/0xd10 [ 850.261756] ? ip6_forward_finish+0x4d0/0x4d0 [ 850.266267] ip6_fragment+0x2a6a/0x3770 [ 850.270251] ? ip6_fragment+0x2a6a/0x3770 [ 850.274417] ? ip6_copy_metadata+0xd10/0xd10 [ 850.278848] ? ip6_forward+0x34f0/0x34f0 [ 850.282942] ip6_finish_output+0x6a7/0xbe0 [ 850.287192] ip6_output+0x235/0x7c0 [ 850.290981] ? ip6_finish_output+0xbe0/0xbe0 [ 850.295403] ? retint_kernel+0x2d/0x2d [ 850.299368] ? ip6_fragment+0x3770/0x3770 [ 850.303540] ip6_local_out+0xbb/0x184 [ 850.307442] ip6_send_skb+0xbb/0x300 [ 850.311173] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 850.315944] ? ip6_dst_lookup_flow+0x220/0x220 [ 850.320540] udpv6_sendmsg+0x22ad/0x2a00 [ 850.324601] ? retint_kernel+0x2d/0x2d [ 850.328490] ? ip_reply_glue_bits+0xc0/0xc0 [ 850.332826] ? udp_v6_get_port+0x6b0/0x6b0 [ 850.337075] ? trace_hardirqs_on+0x67/0x220 [ 850.341406] ? mark_held_locks+0x100/0x100 [ 850.345660] ? mark_held_locks+0x100/0x100 [ 850.349911] ? _raw_spin_unlock_bh+0x31/0x40 [ 850.354334] ? retint_kernel+0x2d/0x2d [ 850.358238] ? trace_hardirqs_on_caller+0x6a/0x220 [ 850.363200] ? __local_bh_enable_ip+0x15a/0x270 [ 850.367881] ? _raw_spin_unlock_bh+0x31/0x40 [ 850.372308] inet_sendmsg+0x141/0x5d0 [ 850.376129] ? inet_sendmsg+0x141/0x5d0 [ 850.380122] ? ipip_gro_receive+0x100/0x100 [ 850.384458] sock_sendmsg+0xd7/0x130 [ 850.388181] ___sys_sendmsg+0x803/0x920 [ 850.392171] ? copy_msghdr_from_user+0x430/0x430 [ 850.396953] ? lock_downgrade+0x880/0x880 [ 850.401115] ? __fget+0x9d/0x540 [ 850.404505] ? retint_kernel+0x2d/0x2d [ 850.408413] ? trace_hardirqs_on_caller+0x6a/0x220 [ 850.413369] ? sockfd_lookup_light+0x78/0x180 [ 850.417880] ? sockfd_lookup_light+0x9f/0x180 [ 850.422389] __sys_sendmsg+0x105/0x1d0 [ 850.426285] ? __ia32_sys_shutdown+0x80/0x80 [ 850.430708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 850.436084] __x64_sys_sendmsg+0x78/0xb0 [ 850.440152] do_syscall_64+0xfd/0x620 [ 850.443964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.449161] RIP: 0033:0x45af49 [ 850.452366] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 850.471272] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 850.478978] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 850.486284] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 850.493592] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 10:24:27 executing program 2 (fault-call:3 fault-nth:92): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xff020300a0000000) 10:24:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0189436, 0x3) 10:24:27 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0045878, 0x3) 10:24:27 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0xfffffff5}, 0x0) 10:24:27 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x60000000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 850.500887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 850.508155] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:27 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc020660b, 0x3) 10:24:27 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc0189436, 0x3) 10:24:27 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x2) [ 850.627276] FAULT_INJECTION: forcing a failure. [ 850.627276] name failslab, interval 1, probability 0, space 0, times 0 [ 850.638549] CPU: 1 PID: 20735 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 850.646355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.657544] Call Trace: [ 850.660157] dump_stack+0x197/0x210 [ 850.663805] should_fail.cold+0xa/0x1b [ 850.667712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 850.672834] ? br_fdb_add.cold+0x8a/0x8a [ 850.676918] __should_failslab+0x121/0x190 [ 850.681168] should_failslab+0x9/0x14 [ 850.684984] kmem_cache_alloc+0x47/0x700 [ 850.689051] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 