0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 430.049676] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 430.049682] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:03 executing program 3 (fault-call:0 fault-nth:67): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 430.530579] FAULT_INJECTION: forcing a failure. [ 430.530579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 430.595421] CPU: 0 PID: 20141 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 430.602583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.611950] Call Trace: [ 430.614551] dump_stack+0x138/0x19c [ 430.618203] should_fail.cold+0x10f/0x159 [ 430.622358] ? __might_sleep+0x93/0xb0 [ 430.626263] __alloc_pages_nodemask+0x1d6/0x7a0 [ 430.630960] ? __alloc_pages_slowpath+0x2930/0x2930 [ 430.636075] ? __handle_mm_fault+0x1c49/0x3470 [ 430.640684] alloc_pages_vma+0xc9/0x4c0 02:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 430.644689] __handle_mm_fault+0x18f3/0x3470 [ 430.649110] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 430.653880] ? find_held_lock+0x35/0x130 [ 430.657948] ? handle_mm_fault+0x1b6/0x7c0 [ 430.662199] handle_mm_fault+0x293/0x7c0 [ 430.666275] __get_user_pages+0x465/0x1230 [ 430.670613] ? follow_page_mask+0x1560/0x1560 [ 430.675126] ? __mm_populate+0x1e5/0x2c0 [ 430.679213] populate_vma_page_range+0x18e/0x230 [ 430.683987] __mm_populate+0x198/0x2c0 [ 430.687976] ? populate_vma_page_range+0x230/0x230 [ 430.692922] SyS_mlockall+0x405/0x530 [ 430.696728] ? SyS_munlock+0xf0/0xf0 [ 430.700453] do_syscall_64+0x1e8/0x640 [ 430.700464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.700482] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.700491] RIP: 0033:0x459829 [ 430.700495] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 430.700506] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 430.700512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 430.700517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 430.700528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 430.714476] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:03 executing program 3 (fault-call:0 fault-nth:68): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:03 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.087019] FAULT_INJECTION: forcing a failure. [ 431.087019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.188655] CPU: 0 PID: 20173 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 431.195806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.205634] Call Trace: [ 431.205656] dump_stack+0x138/0x19c [ 431.205674] should_fail.cold+0x10f/0x159 [ 431.205684] ? __might_sleep+0x93/0xb0 [ 431.205698] __alloc_pages_nodemask+0x1d6/0x7a0 [ 431.220098] ? __alloc_pages_slowpath+0x2930/0x2930 [ 431.220110] ? __handle_mm_fault+0x1c49/0x3470 [ 431.220129] alloc_pages_vma+0xc9/0x4c0 [ 431.220147] __handle_mm_fault+0x18f3/0x3470 [ 431.220160] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 431.247817] ? find_held_lock+0x35/0x130 [ 431.251926] ? handle_mm_fault+0x1b6/0x7c0 [ 431.256206] handle_mm_fault+0x293/0x7c0 [ 431.260286] __get_user_pages+0x465/0x1230 [ 431.265349] ? follow_page_mask+0x1560/0x1560 [ 431.269879] ? __mm_populate+0x1e5/0x2c0 [ 431.274109] populate_vma_page_range+0x18e/0x230 [ 431.278899] __mm_populate+0x198/0x2c0 [ 431.282810] ? populate_vma_page_range+0x230/0x230 02:05:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.288001] SyS_mlockall+0x405/0x530 [ 431.292079] ? SyS_munlock+0xf0/0xf0 [ 431.295850] do_syscall_64+0x1e8/0x640 [ 431.299752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.304617] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.309841] RIP: 0033:0x459829 [ 431.313083] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 431.320935] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 431.328225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.335529] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 431.335540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 431.350217] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 3 (fault-call:0 fault-nth:69): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.866775] FAULT_INJECTION: forcing a failure. [ 431.866775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 431.947881] CPU: 0 PID: 20215 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 431.963630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.973017] Call Trace: [ 431.975614] dump_stack+0x138/0x19c [ 431.979258] should_fail.cold+0x10f/0x159 [ 431.983420] ? __might_sleep+0x93/0xb0 [ 431.987321] __alloc_pages_nodemask+0x1d6/0x7a0 [ 431.992013] ? __alloc_pages_slowpath+0x2930/0x2930 [ 431.997079] ? mark_held_locks+0xb1/0x100 [ 432.001252] alloc_pages_vma+0xc9/0x4c0 [ 432.005329] __handle_mm_fault+0x18f3/0x3470 [ 432.009796] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 432.014569] ? find_held_lock+0x35/0x130 [ 432.018645] ? handle_mm_fault+0x1b6/0x7c0 [ 432.022902] handle_mm_fault+0x293/0x7c0 [ 432.026981] __get_user_pages+0x465/0x1230 [ 432.031247] ? follow_page_mask+0x1560/0x1560 [ 432.035772] ? __mm_populate+0x1e5/0x2c0 [ 432.039853] populate_vma_page_range+0x18e/0x230 [ 432.044808] __mm_populate+0x198/0x2c0 [ 432.048724] ? populate_vma_page_range+0x230/0x230 [ 432.053676] SyS_mlockall+0x405/0x530 [ 432.057488] ? SyS_munlock+0xf0/0xf0 [ 432.061217] do_syscall_64+0x1e8/0x640 [ 432.065113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.070001] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 432.075201] RIP: 0033:0x459829 [ 432.078395] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 432.086115] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 432.093396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 432.100673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 432.100680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 432.100686] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:04 executing program 3 (fault-call:0 fault-nth:70): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 432.380479] FAULT_INJECTION: forcing a failure. [ 432.380479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.465911] CPU: 1 PID: 20251 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 432.473053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.482410] Call Trace: [ 432.485008] dump_stack+0x138/0x19c [ 432.488647] should_fail.cold+0x10f/0x159 [ 432.492801] ? __might_sleep+0x93/0xb0 [ 432.496792] __alloc_pages_nodemask+0x1d6/0x7a0 [ 432.501475] ? __alloc_pages_slowpath+0x2930/0x2930 [ 432.506509] ? __handle_mm_fault+0x1c49/0x3470 [ 432.511110] alloc_pages_vma+0xc9/0x4c0 [ 432.515102] __handle_mm_fault+0x18f3/0x3470 [ 432.519526] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 432.524292] ? find_held_lock+0x35/0x130 [ 432.528367] ? handle_mm_fault+0x1b6/0x7c0 [ 432.532619] handle_mm_fault+0x293/0x7c0 [ 432.536723] __get_user_pages+0x465/0x1230 [ 432.540976] ? follow_page_mask+0x1560/0x1560 [ 432.545487] ? __mm_populate+0x1e5/0x2c0 [ 432.549559] populate_vma_page_range+0x18e/0x230 [ 432.554324] __mm_populate+0x198/0x2c0 [ 432.558227] ? populate_vma_page_range+0x230/0x230 02:05:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 432.563168] SyS_mlockall+0x405/0x530 [ 432.566977] ? SyS_munlock+0xf0/0xf0 [ 432.570694] do_syscall_64+0x1e8/0x640 [ 432.574592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.579447] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 432.584723] RIP: 0033:0x459829 [ 432.584730] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 432.584742] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 432.584748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 432.584754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 432.584760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 432.584766] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:05 executing program 3 (fault-call:0 fault-nth:71): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 432.928900] FAULT_INJECTION: forcing a failure. [ 432.928900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.956450] CPU: 0 PID: 20287 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 432.963578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.972931] Call Trace: [ 432.972949] dump_stack+0x138/0x19c [ 432.972966] should_fail.cold+0x10f/0x159 [ 432.972979] ? __might_sleep+0x93/0xb0 [ 432.979191] __alloc_pages_nodemask+0x1d6/0x7a0 [ 432.979206] ? __alloc_pages_slowpath+0x2930/0x2930 [ 432.979215] ? __handle_mm_fault+0x1c49/0x3470 [ 432.979235] alloc_pages_vma+0xc9/0x4c0 [ 433.005437] __handle_mm_fault+0x18f3/0x3470 [ 433.005453] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 433.005466] ? find_held_lock+0x35/0x130 [ 433.005475] ? handle_mm_fault+0x1b6/0x7c0 [ 433.005496] handle_mm_fault+0x293/0x7c0 02:05:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 433.014648] __get_user_pages+0x465/0x1230 [ 433.014668] ? follow_page_mask+0x1560/0x1560 [ 433.014685] ? __mm_populate+0x1e5/0x2c0 [ 433.014698] populate_vma_page_range+0x18e/0x230 [ 433.014712] __mm_populate+0x198/0x2c0 [ 433.022988] ? populate_vma_page_range+0x230/0x230 [ 433.023005] SyS_mlockall+0x405/0x530 [ 433.023014] ? SyS_munlock+0xf0/0xf0 [ 433.023027] do_syscall_64+0x1e8/0x640 [ 433.023036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.023053] entry_SYSCALL_64_after_hwframe+0x42/0xb7 02:05:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 433.023062] RIP: 0033:0x459829 [ 433.023067] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 433.044708] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 433.044715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 433.044721] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 