850.694249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.699806] ? br_allowed_ingress+0x1630/0x1630 [ 850.704489] skb_clone+0x156/0x3e0 [ 850.708045] deliver_clone+0x46/0xc0 [ 850.711773] br_flood+0x4da/0x710 [ 850.715244] br_dev_xmit+0xeeb/0x1490 [ 850.719065] ? br_poll_controller+0x10/0x10 [ 850.723405] ? netif_skb_features+0x6d1/0xbb0 [ 850.727913] ? fib_rules_lookup+0x48a/0xc80 [ 850.732255] ? netdev_set_sb_channel+0xe0/0xe0 [ 850.736853] ? validate_xmit_xfrm+0x1f7/0xda0 [ 850.741370] ? fib_rules_net_exit+0x60/0x60 [ 850.745702] ? __save_stack_trace+0x99/0x100 [ 850.750125] dev_hard_start_xmit+0x1a5/0x970 [ 850.754545] ? check_preemption_disabled+0x48/0x290 [ 850.759581] __dev_queue_xmit+0x2704/0x2fe0 [ 850.763918] ? mark_held_locks+0x100/0x100 [ 850.768171] ? netdev_pick_tx+0x300/0x300 [ 850.772337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 850.777898] ? lock_downgrade+0x880/0x880 [ 850.782073] ? lock_acquire+0x16f/0x3f0 [ 850.786067] ? ip6_fragment+0x2a6a/0x3770 [ 850.790227] dev_queue_xmit+0x18/0x20 [ 850.794062] ? dev_queue_xmit+0x18/0x20 [ 850.798045] ip6_finish_output2+0x1309/0x2560 [ 850.802553] ? kasan_unpoison_shadow+0x35/0x50 [ 850.807142] ? ip6_copy_metadata+0xd10/0xd10 [ 850.811564] ? ip6_copy_metadata+0x89e/0xd10 [ 850.815990] ? ip6_forward_finish+0x4d0/0x4d0 [ 850.820505] ip6_fragment+0x2a6a/0x3770 10:24:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xffffff7f00000000) 10:24:27 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x3) 10:24:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xffffffff00000000) [ 850.824500] ? ip6_fragment+0x2a6a/0x3770 [ 850.828668] ? ip6_copy_metadata+0xd10/0xd10 [ 850.833100] ? ip6_forward+0x34f0/0x34f0 [ 850.837291] ip6_finish_output+0x6a7/0xbe0 [ 850.841542] ip6_output+0x235/0x7c0 [ 850.845186] ? ip6_finish_output+0xbe0/0xbe0 [ 850.849608] ? ip6_fragment+0x3770/0x3770 [ 850.853815] ? ip6_make_skb+0x370/0x561 [ 850.857805] ? ip_reply_glue_bits+0xc0/0xc0 [ 850.862140] ip6_local_out+0xbb/0x184 [ 850.865950] ip6_send_skb+0xbb/0x300 [ 850.869945] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 850.874709] ? ip6_dst_lookup_flow+0x220/0x220 [ 850.879306] udpv6_sendmsg+0x22ad/0x2a00 [ 850.883560] ? ip_reply_glue_bits+0xc0/0xc0 [ 850.887900] ? udp_v6_get_port+0x6b0/0x6b0 [ 850.892138] ? trace_hardirqs_on+0x67/0x220 [ 850.896490] ? mark_held_locks+0x100/0x100 [ 850.900715] ? mark_held_locks+0x100/0x100 [ 850.904939] ? _raw_spin_unlock_bh+0x31/0x40 [ 850.909339] ? udp_lib_get_port+0x876/0x19f0 [ 850.913878] ? __local_bh_enable_ip+0x15a/0x270 [ 850.918535] ? _raw_spin_unlock_bh+0x31/0x40 [ 850.922998] inet_sendmsg+0x141/0x5d0 [ 850.926783] ? inet_sendmsg+0x141/0x5d0 [ 850.930780] ? ipip_gro_receive+0x100/0x100 [ 850.935094] sock_sendmsg+0xd7/0x130 [ 850.938798] ___sys_sendmsg+0x803/0x920 [ 850.942786] ? copy_msghdr_from_user+0x430/0x430 [ 850.947531] ? lock_downgrade+0x880/0x880 [ 850.951665] ? __fget+0x9d/0x540 [ 850.955050] ? __fget+0x367/0x540 [ 850.958503] ? __fget_light+0x1a9/0x230 [ 850.962464] ? __fdget+0x1b/0x20 [ 850.965868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.971405] __sys_sendmsg+0x105/0x1d0 [ 850.975291] ? __ia32_sys_shutdown+0x80/0x80 [ 850.979689] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 850.985039] __x64_sys_sendmsg+0x78/0xb0 [ 850.989086] do_syscall_64+0xfd/0x620 [ 850.992876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.998059] RIP: 0033:0x45af49 [ 851.001247] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 851.020402] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:24:28 executing program 2 (fault-call:3 fault-nth:93): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x4) 10:24:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) socket(0x23, 0x8080c, 0xb6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0xfffffeff, 0xffffffffffffff31) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x662b0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0xc020660b, 0x3) 10:24:28 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 851.028095] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 851.035346] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 851.042599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 851.049853] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 851.057120] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:28 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) [ 851.136825] [U]  10:24:28 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0xe68bf55547dc456d) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x6e7d0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 851.222822] FAULT_INJECTION: forcing a failure. [ 851.222822] name failslab, interval 1, probability 0, space 0, times 0 [ 851.234133] CPU: 1 PID: 20786 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 851.241935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.251291] Call Trace: [ 851.253898] dump_stack+0x197/0x210 [ 851.257552] should_fail.cold+0xa/0x1b [ 851.262432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 851.267544] ? br_fdb_add.cold+0x8a/0x8a [ 851.271619] __should_failslab+0x121/0x190 [ 851.275867] should_failslab+0x9/0x14 [ 851.279677] kmem_cache_alloc+0x47/0x700 [ 851.283742] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 851.288935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.294477] ? br_allowed_ingress+0x1630/0x1630 [ 851.299151] skb_clone+0x156/0x3e0 [ 851.302703] deliver_clone+0x46/0xc0 [ 851.306425] br_flood+0x4da/0x710 [ 851.309890] br_dev_xmit+0xeeb/0x1490 [ 851.313706] ? br_poll_controller+0x10/0x10 [ 851.318034] ? netif_skb_features+0x6d1/0xbb0 [ 851.322537] ? fib_rules_lookup+0x48a/0xc80 [ 851.326870] ? netdev_set_sb_channel+0xe0/0xe0 [ 851.331460] ? validate_xmit_xfrm+0x1f7/0xda0 [ 851.335964] ? fib_rules_net_exit+0x60/0x60 [ 851.340294] ? __save_stack_trace+0x99/0x100 [ 851.344731] dev_hard_start_xmit+0x1a5/0x970 [ 851.348117] [U]  [ 851.349151] ? check_preemption_disabled+0x48/0x290 [ 851.349172] __dev_queue_xmit+0x2704/0x2fe0 [ 851.360676] ? mark_held_locks+0x100/0x100 [ 851.364928] ? netdev_pick_tx+0x300/0x300 10:24:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 10:24:28 executing program 3: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000040)={0x4, 0x7f}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x880401, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f00000002c0)=""/106}, {&(0x7f00000004c0)=""/261}], 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) [ 851.369100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.374660] ? lock_downgrade+0x880/0x880 [ 851.378835] ? lock_acquire+0x16f/0x3f0 [ 851.382825] ? ip6_fragment+0x2a6a/0x3770 [ 851.386992] dev_queue_xmit+0x18/0x20 [ 851.390808] ? dev_queue_xmit+0x18/0x20 [ 851.394800] ip6_finish_output2+0x1309/0x2560 [ 851.399314] ? kasan_unpoison_shadow+0x35/0x50 [ 851.403918] ? ip6_copy_metadata+0xd10/0xd10 [ 851.408356] ? ip6_copy_metadata+0x89e/0xd10 [ 851.412786] ? ip6_forward_finish+0x4d0/0x4d0 [ 851.417300] ip6_fragment+0x2a6a/0x3770 [ 851.421306] ? ip6_fragment+0x2a6a/0x3770 [ 851.425467] ? ip6_copy_metadata+0xd10/0xd10 [ 851.429893] ? ip6_forward+0x34f0/0x34f0 [ 851.433974] ip6_finish_output+0x6a7/0xbe0 [ 851.438265] ip6_output+0x235/0x7c0 [ 851.442279] ? ip6_finish_output+0xbe0/0xbe0 [ 851.446705] ? ip6_fragment+0x3770/0x3770 [ 851.450866] ? ip6_make_skb+0x370/0x561 [ 851.450884] ? ip_reply_glue_bits+0xc0/0xc0 [ 851.450910] ip6_local_out+0xbb/0x184 [ 851.450928] ip6_send_skb+0xbb/0x300 [ 851.450951] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 