433.044727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 433.044733] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 3 (fault-call:0 fault-nth:72): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 433.500802] FAULT_INJECTION: forcing a failure. [ 433.500802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 433.588986] CPU: 0 PID: 20328 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 433.596137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.605500] Call Trace: [ 433.608098] dump_stack+0x138/0x19c [ 433.611738] should_fail.cold+0x10f/0x159 [ 433.615889] ? __might_sleep+0x93/0xb0 [ 433.619777] __alloc_pages_nodemask+0x1d6/0x7a0 [ 433.624538] ? __alloc_pages_slowpath+0x2930/0x2930 [ 433.629561] ? __handle_mm_fault+0x1c49/0x3470 [ 433.634158] alloc_pages_vma+0xc9/0x4c0 [ 433.634174] __handle_mm_fault+0x18f3/0x3470 [ 433.642552] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 433.642564] ? find_held_lock+0x35/0x130 [ 433.642575] ? handle_mm_fault+0x1b6/0x7c0 [ 433.642594] handle_mm_fault+0x293/0x7c0 [ 433.642608] __get_user_pages+0x465/0x1230 [ 433.642628] ? follow_page_mask+0x1560/0x1560 [ 433.668422] ? __mm_populate+0x1e5/0x2c0 [ 433.672497] populate_vma_page_range+0x18e/0x230 [ 433.677263] __mm_populate+0x198/0x2c0 [ 433.681159] ? populate_vma_page_range+0x230/0x230 02:05:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 433.686100] SyS_mlockall+0x405/0x530 [ 433.689893] ? SyS_munlock+0xf0/0xf0 [ 433.693623] do_syscall_64+0x1e8/0x640 [ 433.697522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.702382] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 433.707578] RIP: 0033:0x459829 [ 433.710858] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 433.718576] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 433.725851] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 433.725858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 433.725864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 433.725870] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:06 executing program 3 (fault-call:0 fault-nth:73): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.099660] FAULT_INJECTION: forcing a failure. [ 434.099660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.206371] CPU: 0 PID: 20363 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 434.213511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.222895] Call Trace: [ 434.225488] dump_stack+0x138/0x19c [ 434.229122] should_fail.cold+0x10f/0x159 [ 434.233274] ? __might_sleep+0x93/0xb0 [ 434.237178] __alloc_pages_nodemask+0x1d6/0x7a0 [ 434.241861] ? mark_held_locks+0xb1/0x100 [ 434.246018] ? __alloc_pages_slowpath+0x2930/0x2930 [ 434.251041] ? __lock_acquire+0x5f9/0x45e0 [ 434.255284] ? trace_hardirqs_on+0x10/0x10 [ 434.259533] alloc_pages_vma+0xc9/0x4c0 [ 434.263514] wp_page_copy+0x203/0x1410 [ 434.267410] ? follow_pfn+0x220/0x220 [ 434.267422] ? __lock_acquire+0x5f9/0x45e0 [ 434.267436] do_wp_page+0x24b/0x12b0 [ 434.275462] ? finish_mkwrite_fault+0x620/0x620 [ 434.283842] __handle_mm_fault+0x1d4a/0x3470 [ 434.288262] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 434.293032] ? find_held_lock+0x35/0x130 [ 434.297099] ? handle_mm_fault+0x1b6/0x7c0 [ 434.301343] handle_mm_fault+0x293/0x7c0 [ 434.305411] __get_user_pages+0x465/0x1230 [ 434.309658] ? follow_page_mask+0x1560/0x1560 [ 434.314163] ? __mm_populate+0x1e5/0x2c0 [ 434.318236] populate_vma_page_range+0x18e/0x230 [ 434.323005] __mm_populate+0x198/0x2c0 [ 434.326904] ? populate_vma_page_range+0x230/0x230 [ 434.331854] SyS_mlockall+0x405/0x530 [ 434.335663] ? SyS_munlock+0xf0/0xf0 [ 434.339385] do_syscall_64+0x1e8/0x640 [ 434.343276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.348134] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 434.353319] RIP: 0033:0x459829 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:06 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.353325] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 434.353336] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 434.353341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 434.353346] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 434.353351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 434.353357] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:07 executing program 3 (fault-call:0 fault-nth:74): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.670640] FAULT_INJECTION: forcing a failure. [ 434.670640] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.702043] CPU: 0 PID: 20401 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 434.709181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.718530] Call Trace: [ 434.718548] dump_stack+0x138/0x19c [ 434.718565] should_fail.cold+0x10f/0x159 [ 434.718575] ? __might_sleep+0x93/0xb0 [ 434.718588] __alloc_pages_nodemask+0x1d6/0x7a0 [ 434.718600] ? __alloc_pages_slowpath+0x2930/0x2930 [ 434.718613] ? do_wp_page+0x253/0x12b0 [ 434.718627] alloc_pages_vma+0xc9/0x4c0 [ 434.718640] __handle_mm_fault+0x18f3/0x3470 [ 434.718654] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 434.718664] ? find_held_lock+0x35/0x130 [ 434.718673] ? handle_mm_fault+0x1b6/0x7c0 02:05:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.718695] handle_mm_fault+0x293/0x7c0 [ 434.718710] __get_user_pages+0x465/0x1230 [ 434.718727] ? follow_page_mask+0x1560/0x1560 [ 434.718743] ? __mm_populate+0x1e5/0x2c0 [ 434.718756] populate_vma_page_range+0x18e/0x230 [ 434.718770] __mm_populate+0x198/0x2c0 [ 434.718783] ? populate_vma_page_range+0x230/0x230 [ 434.759638] SyS_mlockall+0x405/0x530 [ 434.759649] ? SyS_munlock+0xf0/0xf0 [ 434.759662] do_syscall_64+0x1e8/0x640 [ 434.759674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.772007] entry_SYSCALL_64_after_hwframe+0x42/0xb7 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 434.772018] RIP: 0033:0x459829 [ 434.772023] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 434.780742] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 434.780748] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 434.780753] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 434.780758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 434.780765] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:07 executing program 3 (fault-call:0 fault-nth:75): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 435.205740] FAULT_INJECTION: forcing a failure. [ 435.205740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 435.314260] CPU: 0 PID: 20439 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 435.321539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.331008] Call Trace: [ 435.333605] dump_stack+0x138/0x19c [ 435.337242] should_fail.cold+0x10f/0x159 [ 435.341394] ? __might_sleep+0x93/0xb0 [ 435.345291] __alloc_pages_nodemask+0x1d6/0x7a0 [ 435.349970] ? __alloc_pages_slowpath+0x2930/0x2930 [ 435.354992] ? __handle_mm_fault+0x1c49/0x3470 [ 435.359590] alloc_pages_vma+0xc9/0x4c0 [ 435.363575] __handle_mm_fault+0x18f3/0x3470 [ 435.368001] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 435.372770] ? find_held_lock+0x35/0x130 [ 435.376842] ? handle_mm_fault+0x1b6/0x7c0 [ 435.381103] handle_mm_fault+0x293/0x7c0 [ 435.385174] __get_user_pages+0x465/0x1230 [ 435.389418] ? follow_page_mask+0x1560/0x1560 [ 435.389436] ? __mm_populate+0x1e5/0x2c0 [ 435.389450] populate_vma_page_range+0x18e/0x230 [ 435.389464] __mm_populate+0x198/0x2c0 [ 435.402757] ? populate_vma_page_range+0x230/0x230 [ 435.402773] SyS_mlockall+0x405/0x530 [ 435.402781] ? SyS_munlock+0xf0/0xf0 [ 435.402794] do_syscall_64+0x1e8/0x640 [ 435.402804] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.402822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 435.402839] RIP: 0033:0x459829 [ 435.436169] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 435.443875] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 435.451135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 435.458403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 435.465674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 435.472939] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:08 executing program 3 (fault-call:0 fault-nth:76): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 435.850583] FAULT_INJECTION: forcing a failure. [ 435.850583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 435.946208] CPU: 1 PID: 20475 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 435.959357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.968706] Call Trace: [ 435.968724] dump_stack+0x138/0x19c [ 435.968739] should_fail.cold+0x10f/0x159 [ 435.968749] ? __might_sleep+0x93/0xb0 [ 435.968761] __alloc_pages_nodemask+0x1d6/0x7a0 [ 435.968773] ? __alloc_pages_slowpath+0x2930/0x2930 [ 435.968784] ? __lock_acquire+0x5f9/0x45e0 [ 435.968795] ? trace_hardirqs_on+0x10/0x10 [ 435.968811] alloc_pages_vma+0xc9/0x4c0 [ 435.968826] wp_page_copy+0x203/0x1410 [ 435.968842] ? follow_pfn+0x220/0x220 [ 435.968850] ? __lock_acquire+0x5f9/0x45e0 [ 435.968863] do_wp_page+0x24b/0x12b0 [ 435.968875] ? finish_mkwrite_fault+0x620/0x620 [ 435.968888] __handle_mm_fault+0x1d4a/0x3470 [ 435.992779] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 435.992792] ? find_held_lock+0x35/0x130 [ 435.992801] ? handle_mm_fault+0x1b6/0x7c0 [ 435.992820] handle_mm_fault+0x293/0x7c0 [ 435.992834] __get_user_pages+0x465/0x1230 [ 435.992850] ? follow_page_mask+0x1560/0x1560 [ 435.992865] ? __mm_populate+0x1e5/0x2c0 [ 435.992878] populate_vma_page_range+0x18e/0x230 [ 436.001345] __mm_populate+0x198/0x2c0 [ 436.017187] ? populate_vma_page_range+0x230/0x230 [ 436.029937] SyS_mlockall+0x405/0x530 [ 436.038745] ? SyS_munlock+0xf0/0xf0 [ 436.047017] do_syscall_64+0x1e8/0x640 [ 436.085221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.090095] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 436.095302] RIP: 0033:0x459829 [ 436.098496] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 436.106294] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 436.113576] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 436.120854] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 436.128137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 436.135413] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:08 executing program 3 (fault-call:0 fault-nth:77): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 436.369142] FAULT_INJECTION: forcing a failure. [ 436.369142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.397340] CPU: 0 PID: 20513 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 436.404480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.413841] Call Trace: [ 436.413862] dump_stack+0x138/0x19c [ 436.413878] should_fail.cold+0x10f/0x159 [ 436.413888] ? __might_sleep+0x93/0xb0 [ 436.413900] __alloc_pages_nodemask+0x1d6/0x7a0 [ 436.413917] ? __alloc_pages_slowpath+0x2930/0x2930 [ 436.432791] ? do_wp_page+0x253/0x12b0 [ 436.441803] alloc_pages_vma+0xc9/0x4c0 [ 436.445789] __handle_mm_fault+0x18f3/0x3470 [ 436.445805] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 436.445818] ? find_held_lock+0x35/0x130 [ 436.445834] ? handle_mm_fault+0x1b6/0x7c0 [ 436.445855] handle_mm_fault+0x293/0x7c0 02:05:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 436.467345] __get_user_pages+0x465/0x1230 [ 436.471588] ? follow_page_mask+0x1560/0x1560 [ 436.471605] ? __mm_populate+0x1e5/0x2c0 [ 436.471620] populate_vma_page_range+0x18e/0x230 [ 436.471635] __mm_populate+0x198/0x2c0 [ 436.471649] ? populate_vma_page_range+0x230/0x230 [ 436.471664] SyS_mlockall+0x405/0x530 [ 436.471675] ? SyS_munlock+0xf0/0xf0 [ 436.493770] do_syscall_64+0x1e8/0x640 [ 436.493782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.493801] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 436.493810] RIP: 0033:0x459829 [ 436.493815] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 436.493825] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 436.493837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 436.493843] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 436.493851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 436.515296] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:09 executing program 3 (fault-call:0 fault-nth:78): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 436.918115] FAULT_INJECTION: forcing a failure. [ 436.918115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 436.941419] CPU: 0 PID: 20549 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 436.948571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.957932] Call Trace: [ 436.957956] dump_stack+0x138/0x19c [ 436.957971] should_fail.cold+0x10f/0x159 [ 436.957980] ? __might_sleep+0x93/0xb0 [ 436.957992] __alloc_pages_nodemask+0x1d6/0x7a0 [ 436.958004] ? __alloc_pages_slowpath+0x2930/0x2930 [ 436.958013] ? __handle_mm_fault+0x1c49/0x3470 [ 436.958032] alloc_pages_vma+0xc9/0x4c0 [ 436.990444] __handle_mm_fault+0x18f3/0x3470 [ 436.994874] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 436.999645] ? find_held_lock+0x35/0x130 [ 437.003714] ? handle_mm_fault+0x1b6/0x7c0 [ 437.007967] handle_mm_fault+0x293/0x7c0 [ 437.012047] __get_user_pages+0x465/0x1230 [ 437.016302] ? follow_page_mask+0x1560/0x1560 [ 437.020805] ? __mm_populate+0x1e5/0x2c0 [ 437.020819] populate_vma_page_range+0x18e/0x230 [ 437.020842] __mm_populate+0x198/0x2c0 [ 437.020857] ? populate_vma_page_range+0x230/0x230 [ 437.020872] SyS_mlockall+0x405/0x530 [ 437.020883] ? SyS_munlock+0xf0/0xf0 [ 437.029700] do_syscall_64+0x1e8/0x640 [ 437.029712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.029730] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 437.029738] RIP: 0033:0x459829 02:05:09 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 437.029747] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 437.071552] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 437.071558] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 437.071563] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 437.071568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 437.071574] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:10 executing program 3 (fault-call:0 fault-nth:79): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 437.471212] FAULT_INJECTION: forcing a failure. [ 437.471212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.530616] CPU: 1 PID: 20588 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 437.537769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.547132] Call Trace: [ 437.547152] dump_stack+0x138/0x19c [ 437.547168] should_fail.cold+0x10f/0x159 [ 437.547178] ? __might_sleep+0x93/0xb0 [ 437.547189] __alloc_pages_nodemask+0x1d6/0x7a0 [ 437.547201] ? __alloc_pages_slowpath+0x2930/0x2930 [ 437.547210] ? __handle_mm_fault+0x1c49/0x3470 [ 437.547228] alloc_pages_vma+0xc9/0x4c0 [ 437.547240] __handle_mm_fault+0x18f3/0x3470 [ 437.547252] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 437.547264] ? find_held_lock+0x35/0x130 [ 437.547272] ? handle_mm_fault+0x1b6/0x7c0 [ 437.547292] handle_mm_fault+0x293/0x7c0 [ 437.547307] __get_user_pages+0x465/0x1230 [ 437.547324] ? follow_page_mask+0x1560/0x1560 [ 437.547347] ? __mm_populate+0x1e5/0x2c0 [ 437.547360] populate_vma_page_range+0x18e/0x230 [ 437.547373] __mm_populate+0x198/0x2c0 [ 437.547386] ? populate_vma_page_range+0x230/0x230 02:05:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 437.547401] SyS_mlockall+0x405/0x530 [ 437.547413] ? SyS_munlock+0xf0/0xf0 [ 437.579938] do_syscall_64+0x1e8/0x640 [ 437.579950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.579968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 437.579979] RIP: 0033:0x459829 [ 437.635284] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 437.660097] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 437.667381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 437.667388] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 437.667393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 437.667398] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:10 executing program 3 (fault-call:0 fault-nth:80): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 438.047644] FAULT_INJECTION: forcing a failure. [ 438.047644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 438.138839] CPU: 0 PID: 20625 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 438.145988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.155357] Call Trace: [ 438.157959] dump_stack+0x138/0x19c [ 438.161598] should_fail.cold+0x10f/0x159 [ 438.165755] ? __might_sleep+0x93/0xb0 [ 438.169650] __alloc_pages_nodemask+0x1d6/0x7a0 [ 438.174328] ? __alloc_pages_slowpath+0x2930/0x2930 [ 438.179345] ? find_held_lock+0x35/0x130 [ 438.179367] alloc_pages_vma+0xc9/0x4c0 [ 438.187389] __handle_mm_fault+0x18f3/0x3470 [ 438.191802] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 438.191816] ? find_held_lock+0x35/0x130 [ 438.191827] ? handle_mm_fault+0x1b6/0x7c0 [ 438.191880] handle_mm_fault+0x293/0x7c0 [ 438.191895] __get_user_pages+0x465/0x1230 [ 438.213296] ? follow_page_mask+0x1560/0x1560 [ 438.217818] ? __mm_populate+0x1e5/0x2c0 [ 438.221900] populate_vma_page_range+0x18e/0x230 [ 438.226674] __mm_populate+0x198/0x2c0 [ 438.230575] ? populate_vma_page_range+0x230/0x230 [ 438.235524] SyS_mlockall+0x405/0x530 [ 438.239336] ? SyS_munlock+0xf0/0xf0 [ 438.243055] do_syscall_64+0x1e8/0x640 [ 438.246944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.251802] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 438.257010] RIP: 0033:0x459829 [ 438.260202] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 438.267937] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 438.275212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 438.282483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 438.289754] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 438.289764] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:11 executing program 3 (fault-call:0 fault-nth:81): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 438.555155] FAULT_INJECTION: forcing a failure. [ 438.555155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 438.624312] CPU: 1 PID: 20658 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 438.631471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.640835] Call Trace: [ 438.640854] dump_stack+0x138/0x19c [ 438.640870] should_fail.cold+0x10f/0x159 [ 438.640880] ? __might_sleep+0x93/0xb0 [ 438.640892] __alloc_pages_nodemask+0x1d6/0x7a0 [ 438.640904] ? __alloc_pages_slowpath+0x2930/0x2930 [ 438.640914] ? __handle_mm_fault+0x1c49/0x3470 [ 438.640933] alloc_pages_vma+0xc9/0x4c0 02:05:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) [ 438.673367] __handle_mm_fault+0x18f3/0x3470 [ 438.677790] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 438.677803] ? find_held_lock+0x35/0x130 [ 438.677814] ? handle_mm_fault+0x1b6/0x7c0 [ 438.690878] handle_mm_fault+0x293/0x7c0 [ 438.694962] __get_user_pages+0x465/0x1230 [ 438.699222] ? follow_page_mask+0x1560/0x1560 [ 438.703739] ? __mm_populate+0x1e5/0x2c0 [ 438.707818] populate_vma_page_range+0x18e/0x230 [ 438.712581] __mm_populate+0x198/0x2c0 [ 438.712595] ? populate_vma_page_range+0x230/0x230 [ 438.712609] SyS_mlockall+0x405/0x530 [ 438.712617] ? SyS_munlock+0xf0/0xf0 [ 438.712630] do_syscall_64+0x1e8/0x640 [ 