851.450966] ? ip6_dst_lookup_flow+0x220/0x220 [ 851.450986] udpv6_sendmsg+0x22ad/0x2a00 [ 851.451003] ? ip_reply_glue_bits+0xc0/0xc0 [ 851.451022] ? udp_v6_get_port+0x6b0/0x6b0 [ 851.451040] ? trace_hardirqs_on+0x67/0x220 [ 851.451058] ? mark_held_locks+0x100/0x100 [ 851.451075] ? mark_held_locks+0x100/0x100 [ 851.451090] ? _raw_spin_unlock_bh+0x31/0x40 [ 851.451107] ? udp_lib_get_port+0x876/0x19f0 [ 851.451135] ? __local_bh_enable_ip+0x15a/0x270 [ 851.510689] [U]  [ 851.515093] ? _raw_spin_unlock_bh+0x31/0x40 [ 851.515113] inet_sendmsg+0x141/0x5d0 [ 851.525647] ? inet_sendmsg+0x141/0x5d0 [ 851.525664] ? ipip_gro_receive+0x100/0x100 [ 851.525682] sock_sendmsg+0xd7/0x130 [ 851.525699] ___sys_sendmsg+0x803/0x920 [ 851.525718] ? copy_msghdr_from_user+0x430/0x430 [ 851.525738] ? lock_downgrade+0x880/0x880 [ 851.525752] ? __fget+0x9d/0x540 [ 851.525768] ? __fget+0x367/0x540 [ 851.525789] ? __fget_light+0x1a9/0x230 [ 851.561481] ? __fdget+0x1b/0x20 [ 851.564866] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.570416] __sys_sendmsg+0x105/0x1d0 [ 851.574313] ? __ia32_sys_shutdown+0x80/0x80 [ 851.578748] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 851.584132] __x64_sys_sendmsg+0x78/0xb0 [ 851.588197] do_syscall_64+0xfd/0x620 [ 851.591986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.597201] RIP: 0033:0x45af49 [ 851.600382] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:24:28 executing program 2 (fault-call:3 fault-nth:94): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x76200000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) openat(r0, &(0x7f0000000380)='./file0\x00', 0x2c000, 0x80) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f00000015c0)=""/240, 0xf0, 0x8004000000000000}, 0x163) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000002c0)={0x8, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000003c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000016c0)={{0x1, 0x4, 0x0, 0x9, 'syz0\x00', 0x2}, 0x1, 0x2, 0x1, r4, 0x7, 0x3f, 'syz0\x00', &(0x7f00000014c0)=['/proc/self/net/pfkey\x00', 'nr', ']usereth0selinux\x00', '\\wlan0-\x00', 'selinux}:/.em1posix_acl_access\x00', 'vboxnet1,\x00', '[^:ppp0cpusetcpuset$\x00'], 0x6e, [], [0x2b1, 0x4, 0x1ff, 0x2]}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400002, 0x0) ioctl$sock_netrom_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={0x0, @bcast, @netrom={'nr', 0x0}, 0x1, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, 0x800, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}) 10:24:28 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x5) 10:24:28 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x509d40, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0xdedc, 0x9, 0x2, 0x9, 0x4, "b3c266c1637da101"}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x100) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:28 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = dup(r0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000000)={0x1, "1d53b0642b5e73b3b923642fe869ce7d595d9a7983af00", 0x200, 0x5, 0xec, 0x0, 0x2}) ioctl$TCXONC(r0, 0x540a, 0x3) [ 851.619281] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.626983] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 851.634239] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 851.641493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 851.648773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 851.656030] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x6) 10:24:29 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyprintk\x00', 0x702, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x4) connect$ax25(r1, &(0x7f0000000000)={{0x3, @bcast, 0x1}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$TCXONC(r0, 0x540a, 0x3) r3 = openat$cgroup_type(r2, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000180)=0x40) 10:24:29 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000100)=0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r2, r3, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r4, 0x0, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={r4, 0x7, 0x20}, &(0x7f0000000440)=0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f0000000080)=@nfc={0x27, 0x1, 0x0, 0x3}, 0x1aa, &(0x7f0000000340), 0x1000000000000102, &(0x7f00000014c0)=[{0x0, 0x119, 0x0, "60d24e90d5b504bd80b798ba44009dfd8c383766a324a320dac2ae1c3c69270d69ff4607925bffc3b819f141f07934781e966821871ffbc475a19c0aa4d79e33d465963b27c9cfd1305b29986656bb4bad4d74596ed53e108aea5e241759e26561b6611c1579b744f26ef529eed641c9310b401255a8b741cc373d1d03dcf53c58b6b12aa9abc88083ee264059f154e4b351f092a02d2e3529cdbf82b2b5f741b709c8ce6b49808a7ab5a515c62fea03f52bba68963efb27ef272901c4fac8fa243e7279f122c0f68be7237c7c86ace87e3f1b5c9d6de89bdf9a9fe2e204fb1caf9f5f9b41631b"}], 0xffffffffffffffe7}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='attr/prev\x00') preadv(r6, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r7, 0xc}, &(0x7f0000000300)=0xc) [ 851.720877] [U]  [ 851.740474] FAULT_INJECTION: forcing a failure. [ 851.740474] name failslab, interval 1, probability 0, space 0, times 0 10:24:29 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) 10:24:29 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x76cf0000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 851.788084] CPU: 1 PID: 20820 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 851.795915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.805277] Call Trace: [ 851.807885] dump_stack+0x197/0x210 [ 851.811533] should_fail.cold+0xa/0x1b [ 851.815443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 851.820573] ? ip6_make_skb+0x32f/0x561 [ 851.824563] ? udpv6_sendmsg+0x225b/0x2a00 [ 851.828816] ? inet_sendmsg+0x141/0x5d0 [ 851.832808] ? sock_sendmsg+0xd7/0x130 10:24:29 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x78050000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 851.836716] ? ___sys_sendmsg+0x803/0x920 [ 851.840882] __should_failslab+0x121/0x190 [ 851.845133] should_failslab+0x9/0x14 [ 851.848946] kmem_cache_alloc+0x47/0x700 [ 851.853018] ? trace_hardirqs_on+0x67/0x220 [ 851.857355] __nf_conntrack_alloc+0xdb/0x680 [ 851.861785] init_conntrack+0xfd4/0x1340 [ 851.865872] ? nf_conntrack_alloc+0x50/0x50 [ 851.870201] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 851.875225] ? flow_hash_from_keys+0x2a0/0x870 [ 851.879816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 851.885365] ? ipv6_ext_hdr+0x7e/0x90 [ 851.889183] nf_conntrack_in+0x98b/0xe90 [ 851.893290] ? nf_conntrack_update+0x990/0x990 [ 851.897891] ? ip6t_error+0x1/0x40 [ 851.901456] ipv6_conntrack_in+0x61/0x90 [ 851.905540] nf_hook_slow+0xbc/0x1e0 [ 851.909278] __ip6_local_out+0x464/0x8a0 [ 851.913357] ? dst_output+0x150/0x150 [ 851.917173] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 851.921504] ? ip6_make_skb+0x370/0x561 [ 851.925491] ? ip_reply_glue_bits+0xc0/0xc0 [ 851.929834] ip6_local_out+0x2d/0x184 [ 851.933642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.939290] ip6_send_skb+0xbb/0x300 [ 851.943020] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 851.947788] ? ip6_dst_lookup_flow+0x220/0x220 [ 851.952398] udpv6_sendmsg+0x22ad/0x2a00 [ 851.956468] ? ip_reply_glue_bits+0xc0/0xc0 [ 851.960805] ? udp_v6_get_port+0x6b0/0x6b0 [ 851.965057] ? trace_hardirqs_on+0x67/0x220 [ 851.969395] ? mark_held_locks+0x100/0x100 [ 851.973643] ? mark_held_locks+0x100/0x100 [ 851.977889] ? _raw_spin_unlock_bh+0x31/0x40 [ 851.982314] ? udp_lib_get_port+0x876/0x19f0 [ 851.986751] ? __local_bh_enable_ip+0x15a/0x270 [ 851.991434] ? _raw_spin_unlock_bh+0x31/0x40 [ 851.995864] inet_sendmsg+0x141/0x5d0 [ 851.999677] ? inet_sendmsg+0x141/0x5d0 [ 852.003661] ? ipip_gro_receive+0x100/0x100 [ 852.007997] sock_sendmsg+0xd7/0x130 [ 852.011722] ___sys_sendmsg+0x803/0x920 [ 852.015716] ? copy_msghdr_from_user+0x430/0x430 [ 852.020488] ? lock_downgrade+0x880/0x880 [ 852.024647] ? __fget+0x9d/0x540 [ 852.028028] ? __fget+0x367/0x540 [ 852.031510] ? __fget_light+0x1a9/0x230 [ 852.035497] ? __fdget+0x1b/0x20 [ 852.038876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.044428] __sys_sendmsg+0x105/0x1d0 [ 852.048324] ? __ia32_sys_shutdown+0x80/0x80 [ 852.048577] [U]  [ 852.052765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 852.052782] __x64_sys_sendmsg+0x78/0xb0 [ 852.064251] do_syscall_64+0xfd/0x620 [ 852.068069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.073261] RIP: 0033:0x45af49 [ 852.076457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 852.095475] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 852.103191] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 852.110496] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 852.117797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 852.125054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 852.132355] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:29 executing program 2 (fault-call:3 fault-nth:95): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:29 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x78c20000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x3f8, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) sendto$ax25(r1, &(0x7f0000000280)="55734f9682af6f8814e89ac451fe9ac4c0e75acb136d405f4ba3b8f434be60e43b0af250636d2aec30519e0e5b8580dfc6927a72ae200be21924abee270ed87ea7a85a1aea1990dbfd4a7bfc6c296b9b86521c603fe2de996fa088f097196d3d71bd4bbde2287fe18be2bdf1338b40a5093b4e74ee138f79eaf5ad1245d29a6e9df419ed230e093ab3b167f949a98b92944d6c594f3fd3638361d2736a66d74399d1c0e13bb599b581bf58f4b09a9067501e687d864cc152190dbbf2466eafc11ab354afb566cf7cbe5d985356ff5bf9405f103f428fca4801c2fe5c91d1fe1247df36d29a75", 0xe6, 0x5, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x7) 10:24:29 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x88442, 0x0) ioctl$TIOCCBRK(r2, 0x5428) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000240)=0x8000) ioctl$TCXONC(r0, 0x540a, 0x3) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000002a80)=ANY=[@ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x4824) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x0, 0x0) preadv(r4, &(0x7f00000029c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/46, 0x2e}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/244, 0xf4}, {&(0x7f0000000380)=""/4, 0x4}, {&(0x7f00000025c0)=""/194, 0xc2}, {&(0x7f00000026c0)=""/204, 0xcc}, {&(0x7f00000027c0)=""/232, 0xe8}, {&(0x7f00000003c0)=""/49, 0x31}, {&(0x7f00000028c0)=""/229, 0xe5}], 0xa, 0x3) 10:24:29 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x9) 10:24:29 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) r4 = socket$packet(0x11, 0x3, 0x300) kcmp(r1, r3, 0x5, 0xffffffffffffffff, r4) [ 852.202707] [U]  [ 852.205620] FAULT_INJECTION: forcing a failure. [ 852.205620] name failslab, interval 1, probability 0, space 0, times 0 [ 852.216885] CPU: 1 PID: 20867 Comm: syz-executor.2 Not tainted 4.19.95-syzkaller #0 [ 852.224713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.234073] Call Trace: [ 852.236699] dump_stack+0x197/0x210 [ 852.240343] should_fail.cold+0xa/0x1b [ 852.244249] ? fault_create_debugfs_attr+0x1e0/0x1e0 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x8) [ 852.249365] ? br_fdb_add.cold+0x8a/0x8a [ 852.253447] __should_failslab+0x121/0x190 [ 852.257705] should_failslab+0x9/0x14 [ 852.261528] kmem_cache_alloc+0x47/0x700 [ 