438.712640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.712656] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 438.712664] RIP: 0033:0x459829 [ 438.712669] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 438.712681] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 438.712687] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 438.712692] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 438.712698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 438.712704] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:11 executing program 3 (fault-call:0 fault-nth:82): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 439.176273] FAULT_INJECTION: forcing a failure. [ 439.176273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 439.269412] CPU: 1 PID: 20701 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 439.276551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.276557] Call Trace: [ 439.276575] dump_stack+0x138/0x19c [ 439.276593] should_fail.cold+0x10f/0x159 [ 439.296298] ? __might_sleep+0x93/0xb0 [ 439.300210] __alloc_pages_nodemask+0x1d6/0x7a0 [ 439.304895] ? __alloc_pages_slowpath+0x2930/0x2930 [ 439.309920] ? __handle_mm_fault+0x1c49/0x3470 [ 439.314526] alloc_pages_vma+0xc9/0x4c0 [ 439.318513] __handle_mm_fault+0x18f3/0x3470 [ 439.322935] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 439.327708] ? find_held_lock+0x35/0x130 [ 439.331779] ? handle_mm_fault+0x1b6/0x7c0 [ 439.336032] handle_mm_fault+0x293/0x7c0 [ 439.340100] __get_user_pages+0x465/0x1230 [ 439.340117] ? follow_page_mask+0x1560/0x1560 [ 439.340131] ? __mm_populate+0x1e5/0x2c0 [ 439.340143] populate_vma_page_range+0x18e/0x230 [ 439.340156] __mm_populate+0x198/0x2c0 [ 439.340168] ? populate_vma_page_range+0x230/0x230 [ 439.340183] SyS_mlockall+0x405/0x530 [ 439.340193] ? SyS_munlock+0xf0/0xf0 [ 439.357723] do_syscall_64+0x1e8/0x640 [ 439.374054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.382789] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 439.387985] RIP: 0033:0x459829 [ 439.391176] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 439.398889] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 439.406169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 439.413440] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 439.420707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 439.427997] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:12 executing program 3 (fault-call:0 fault-nth:83): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:12 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:12 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 439.733875] FAULT_INJECTION: forcing a failure. [ 439.733875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 439.784763] CPU: 1 PID: 20738 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 439.791895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.801243] Call Trace: [ 439.801262] dump_stack+0x138/0x19c [ 439.801278] should_fail.cold+0x10f/0x159 [ 439.801289] ? __might_sleep+0x93/0xb0 [ 439.801302] __alloc_pages_nodemask+0x1d6/0x7a0 [ 439.801314] ? __alloc_pages_slowpath+0x2930/0x2930 [ 439.825273] ? __handle_mm_fault+0x1c49/0x3470 [ 439.829876] alloc_pages_vma+0xc9/0x4c0 [ 439.833859] __handle_mm_fault+0x18f3/0x3470 [ 439.838274] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 439.843037] ? find_held_lock+0x35/0x130 [ 439.847105] ? handle_mm_fault+0x1b6/0x7c0 [ 439.851362] handle_mm_fault+0x293/0x7c0 [ 439.855440] __get_user_pages+0x465/0x1230 [ 439.859693] ? follow_page_mask+0x1560/0x1560 [ 439.864201] ? __mm_populate+0x1e5/0x2c0 [ 439.868275] populate_vma_page_range+0x18e/0x230 [ 439.873044] __mm_populate+0x198/0x2c0 [ 439.876940] ? populate_vma_page_range+0x230/0x230 [ 439.881882] SyS_mlockall+0x405/0x530 [ 439.885683] ? SyS_munlock+0xf0/0xf0 [ 439.889414] do_syscall_64+0x1e8/0x640 [ 439.893283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.898111] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 439.903324] RIP: 0033:0x459829 [ 439.906508] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 439.914203] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 439.921458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 439.928814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 439.936066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 439.943319] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:12 executing program 3 (fault-call:0 fault-nth:84): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:12 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 440.326597] FAULT_INJECTION: forcing a failure. [ 440.326597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.405290] CPU: 1 PID: 20781 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 440.412434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.421788] Call Trace: [ 440.424380] dump_stack+0x138/0x19c [ 440.428022] should_fail.cold+0x10f/0x159 [ 440.432170] ? __might_sleep+0x93/0xb0 [ 440.432186] __alloc_pages_nodemask+0x1d6/0x7a0 [ 440.432199] ? __alloc_pages_slowpath+0x2930/0x2930 [ 440.432209] ? __handle_mm_fault+0x1c49/0x3470 [ 440.432229] alloc_pages_vma+0xc9/0x4c0 [ 440.432242] __handle_mm_fault+0x18f3/0x3470 [ 440.440787] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 440.440800] ? find_held_lock+0x35/0x130 [ 440.440809] ? handle_mm_fault+0x1b6/0x7c0 [ 440.440831] handle_mm_fault+0x293/0x7c0 [ 440.440846] __get_user_pages+0x465/0x1230 [ 440.440863] ? follow_page_mask+0x1560/0x1560 [ 440.484588] ? __mm_populate+0x1e5/0x2c0 [ 440.488664] populate_vma_page_range+0x18e/0x230 [ 440.493428] __mm_populate+0x198/0x2c0 [ 440.493442] ? populate_vma_page_range+0x230/0x230 [ 440.493457] SyS_mlockall+0x405/0x530 [ 440.493464] ? SyS_munlock+0xf0/0xf0 [ 440.493477] do_syscall_64+0x1e8/0x640 [ 440.493488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.518511] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.523701] RIP: 0033:0x459829 [ 440.526873] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 440.534564] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 440.541830] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 440.549200] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 440.556466] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 440.563718] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:13 executing program 3 (fault-call:0 fault-nth:85): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) [ 440.805049] FAULT_INJECTION: forcing a failure. [ 440.805049] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 440.916713] CPU: 0 PID: 20810 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 440.923950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.933339] Call Trace: [ 440.937617] dump_stack+0x138/0x19c [ 440.941314] should_fail.cold+0x10f/0x159 [ 440.945474] ? __might_sleep+0x93/0xb0 [ 440.949369] __alloc_pages_nodemask+0x1d6/0x7a0 [ 440.954163] ? __alloc_pages_slowpath+0x2930/0x2930 [ 440.959301] ? __handle_mm_fault+0x1c49/0x3470 [ 440.964096] alloc_pages_vma+0xc9/0x4c0 [ 440.968114] __handle_mm_fault+0x18f3/0x3470 [ 440.972698] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 440.977580] ? find_held_lock+0x35/0x130 [ 440.981693] ? handle_mm_fault+0x1b6/0x7c0 [ 440.986186] handle_mm_fault+0x293/0x7c0 [ 440.990320] __get_user_pages+0x465/0x1230 [ 440.994656] ? follow_page_mask+0x1560/0x1560 [ 440.999249] ? __mm_populate+0x1e5/0x2c0 [ 441.003502] populate_vma_page_range+0x18e/0x230 [ 441.008423] __mm_populate+0x198/0x2c0 [ 441.012501] ? populate_vma_page_range+0x230/0x230 [ 441.017485] SyS_mlockall+0x405/0x530 [ 441.021449] ? SyS_munlock+0xf0/0xf0 [ 441.025233] do_syscall_64+0x1e8/0x640 [ 441.029333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.034325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 441.039623] RIP: 0033:0x459829 [ 441.042843] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 441.050575] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 441.057931] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 441.065249] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 441.073207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 441.080563] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:14 executing program 3 (fault-call:0 fault-nth:86): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 441.753019] FAULT_INJECTION: forcing a failure. [ 441.753019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 441.789947] CPU: 1 PID: 20851 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 441.797087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.806440] Call Trace: [ 441.809035] dump_stack+0x138/0x19c [ 441.812678] should_fail.cold+0x10f/0x159 [ 441.816835] ? __might_sleep+0x93/0xb0 [ 441.820731] __alloc_pages_nodemask+0x1d6/0x7a0 [ 441.825400] ? __alloc_pages_slowpath+0x2930/0x2930 [ 441.825410] ? __handle_mm_fault+0x1c49/0x3470 [ 441.825429] alloc_pages_vma+0xc9/0x4c0 [ 441.825443] __handle_mm_fault+0x18f3/0x3470 [ 441.825455] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 441.825466] ? find_held_lock+0x35/0x130 [ 441.825476] ? handle_mm_fault+0x1b6/0x7c0 [ 441.825499] handle_mm_fault+0x293/0x7c0 [ 441.825514] __get_user_pages+0x465/0x1230 [ 441.825532] ? follow_page_mask+0x1560/0x1560 [ 441.825547] ? __mm_populate+0x1e5/0x2c0 [ 441.839540] populate_vma_page_range+0x18e/0x230 [ 441.857087] __mm_populate+0x198/0x2c0 [ 441.857101] ? populate_vma_page_range+0x230/0x230 [ 441.865384] SyS_mlockall+0x405/0x530 [ 441.865393] ? SyS_munlock+0xf0/0xf0 [ 441.865406] do_syscall_64+0x1e8/0x640 [ 441.873940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.873959] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 441.873970] RIP: 0033:0x459829 [ 