852.265732] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 852.270936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.276492] ? br_allowed_ingress+0x1630/0x1630 [ 852.281176] skb_clone+0x156/0x3e0 [ 852.284748] deliver_clone+0x46/0xc0 [ 852.288486] br_flood+0x4da/0x710 [ 852.291962] br_dev_xmit+0xeeb/0x1490 [ 852.295792] ? br_poll_controller+0x10/0x10 [ 852.300129] ? netif_skb_features+0x6d1/0xbb0 [ 852.304640] ? fib_rules_lookup+0x48a/0xc80 [ 852.309159] ? netdev_set_sb_channel+0xe0/0xe0 [ 852.313767] ? validate_xmit_xfrm+0x1f7/0xda0 [ 852.318283] ? fib_rules_net_exit+0x60/0x60 [ 852.322610] ? lock_acquire+0x16f/0x3f0 [ 852.326596] dev_hard_start_xmit+0x1a5/0x970 [ 852.331020] ? check_preemption_disabled+0x48/0x290 [ 852.336333] __dev_queue_xmit+0x2704/0x2fe0 [ 852.340680] ? mark_held_locks+0x100/0x100 [ 852.344927] ? netdev_pick_tx+0x300/0x300 [ 852.349086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 852.354642] ? lock_downgrade+0x880/0x880 [ 852.358803] ? lock_acquire+0x16f/0x3f0 [ 852.362794] ? ip6_fragment+0x2a6a/0x3770 [ 852.366952] dev_queue_xmit+0x18/0x20 [ 852.370759] ? dev_queue_xmit+0x18/0x20 [ 852.374751] ip6_finish_output2+0x1309/0x2560 [ 852.379294] ? kasan_unpoison_shadow+0x35/0x50 [ 852.383361] [U]  [ 852.384676] ? ip6_copy_metadata+0xd10/0xd10 [ 852.384689] ? ip6_copy_metadata+0x89e/0xd10 [ 852.384707] ? ip6_forward_finish+0x4d0/0x4d0 [ 852.400064] ip6_fragment+0x2a6a/0x3770 [ 852.404049] ? ip6_fragment+0x2a6a/0x3770 [ 852.408208] ? ip6_copy_metadata+0xd10/0xd10 [ 852.412896] ? ip6_forward+0x34f0/0x34f0 [ 852.416976] ip6_finish_output+0x6a7/0xbe0 [ 852.421225] ip6_output+0x235/0x7c0 [ 852.424869] ? ip6_finish_output+0xbe0/0xbe0 [ 852.429294] ? ip6_fragment+0x3770/0x3770 [ 852.433482] ? ip6_make_skb+0x370/0x561 [ 852.437485] ? ip_reply_glue_bits+0xc0/0xc0 [ 852.441833] ip6_local_out+0xbb/0x184 [ 852.445777] ip6_send_skb+0xbb/0x300 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x9) [ 852.449526] udp_v6_send_skb.isra.0+0x7ed/0x1640 [ 852.454305] ? ip6_dst_lookup_flow+0x220/0x220 [ 852.458906] udpv6_sendmsg+0x22ad/0x2a00 [ 852.463330] ? ip_reply_glue_bits+0xc0/0xc0 [ 852.467690] ? udp_v6_get_port+0x6b0/0x6b0 [ 852.472046] ? trace_hardirqs_on+0x67/0x220 [ 852.476388] ? mark_held_locks+0x100/0x100 [ 852.480638] ? mark_held_locks+0x100/0x100 [ 852.484884] ? _raw_spin_unlock_bh+0x31/0x40 [ 852.489303] ? udp_lib_get_port+0x876/0x19f0 [ 852.493735] ? __local_bh_enable_ip+0x15a/0x270 [ 852.498416] ? _raw_spin_unlock_bh+0x31/0x40 [ 852.502835] inet_sendmsg+0x141/0x5d0 [ 852.506647] ? inet_sendmsg+0x141/0x5d0 [ 852.510635] ? ipip_gro_receive+0x100/0x100 [ 852.514967] sock_sendmsg+0xd7/0x130 [ 852.518693] ___sys_sendmsg+0x803/0x920 [ 852.522694] ? copy_msghdr_from_user+0x430/0x430 [ 852.527468] ? lock_downgrade+0x880/0x880 [ 852.531626] ? __fget+0x9d/0x540 [ 852.535010] ? __fget+0x367/0x540 [ 852.538486] ? __fget_light+0x1a9/0x230 [ 852.542469] ? __fdget+0x1b/0x20 [ 852.545850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0xa) [ 852.551399] __sys_sendmsg+0x105/0x1d0 [ 852.555300] ? __ia32_sys_shutdown+0x80/0x80 [ 852.559725] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 852.565101] __x64_sys_sendmsg+0x78/0xb0 [ 852.569175] do_syscall_64+0xfd/0x620 [ 852.572989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.578182] RIP: 0033:0x45af49 [ 852.581382] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 852.600294] RSP: 002b:00007f3cc8a82c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 852.608014] RAX: ffffffffffffffda RBX: 00007f3cc8a82c90 RCX: 000000000045af49 [ 852.615312] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 852.622596] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 852.629876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3cc8a836d4 [ 852.637156] R13: 