441.882612] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 441.882625] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 441.882630] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 441.882635] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 441.882641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 02:05:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 441.882646] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 3 (fault-call:0 fault-nth:87): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 442.510773] FAULT_INJECTION: forcing a failure. [ 442.510773] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 442.621530] CPU: 0 PID: 20886 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 442.629186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.638629] Call Trace: [ 442.641255] dump_stack+0x138/0x19c [ 442.644888] should_fail.cold+0x10f/0x159 [ 442.649032] ? __might_sleep+0x93/0xb0 [ 442.652933] __alloc_pages_nodemask+0x1d6/0x7a0 [ 442.657608] ? __alloc_pages_slowpath+0x2930/0x2930 [ 442.662838] ? __handle_mm_fault+0x1c49/0x3470 [ 442.667433] alloc_pages_vma+0xc9/0x4c0 02:05:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 442.667450] __handle_mm_fault+0x18f3/0x3470 [ 442.667464] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 442.667477] ? find_held_lock+0x35/0x130 [ 442.684803] ? handle_mm_fault+0x1b6/0x7c0 [ 442.689148] handle_mm_fault+0x293/0x7c0 [ 442.693225] __get_user_pages+0x465/0x1230 [ 442.697469] ? follow_page_mask+0x1560/0x1560 [ 442.701989] ? __mm_populate+0x1e5/0x2c0 [ 442.702005] populate_vma_page_range+0x18e/0x230 [ 442.702020] __mm_populate+0x198/0x2c0 [ 442.702038] ? populate_vma_page_range+0x230/0x230 [ 442.719826] SyS_mlockall+0x405/0x530 [ 442.723904] ? SyS_munlock+0xf0/0xf0 [ 442.727624] do_syscall_64+0x1e8/0x640 [ 442.731514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.736365] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 442.741731] RIP: 0033:0x459829 [ 442.744923] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 442.752639] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 442.760001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 442.767440] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 442.767446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 442.767452] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:15 executing program 3 (fault-call:0 fault-nth:88): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 443.314780] FAULT_INJECTION: forcing a failure. [ 443.314780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 443.402776] CPU: 1 PID: 20925 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 443.409927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.419280] Call Trace: [ 443.421880] dump_stack+0x138/0x19c [ 443.425521] should_fail.cold+0x10f/0x159 [ 443.429684] ? __might_sleep+0x93/0xb0 [ 443.433586] __alloc_pages_nodemask+0x1d6/0x7a0 [ 443.438258] ? __alloc_pages_slowpath+0x2930/0x2930 [ 443.438269] ? __handle_mm_fault+0x1c49/0x3470 [ 443.438288] alloc_pages_vma+0xc9/0x4c0 [ 443.451840] __handle_mm_fault+0x18f3/0x3470 [ 443.456356] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 443.461204] ? find_held_lock+0x35/0x130 [ 443.461216] ? handle_mm_fault+0x1b6/0x7c0 [ 443.461237] handle_mm_fault+0x293/0x7c0 [ 443.461256] __get_user_pages+0x465/0x1230 [ 443.477844] ? follow_page_mask+0x1560/0x1560 [ 443.482365] ? __mm_populate+0x1e5/0x2c0 [ 443.486442] populate_vma_page_range+0x18e/0x230 [ 443.491213] __mm_populate+0x198/0x2c0 [ 443.495114] ? populate_vma_page_range+0x230/0x230 02:05:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) [ 443.500250] SyS_mlockall+0x405/0x530 [ 443.500260] ? SyS_munlock+0xf0/0xf0 [ 443.500273] do_syscall_64+0x1e8/0x640 [ 443.500282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.500301] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 443.507883] RIP: 0033:0x459829 [ 443.507889] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 443.507901] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 443.507907] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 443.507913] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 443.507921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 443.525171] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:16 executing program 3 (fault-call:0 fault-nth:89): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 443.975080] FAULT_INJECTION: forcing a failure. [ 443.975080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 444.077378] CPU: 1 PID: 20964 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 444.084606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.093964] Call Trace: [ 444.096565] dump_stack+0x138/0x19c [ 444.100218] should_fail.cold+0x10f/0x159 [ 444.104378] ? __might_sleep+0x93/0xb0 [ 444.108452] __alloc_pages_nodemask+0x1d6/0x7a0 [ 444.113121] ? __alloc_pages_slowpath+0x2930/0x2930 [ 444.113132] ? __handle_mm_fault+0x1c49/0x3470 [ 444.113151] alloc_pages_vma+0xc9/0x4c0 [ 444.113164] __handle_mm_fault+0x18f3/0x3470 [ 444.122775] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 444.122788] ? find_held_lock+0x35/0x130 [ 444.122799] ? handle_mm_fault+0x1b6/0x7c0 [ 444.122820] handle_mm_fault+0x293/0x7c0 [ 444.122836] __get_user_pages+0x465/0x1230 [ 444.122854] ? follow_page_mask+0x1560/0x1560 [ 444.157250] ? __mm_populate+0x1e5/0x2c0 [ 444.161327] populate_vma_page_range+0x18e/0x230 [ 444.166144] __mm_populate+0x198/0x2c0 [ 444.170046] ? populate_vma_page_range+0x230/0x230 [ 444.174993] SyS_mlockall+0x405/0x530 [ 444.178800] ? SyS_munlock+0xf0/0xf0 [ 444.182522] do_syscall_64+0x1e8/0x640 [ 444.186416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.191273] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 444.196464] RIP: 0033:0x459829 [ 444.199650] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 444.207400] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 444.214759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 444.214771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 444.229308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 444.229314] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:17 executing program 3 (fault-call:0 fault-nth:90): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 444.504582] FAULT_INJECTION: forcing a failure. [ 444.504582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 444.606657] CPU: 1 PID: 21001 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 444.613797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.623160] Call Trace: [ 444.625756] dump_stack+0x138/0x19c [ 444.629395] should_fail.cold+0x10f/0x159 [ 444.633545] ? __might_sleep+0x93/0xb0 [ 444.637449] __alloc_pages_nodemask+0x1d6/0x7a0 [ 444.642128] ? __alloc_pages_slowpath+0x2930/0x2930 [ 444.647154] ? __handle_mm_fault+0x1c49/0x3470 [ 444.651756] alloc_pages_vma+0xc9/0x4c0 [ 444.655750] __handle_mm_fault+0x18f3/0x3470 [ 444.660175] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 444.664965] ? find_held_lock+0x35/0x130 [ 444.669037] ? handle_mm_fault+0x1b6/0x7c0 [ 444.673288] handle_mm_fault+0x293/0x7c0 [ 444.673304] __get_user_pages+0x465/0x1230 [ 444.673321] ? follow_page_mask+0x1560/0x1560 [ 444.673341] ? __mm_populate+0x1e5/0x2c0 [ 444.681650] populate_vma_page_range+0x18e/0x230 [ 444.681666] __mm_populate+0x198/0x2c0 [ 444.681679] ? populate_vma_page_range+0x230/0x230 [ 444.681694] SyS_mlockall+0x405/0x530 [ 444.681702] ? SyS_munlock+0xf0/0xf0 [ 444.681715] do_syscall_64+0x1e8/0x640 [ 444.700410] syz-executor.0: [ 444.703812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.703831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 444.703839] RIP: 0033:0x459829 [ 444.703848] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 [ 444.707754] page allocation failure: order:0 [ 444.711434] ORIG_RAX: 0000000000000097 [ 444.711441] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 444.711446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 444.711451] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 444.711458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 444.711463] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 444.719452] , mode:0x14000c4(GFP_KERNEL|GFP_DMA32), nodemask= [ 444.751173] (null) [ 444.798485] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 444.809876] CPU: 0 PID: 21019 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 444.817086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.817091] Call Trace: [ 444.817109] dump_stack+0x138/0x19c [ 444.817125] warn_alloc.cold+0x96/0x1af [ 444.829070] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 444.829095] ? wait_for_completion+0x420/0x420 [ 444.846208] __alloc_pages_slowpath+0x23c6/0x2930 [ 444.851083] ? warn_alloc+0xf0/0xf0 [ 444.854995] ? __might_sleep+0x93/0xb0 [ 444.858888] __alloc_pages_nodemask+0x62c/0x7a0 [ 444.863609] ? rcu_read_lock_sched_held+0x110/0x130 [ 444.868982] ? __alloc_pages_slowpath+0x2930/0x2930 [ 444.874016] alloc_pages_current+0xec/0x1e0 [ 444.878410] kvm_mmu_create+0xdf/0x1e0 [ 444.882337] kvm_arch_vcpu_init+0x29c/0x8e0 [ 444.886732] kvm_vcpu_init+0x272/0x360 [ 444.890663] vmx_create_vcpu+0xfc/0x28c0 [ 444.894733] ? mutex_trylock+0x1c0/0x1c0 [ 444.898810] ? handle_wrmsr+0x6d0/0x6d0 [ 444.902799] ? wait_for_completion+0x420/0x420 [ 444.907432] kvm_arch_vcpu_create+0x8c/0xc0 [ 444.911771] kvm_vm_ioctl+0x501/0x1600 [ 444.915665] ? __lock_acquire+0x5f9/0x45e0 [ 444.919919] ? kvm_set_memory_region+0x50/0x50 [ 444.924509] ? trace_hardirqs_on+0x10/0x10 [ 444.928986] ? trace_hardirqs_on+0x10/0x10 [ 444.933228] ? __might_fault+0x110/0x1d0 [ 444.938827] ? save_trace+0x290/0x290 [ 444.942646] ? __might_fault+0x110/0x1d0 [ 444.946745] ? __fget+0x210/0x370 [ 444.950225] ? find_held_lock+0x35/0x130 [ 444.954468] ? __fget+0x210/0x370 [ 444.957932] ? kvm_set_memory_region+0x50/0x50 [ 444.962527] do_vfs_ioctl+0x7ae/0x1060 [ 444.966505] ? selinux_file_mprotect+0x5d0/0x5d0 [ 444.971269] ? lock_downgrade+0x6e0/0x6e0 [ 444.975423] ? ioctl_preallocate+0x1c0/0x1c0 [ 444.979843] ? __fget+0x237/0x370 [ 444.983350] ? security_file_ioctl+0x89/0xb0 [ 444.987770] SyS_ioctl+0x8f/0xc0 [ 444.991137] ? do_vfs_ioctl+0x1060/0x1060 [ 444.995289] do_syscall_64+0x1e8/0x640 [ 444.999185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.004037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 445.009225] RIP: 0033:0x459829 [ 445.012417] RSP: 002b:00007f66309fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.020136] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 445.028016] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000004 [ 445.035327] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 445.042605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f66309fb6d4 [ 445.049879] R13: 00000000004c277a R14: 00000000004d5c78 R15: 00000000ffffffff [ 445.071044] Mem-Info: [ 445.073504] active_anon:173617 inactive_anon:422103 isolated_anon:0 [ 445.073504] active_file:958 inactive_file:7395 isolated_file:0 [ 445.073504] unevictable:2566 dirty:218 writeback:0 unstable:0 [ 445.073504] slab_reclaimable:12649 slab_unreclaimable:113886 [ 445.073504] mapped:61598 shmem:266 pagetables:6295 bounce:0 [ 445.073504] free:792937 free_pcp:584 free_cma:0 02:05:17 executing program 3 (fault-call:0 fault-nth:91): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) [ 445.073526] Node 0 active_anon:685936kB inactive_anon:1135336kB active_file:24kB inactive_file:1060kB unevictable:44kB isolated(anon):0kB isolated(file):0kB mapped:210012kB dirty:20kB writeback:0kB shmem:1032kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 1024000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 445.073545] Node 1 active_anon:8532kB inactive_anon:553076kB active_file:3808kB inactive_file:28520kB unevictable:10220kB isolated(anon):0kB isolated(file):0kB mapped:36380kB dirty:852kB writeback:0kB shmem:32kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 445.073565] Node 0 02:05:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) [ 445.249839] FAULT_INJECTION: forcing a failure. [ 445.249839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 445.274338] CPU: 0 PID: 21036 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 445.281481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.281486] Call Trace: [ 445.281503] dump_stack+0x138/0x19c [ 445.281520] should_fail.cold+0x10f/0x159 [ 445.281530] ? __might_sleep+0x93/0xb0 [ 445.281542] __alloc_pages_nodemask+0x1d6/0x7a0 [ 445.281554] ? __alloc_pages_slowpath+0x2930/0x2930 [ 445.281564] ? __handle_mm_fault+0x1c49/0x3470 [ 445.281583] alloc_pages_vma+0xc9/0x4c0 [ 445.281596] __handle_mm_fault+0x18f3/0x3470 [ 445.281610] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 445.281621] ? find_held_lock+0x35/0x130 [ 445.281631] ? handle_mm_fault+0x1b6/0x7c0 [ 445.281653] handle_mm_fault+0x293/0x7c0 [ 445.281668] __get_user_pages+0x465/0x1230 [ 445.281687] ? follow_page_mask+0x1560/0x1560 [ 445.281703] ? __mm_populate+0x1e5/0x2c0 [ 445.319592] populate_vma_page_range+0x18e/0x230 [ 445.319609] __mm_populate+0x198/0x2c0 [ 445.319624] ? populate_vma_page_range+0x230/0x230 [ 445.319642] SyS_mlockall+0x405/0x530 [ 445.375151] ? SyS_munlock+0xf0/0xf0 [ 445.378874] do_syscall_64+0x1e8/0x640 [ 445.382769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.387622] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 445.392818] RIP: 0033:0x459829 [ 445.396013] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 445.403728] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 445.411010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 445.418281] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.425558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 445.433192] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 445.461104] DMA free:10528kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:4492kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 445.491999] lowmem_reserve[]: 0 2580 2580 2580 [ 445.496672] Node 0 DMA32 free:36900kB min:36468kB low:45584kB high:54700kB active_anon:685936kB inactive_anon:1130844kB active_file:16kB inactive_file:68kB unevictable:1144kB writepending:20kB present:3129332kB managed:2644896kB mlocked:1112kB kernel_stack:12256kB pagetables:20732kB bounce:0kB free_pcp:1408kB local_pcp:728kB free_cma:0kB [ 445.527601] lowmem_reserve[]: 0 0 0 0 [ 445.531519] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 445.557477] lowmem_reserve[]: 0 0 0 0 [ 445.561374] Node 1 Normal free:3119652kB min:53420kB low:66772kB high:80124kB active_anon:8616kB inactive_anon:553476kB active_file:20208kB inactive_file:20140kB unevictable:7020kB writepending:872kB present:3932160kB managed:3870208kB mlocked:7076kB kernel_stack:1120kB pagetables:4352kB bounce:0kB free_pcp:1384kB local_pcp:688kB free_cma:0kB [ 445.592732] lowmem_reserve[]: 0 0 0 0 [ 445.596662] Node 0 DMA: 2*4kB (UM) 1*8kB (U) 1*16kB (M) 2*32kB (UM) 1*64kB (M) 1*128kB (U) 2*256kB (U) 1*512kB (M) 1*1024kB (M) 0*2048kB 2*4096kB (M) = 10528kB [ 445.615467] Node 0 DMA32: 1282*4kB (UME) 222*8kB (UME) 70*16kB (UME) 268*32kB (UME) 7*64kB (UME) 43*128kB (UME) 31*256kB (UME) 11*512kB (UME) 1*1024kB (U) 0*2048kB 0*4096kB = 37144kB [ 445.636465] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 445.647712] Node 1 Normal: 92*4kB (U) 20*8kB (UME) 13*16kB (UME) 16*32kB (UE) 3*64kB (UE) 2*128kB (UE) 2*256kB (UM) 2*512kB (ME) 1*1024kB (M) 3*2048kB (UME) 756*4096kB (UM) = 3106976kB [ 445.668976] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 445.678483] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 445.690138] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 445.699118] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 445.708155] 11111 total pagecache pages [ 445.712398] 0 pages in swap cache 02:05:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 445.715999] Swap cache stats: add 0, delete 0, find 0/0 [ 445.721792] Free swap = 0kB [ 445.724925] Total swap = 0kB [ 445.728053] 1965979 pages RAM [ 445.731581] 0 pages HighMem/MovableOnly [ 445.735687] 333226 pages reserved [ 445.739236] 0 pages cma reserved 02:05:18 executing program 3 (fault-call:0 fault-nth:92): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 446.006630] FAULT_INJECTION: forcing a failure. [ 446.006630] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 446.116225] CPU: 1 PID: 21070 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 446.123362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.132747] Call Trace: [ 446.135351] dump_stack+0x138/0x19c [ 446.139000] should_fail.cold+0x10f/0x159 [ 446.143160] ? __might_sleep+0x93/0xb0 [ 446.147053] __alloc_pages_nodemask+0x1d6/0x7a0 [ 446.151727] ? __alloc_pages_slowpath+0x2930/0x2930 [ 446.156750] ? __handle_mm_fault+0x1c49/0x3470 [ 446.161354] alloc_pages_vma+0xc9/0x4c0 02:05:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 446.165346] __handle_mm_fault+0x18f3/0x3470 [ 446.169760] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 446.174519] ? find_held_lock+0x35/0x130 [ 446.178585] ? handle_mm_fault+0x1b6/0x7c0 [ 446.182842] handle_mm_fault+0x293/0x7c0 [ 446.186911] __get_user_pages+0x465/0x1230 [ 446.191162] ? follow_page_mask+0x1560/0x1560 [ 446.195677] ? __mm_populate+0x1e5/0x2c0 [ 446.199748] populate_vma_page_range+0x18e/0x230 [ 446.204528] __mm_populate+0x198/0x2c0 [ 446.208428] ? populate_vma_page_range+0x230/0x230 [ 446.213370] SyS_mlockall+0x405/0x530 [ 446.217172] ? SyS_munlock+0xf0/0xf0 [ 446.220893] do_syscall_64+0x1e8/0x640 [ 446.224783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.229635] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.234829] RIP: 0033:0x459829 [ 446.234835] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 446.234849] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 446.245742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 446.245749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 446.245755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 446.245761] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:19 executing program 3 (fault-call:0 fault-nth:93): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 446.609317] FAULT_INJECTION: forcing a failure. [ 446.609317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 446.633840] syz-executor.0: page allocation failure: order:0, mode:0x14000c4(GFP_KERNEL|GFP_DMA32), nodemask=(null) [ 446.659324] CPU: 1 PID: 21117 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 446.666470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.676011] Call Trace: [ 446.678609] dump_stack+0x138/0x19c [ 446.682246] should_fail.cold+0x10f/0x159 [ 446.686405] ? __might_sleep+0x93/0xb0 [ 446.690304] __alloc_pages_nodemask+0x1d6/0x7a0 [ 446.694987] ? __alloc_pages_slowpath+0x2930/0x2930 [ 446.700012] ? __handle_mm_fault+0x1c49/0x3470 [ 446.704612] alloc_pages_vma+0xc9/0x4c0 [ 446.708598] __handle_mm_fault+0x18f3/0x3470 [ 446.713011] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 446.717774] ? find_held_lock+0x35/0x130 [ 446.721841] ? handle_mm_fault+0x1b6/0x7c0 [ 446.726088] handle_mm_fault+0x293/0x7c0 [ 446.730162] __get_user_pages+0x465/0x1230 [ 446.734410] ? follow_page_mask+0x1560/0x1560 [ 446.738906] ? __mm_populate+0x1e5/0x2c0 [ 446.742974] populate_vma_page_range+0x18e/0x230 [ 446.747743] __mm_populate+0x198/0x2c0 [ 446.751637] ? populate_vma_page_range+0x230/0x230 