00000000004ca99c R14: 00000000004e3e08 R15: 0000000000000005 10:24:29 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x10) 10:24:29 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7e720000, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 852.680983] [U]  [ 852.691690] [U]  10:24:30 executing program 2 (fault-call:3 fault-nth:96): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) 10:24:30 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x410400, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000080)={0x7, 0x6, 0x3c7}) ioctl$TCXONC(r0, 0x540a, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f00000001c0)=[{&(0x7f00000014c0)=""/102400, 0x2}, {&(0x7f00000004c0)=""/4096, 0x1155}], 0x2, 0x0) fcntl$dupfd(r2, 0x0, r3) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x63, 0x40) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0)='NLBL_CIPSOv4\x00') 10:24:30 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x11) 10:24:30 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7fff15a2, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 852.848484] [U]  [ 852.855085] [U]  10:24:30 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0xa}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x60) 10:24:30 executing program 3: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000400)=""/57, 0x39}, {&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/119, 0x77}], 0x3, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xbc, "2a433927fb29b43067ce2b66a8246a05704cc555da4ec20d64f47acf85a8f09e2790f1853bed9d2263516e1b545a99db92e526f18cb9f6e4b853280247fb6b3d9d0fb79b9c3e6be667ab3b9387cc618c8b7ab1047a2be27ec5e12758fd4bd4abec3362d6c4a7fb100fd411be40f4e6ac6aa9148812e752473a1d670813a41d0f77fc037310a2097214c790d9d2ac4d03a890c90ad3c98218840ae7e768c25aa568874de22891ed43b9bc28cd994c56faf4386dd337235720c6e7b734"}, &(0x7f0000000080)=0xc4) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f00000003c0)=0x3, 0x100) r6 = socket$inet_dccp(0x2, 0x6, 0x0) fcntl$setpipe(r6, 0x407, 0xffffffff) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x1, 0x8001, 0x6, 0x0, r4}, 0x10) ioctl$TCXONC(r0, 0x540a, 0x3) 10:24:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f00000015c0)=""/240, 0xf0, 0x8004000000000000}, 0x8082) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x2e9c000000000000]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') r2 = semget$private(0x0, 0x5, 0x0) semtimedop(r2, &(0x7f0000000240)=[{0x0, 0x6}, {0x3, 0xfffd}], 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000014c0)={0xc, 0x400, {0x55, 0x0, 0x1, {0x1f, 0x8}, {0x1, 0x5}, @cond=[{0x22, 0x9, 0x5, 0x1, 0x8}, {0x637, 0x7, 0x3, 0x36, 0x1000, 0x101}]}, {0x53, 0x5, 0x5, {0x5, 0x9}, {0x2, 0x7fff}, @ramp={0xf7, 0xc793, {0x2, 0x1, 0x7f, 0x8}}}}) semop(r2, &(0x7f00000000c0)=[{0x0, 0x7fff}], 0x1) semctl$GETALL(r2, 0x0, 0xd, 0x0) semtimedop(r2, &(0x7f0000000340)=[{0x0, 0xff, 0x1800}, {0x6, 0x991, 0x800}], 0x2, &(0x7f0000000380)={0x77359400}) preadv(r1, &(0x7f0000000480)=[{&(0x7f0000000400)=""/57, 0x39}], 0x1, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0xffffffff, 0xc, 0x4, 0x8, 0x0, {0x0, 0x2710}, {0x4, 0x1, 0x2, 0x4, 0x50, 0x20, "faa3e595"}, 0x0, 0x1, @userptr=0x7a6c9657, 0x3, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000002c0)={r4, 0x1}, &(0x7f0000000300)=0x8) socket$inet6_sctp(0xa, 0x1, 0x84) 10:24:30 executing program 0: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x80) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x5, 0x0, 0x4, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) [ 852.935345] [U]  10:24:30 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x34c30577d6cc3157}], 0x1, &(0x7f00000015c0)=""/240, 0xd932, 0x8004000000000000}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x7fff164d, @mcast2={0xff, 0x2, [0