02:05:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) semget$private(0x0, 0x0, 0x6860200e226a0ec8) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 446.756578] SyS_mlockall+0x405/0x530 [ 446.760383] ? SyS_munlock+0xf0/0xf0 [ 446.764109] do_syscall_64+0x1e8/0x640 [ 446.767999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.772857] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.778059] RIP: 0033:0x459829 [ 446.781253] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 446.788962] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 446.796231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) [ 446.803507] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 446.810781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 446.818079] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 446.829915] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 446.856062] CPU: 1 PID: 21119 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 446.863201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.872567] Call Trace: [ 446.875197] dump_stack+0x138/0x19c [ 446.878835] warn_alloc.cold+0x96/0x1af [ 446.882827] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 446.887686] ? wait_for_completion+0x420/0x420 [ 446.892279] __alloc_pages_slowpath+0x23c6/0x2930 [ 446.892306] ? warn_alloc+0xf0/0xf0 [ 446.892325] ? __might_sleep+0x93/0xb0 [ 446.905098] __alloc_pages_nodemask+0x62c/0x7a0 [ 446.909781] ? rcu_read_lock_sched_held+0x110/0x130 [ 446.914807] ? __alloc_pages_slowpath+0x2930/0x2930 [ 446.919842] alloc_pages_current+0xec/0x1e0 [ 446.924171] kvm_mmu_create+0xdf/0x1e0 [ 446.924187] kvm_arch_vcpu_init+0x29c/0x8e0 [ 446.924205] kvm_vcpu_init+0x272/0x360 [ 446.932487] vmx_create_vcpu+0xfc/0x28c0 [ 446.932500] ? mutex_trylock+0x1c0/0x1c0 [ 446.932518] ? handle_wrmsr+0x6d0/0x6d0 [ 446.932528] ? wait_for_completion+0x420/0x420 [ 446.932543] kvm_arch_vcpu_create+0x8c/0xc0 [ 446.932556] kvm_vm_ioctl+0x501/0x1600 [ 446.932569] ? __lock_acquire+0x5f9/0x45e0 [ 446.962790] ? kvm_set_memory_region+0x50/0x50 [ 446.962804] ? trace_hardirqs_on+0x10/0x10 [ 446.962819] ? trace_hardirqs_on+0x10/0x10 [ 446.971664] ? __might_fault+0x110/0x1d0 [ 446.971677] ? save_trace+0x290/0x290 [ 446.971687] ? __might_fault+0x110/0x1d0 [ 446.971698] ? __fget+0x210/0x370 [ 446.971708] ? find_held_lock+0x35/0x130 [ 446.971718] ? __fget+0x210/0x370 [ 446.971732] ? kvm_set_memory_region+0x50/0x50 [ 447.007673] do_vfs_ioctl+0x7ae/0x1060 [ 447.011573] ? selinux_file_mprotect+0x5d0/0x5d0 [ 447.016346] ? lock_downgrade+0x6e0/0x6e0 [ 447.020504] ? ioctl_preallocate+0x1c0/0x1c0 [ 447.024925] ? __fget+0x237/0x370 [ 447.028396] ? security_file_ioctl+0x89/0xb0 [ 447.032806] SyS_ioctl+0x8f/0xc0 [ 447.036232] ? do_vfs_ioctl+0x1060/0x1060 [ 447.040372] do_syscall_64+0x1e8/0x640 [ 447.044253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.049108] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 447.054297] RIP: 0033:0x459829 [ 447.057486] RSP: 002b:00007f6630a1bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.065175] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 447.072426] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 447.079682] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 447.086935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6630a1c6d4 [ 447.094198] R13: 00000000004c277a R14: 00000000004d5c78 R15: 00000000ffffffff [ 447.103235] Mem-Info: [ 447.117548] active_anon:173622 inactive_anon:431377 isolated_anon:0 [ 447.117548] active_file:5066 inactive_file:5026 isolated_file:0 [ 447.117548] unevictable:1429 dirty:263 writeback:0 unstable:0 [ 447.117548] slab_reclaimable:12536 slab_unreclaimable:113952 [ 447.117548] mapped:57529 shmem:266 pagetables:6320 bounce:0 [ 447.117548] free:782838 free_pcp:571 free_cma:0 [ 447.167782] Node 0 active_anon:685936kB inactive_anon:1135336kB active_file:16kB inactive_file:8kB unevictable:1148kB isolated(anon):0kB isolated(file):0kB mapped:210060kB dirty:20kB writeback:0kB shmem:1032kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 1024000kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 447.203213] Node 1 active_anon:8560kB inactive_anon:590164kB active_file:19548kB inactive_file:20100kB unevictable:20668kB isolated(anon):0kB isolated(file):0kB mapped:20756kB dirty:1040kB writeback:0kB shmem:32kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 447.236557] Node 0 DMA free:10528kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:4492kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 447.269497] lowmem_reserve[]: 0 2580 2580 2580 [ 447.274306] Node 0 DMA32 free:36376kB min:36468kB low:45584kB high:54700kB active_anon:685936kB inactive_anon:1130844kB active_file:16kB inactive_file:808kB unevictable:248kB writepending:20kB present:3129332kB managed:2644896kB mlocked:256kB kernel_stack:12256kB pagetables:20732kB bounce:0kB free_pcp:1384kB local_pcp:692kB free_cma:0kB [ 447.311872] lowmem_reserve[]: 0 0 0 0 02:05:19 executing program 3 (fault-call:0 fault-nth:94): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) [ 447.315852] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 447.372416] lowmem_reserve[]: 0 0 0 0 [ 447.383145] Node 1 Normal free:3069636kB min:53420kB low:66772kB high:80124kB active_anon:8604kB inactive_anon:608520kB active_file:22232kB inactive_file:20100kB unevictable:0kB writepending:1040kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:1440kB pagetables:5020kB bounce:0kB free_pcp:532kB local_pcp:140kB free_cma:0kB [ 447.467185] lowmem_reserve[]: 0 [ 447.475595] FAULT_INJECTION: forcing a failure. [ 447.475595] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 447.488863] 0 0 0 [ 447.491899] Node 0 DMA: 2*4kB (UM) 1*8kB (U) 1*16kB (M) 2*32kB (UM) 1*64kB (M) 1*128kB (U) 2*256kB (U) 1*512kB (M) 1*1024kB (M) 0*2048kB 2*4096kB (M) = 10528kB [ 447.518759] CPU: 0 PID: 21155 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 447.525896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.535252] Call Trace: [ 447.537853] dump_stack+0x138/0x19c [ 447.541492] should_fail.cold+0x10f/0x159 [ 447.545650] ? __might_sleep+0x93/0xb0 [ 447.549546] __alloc_pages_nodemask+0x1d6/0x7a0 [ 447.554231] ? __alloc_pages_slowpath+0x2930/0x2930 [ 447.559286] ? __handle_mm_fault+0x1c49/0x3470 [ 447.563882] alloc_pages_vma+0xc9/0x4c0 [ 447.567497] Node 0 DMA32: [ 447.567872] __handle_mm_fault+0x18f3/0x3470 [ 447.567875] 1306*4kB (UME) [ 447.570741] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 447.570754] ? find_held_lock+0x35/0x130 [ 447.570764] ? handle_mm_fault+0x1b6/0x7c0 [ 447.570785] handle_mm_fault+0x293/0x7c0 [ 447.570800] __get_user_pages+0x465/0x1230 [ 447.570819] ? follow_page_mask+0x1560/0x1560 [ 447.570841] ? __mm_populate+0x1e5/0x2c0 [ 447.570857] populate_vma_page_range+0x18e/0x230 [ 447.578238] 206*8kB [ 447.582931] __mm_populate+0x198/0x2c0 [ 447.582946] ? populate_vma_page_range+0x230/0x230 [ 447.582960] SyS_mlockall+0x405/0x530 [ 447.582968] ? SyS_munlock+0xf0/0xf0 [ 447.582980] do_syscall_64+0x1e8/0x640 [ 447.582989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.583006] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 447.583015] RIP: 0033:0x459829 [ 447.583023] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 [ 447.588667] (UME) [ 447.591291] ORIG_RAX: 0000000000000097 [ 447.591298] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 447.591303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 447.591309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 447.591315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 447.591321] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 447.699202] 49*16kB (UME) 230*32kB (UME) 7*64kB (UME) 41*128kB (UME) 33*256kB (UME) 12*512kB (UME) 1*1024kB (U) 0*2048kB 0*4096kB = 36328kB [ 447.712078] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 447.723010] Node 1 Normal: 101*4kB (UM) 12*8kB (UME) 4*16kB (UME) 6*32kB (UME) 6*64kB (UE) 5*128kB (UME) 1*256kB (M) 3*512kB (UME) 2*1024kB (UM) 1*2048kB (E) 743*4096kB (UM) = 3050996kB [ 447.739926] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 447.749016] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 447.757720] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 02:05:20 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 447.766669] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 447.776322] 11142 total pagecache pages [ 447.781003] 0 pages in swap cache [ 447.784569] Swap cache stats: add 0, delete 0, find 0/0 [ 447.789988] Free swap = 0kB [ 447.793289] Total swap = 0kB [ 447.796382] 1965979 pages RAM [ 447.799547] 0 pages HighMem/MovableOnly [ 447.803661] 333226 pages reserved [ 447.807181] 0 pages cma reserved 02:05:20 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 3 (fault-call:0 fault-nth:95): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 447.931972] FAULT_INJECTION: forcing a failure. [ 447.931972] name failslab, interval 1, probability 0, space 0, times 0 [ 448.012687] CPU: 0 PID: 21172 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 448.019828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.027166] FAULT_INJECTION: forcing a failure. [ 448.027166] name failslab, interval 1, probability 0, space 0, times 0 [ 448.035350] Call Trace: [ 448.035371] dump_stack+0x138/0x19c [ 448.035390] should_fail.cold+0x10f/0x159 [ 448.035407] should_failslab+0xdb/0x130 [ 448.035419] __kmalloc+0x2f0/0x7a0 [ 448.035430] ? mark_held_locks+0xb1/0x100 [ 448.035454] ? __local_bh_enable_ip+0x99/0x1a0 [ 448.035591] ? sock_kmalloc+0x7f/0xc0 [ 448.076983] sock_kmalloc+0x7f/0xc0 [ 448.080695] af_alg_alloc_areq+0x24/0x1e0 [ 448.084859] skcipher_recvmsg+0x741/0xd40 [ 448.089042] ? retint_kernel+0x2d/0x2d [ 448.092931] ? skcipher_release+0x50/0x50 [ 448.092941] ? selinux_socket_recvmsg+0x36/0x40 [ 448.092953] ? security_socket_recvmsg+0x91/0xc0 [ 448.092968] ? skcipher_release+0x50/0x50 02:05:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 448.110650] sock_recvmsg+0xc6/0x110 [ 448.114362] ? __sock_recv_ts_and_drops+0x470/0x470 [ 448.119393] ___sys_recvmsg+0x21f/0x4d0 [ 448.123374] ? ___sys_sendmsg+0x840/0x840 [ 448.127528] ? __fget+0x210/0x370 [ 448.130996] ? lock_downgrade+0x6e0/0x6e0 [ 448.135156] ? __fget+0x237/0x370 [ 448.138614] ? __fget_light+0x172/0x1f0 [ 448.142599] ? __fdget+0x1b/0x20 [ 448.145971] ? sockfd_lookup_light+0xb4/0x160 [ 448.150474] __sys_recvmmsg+0x226/0x6b0 [ 448.154461] ? SyS_recvmsg+0x50/0x50 [ 448.158180] ? lock_downgrade+0x6e0/0x6e0 [ 448.162344] ? __mutex_unlock_slowpath+0x71/0x800 [ 448.167192] ? check_preemption_disabled+0x3c/0x250 [ 448.172232] SyS_recvmmsg+0x125/0x140 [ 448.176032] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.180178] ? do_syscall_64+0x53/0x640 [ 448.184160] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.188316] do_syscall_64+0x1e8/0x640 [ 448.192205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.197056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 448.202235] RIP: 0033:0x459829 [ 448.202241] RSP: 002b:00007f6630a1bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 02:05:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 448.202251] RAX: ffffffffffffffda RBX: 00007f6630a1bc90 RCX: 0000000000459829 [ 448.202257] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 448.202263] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.202268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6630a1c6d4 [ 448.202274] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 [ 448.259273] CPU: 1 PID: 21183 Comm: syz-executor.4 Not tainted 4.14.134 #30 [ 448.266395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.275746] Call Trace: [ 448.278342] dump_stack+0x138/0x19c [ 448.281981] should_fail.cold+0x10f/0x159 [ 448.286135] should_failslab+0xdb/0x130 [ 448.290119] __kmalloc+0x2f0/0x7a0 [ 448.293670] ? mark_held_locks+0xb1/0x100 [ 448.297823] ? __local_bh_enable_ip+0x99/0x1a0 [ 448.302407] ? sock_kmalloc+0x7f/0xc0 [ 448.306219] sock_kmalloc+0x7f/0xc0 [ 448.309850] af_alg_alloc_areq+0x24/0x1e0 [ 448.314005] skcipher_recvmsg+0x741/0xd40 [ 448.318164] ? skcipher_release+0x50/0x50 [ 448.321637] FAULT_INJECTION: forcing a failure. [ 448.321637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 448.322308] ? selinux_socket_recvmsg+0x36/0x40 [ 448.322322] ? security_socket_recvmsg+0x91/0xc0 [ 448.322343] ? skcipher_release+0x50/0x50 [ 448.347676] sock_recvmsg+0xc6/0x110 [ 448.351388] ? __sock_recv_ts_and_drops+0x470/0x470 [ 448.356401] ___sys_recvmsg+0x21f/0x4d0 [ 448.360464] ? ___sys_sendmsg+0x840/0x840 [ 448.364609] ? __fget+0x210/0x370 [ 448.368071] ? lock_downgrade+0x6e0/0x6e0 [ 448.372225] ? __fget+0x237/0x370 [ 448.375678] ? __fget_light+0x172/0x1f0 [ 448.379651] ? __fdget+0x1b/0x20 [ 448.383012] ? sockfd_lookup_light+0xb4/0x160 [ 448.387502] __sys_recvmmsg+0x226/0x6b0 [ 448.391477] ? SyS_recvmsg+0x50/0x50 [ 448.395184] ? lock_downgrade+0x6e0/0x6e0 [ 448.399341] ? __mutex_unlock_slowpath+0x71/0x800 [ 448.404180] ? check_preemption_disabled+0x3c/0x250 [ 448.409210] SyS_recvmmsg+0x125/0x140 [ 448.413013] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.417156] ? do_syscall_64+0x53/0x640 [ 448.421132] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.425278] do_syscall_64+0x1e8/0x640 [ 448.429159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.434005] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 448.439190] RIP: 0033:0x459829 [ 448.442371] RSP: 002b:00007f1f7b188c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 448.450076] RAX: ffffffffffffffda RBX: 00007f1f7b188c90 RCX: 0000000000459829 [ 448.457343] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 448.464614] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.471878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1f7b1896d4 [ 448.479139] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 [ 448.486425] CPU: 0 PID: 21188 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 448.493531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.502887] Call Trace: [ 448.505475] dump_stack+0x138/0x19c [ 448.505493] should_fail.cold+0x10f/0x159 [ 448.505504] ? __might_sleep+0x93/0xb0 [ 448.505516] __alloc_pages_nodemask+0x1d6/0x7a0 [ 448.513275] ? __alloc_pages_slowpath+0x2930/0x2930 [ 448.513285] ? __handle_mm_fault+0x1c49/0x3470 [ 448.513305] alloc_pages_vma+0xc9/0x4c0 [ 448.513319] __handle_mm_fault+0x18f3/0x3470 [ 448.513333] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 448.513344] ? find_held_lock+0x35/0x130 [ 448.513353] ? handle_mm_fault+0x1b6/0x7c0 [ 448.513374] handle_mm_fault+0x293/0x7c0 [ 448.521908] __get_user_pages+0x465/0x1230 [ 448.521927] ? follow_page_mask+0x1560/0x1560 [ 448.521942] ? __mm_populate+0x1e5/0x2c0 [ 448.521955] populate_vma_page_range+0x18e/0x230 [ 448.521968] __mm_populate+0x198/0x2c0 [ 448.521984] ? populate_vma_page_range+0x230/0x230 [ 448.531561] SyS_mlockall+0x405/0x530 [ 448.531570] ? SyS_munlock+0xf0/0xf0 [ 448.531582] do_syscall_64+0x1e8/0x640 [ 448.531591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.531608] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 448.531617] RIP: 0033:0x459829 02:05:21 executing program 0 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 448.531622] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 448.539988] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 448.539994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 448.540000] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.540006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 448.540012] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 448.725839] FAULT_INJECTION: forcing a failure. [ 448.725839] name failslab, interval 1, probability 0, space 0, times 0 [ 448.741890] CPU: 1 PID: 21206 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 448.749006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.758369] Call Trace: [ 448.760975] dump_stack+0x138/0x19c [ 448.764622] should_fail.cold+0x10f/0x159 [ 448.768785] should_failslab+0xdb/0x130 [ 448.772767] __kmalloc+0x2f0/0x7a0 [ 448.776354] ? af_alg_get_rsgl+0x3d1/0x530 [ 448.780600] ? sock_kmalloc+0x7f/0xc0 [ 448.784407] sock_kmalloc+0x7f/0xc0 [ 448.788053] skcipher_recvmsg+0x217/0xd40 [ 448.792220] ? skcipher_release+0x50/0x50 [ 448.796389] ? selinux_socket_recvmsg+0x36/0x40 [ 448.801063] ? security_socket_recvmsg+0x91/0xc0 [ 448.805825] ? skcipher_release+0x50/0x50 [ 448.809980] sock_recvmsg+0xc6/0x110 [ 448.813696] ? __sock_recv_ts_and_drops+0x470/0x470 [ 448.818719] ___sys_recvmsg+0x21f/0x4d0 [ 448.822701] ? ___sys_sendmsg+0x840/0x840 [ 448.826853] ? __fget+0x210/0x370 [ 448.830317] ? lock_downgrade+0x6e0/0x6e0 [ 448.834477] ? __fget+0x237/0x370 [ 448.837933] ? __fget_light+0x172/0x1f0 [ 448.841911] ? __fdget+0x1b/0x20 [ 448.845278] ? sockfd_lookup_light+0xb4/0x160 [ 448.849774] __sys_recvmmsg+0x226/0x6b0 [ 448.853762] ? SyS_recvmsg+0x50/0x50 [ 448.857479] ? lock_downgrade+0x6e0/0x6e0 [ 448.861632] ? __mutex_unlock_slowpath+0x71/0x800 [ 448.866480] ? check_preemption_disabled+0x3c/0x250 [ 448.871520] SyS_recvmmsg+0x125/0x140 [ 448.875327] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.879486] ? do_syscall_64+0x53/0x640 [ 448.883466] ? __sys_recvmmsg+0x6b0/0x6b0 [ 448.887619] do_syscall_64+0x1e8/0x640 [ 448.891508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.896372] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 448.901556] RIP: 0033:0x459829 [ 448.904743] RSP: 002b:00007f6630a1bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 448.912450] RAX: ffffffffffffffda RBX: 00007f6630a1bc90 RCX: 0000000000459829 [ 448.919717] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 448.926983] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.934247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6630a1c6d4 [ 448.942049] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 02:05:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0x7) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000001c0)=@gcm_256={{0x304}, "0d933a4621aa2288", "3a41798d1e1a3273fff0f20ef7b6ef95b06944d6a3cc8774c17e154882a6e510", "11248561", "46dc90a2af3324bc"}, 0x38) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0xa02, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000000100), 0x1) 02:05:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 0 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 2 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:21 executing program 3 (fault-call:0 fault-nth:96): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 449.098722] FAULT_INJECTION: forcing a failure. [ 449.098722] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.112087] FAULT_INJECTION: forcing a failure. [ 449.112087] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.115545] CPU: 1 PID: 21221 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 449.130997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.140349] Call Trace: [ 449.142944] dump_stack+0x138/0x19c [ 449.146574] should_fail.cold+0x10f/0x159 [ 449.150722] ? __might_sleep+0x93/0xb0 [ 449.154611] __alloc_pages_nodemask+0x1d6/0x7a0 [ 449.159281] ? __alloc_pages_slowpath+0x2930/0x2930 [ 449.164296] ? __handle_mm_fault+0x1c49/0x3470 [ 449.168888] alloc_pages_vma+0xc9/0x4c0 [ 449.172864] __handle_mm_fault+0x18f3/0x3470 [ 449.177276] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 449.182025] ? find_held_lock+0x35/0x130 [ 449.186079] ? handle_mm_fault+0x1b6/0x7c0 [ 449.190314] ? sync_mm_rss+0x11d/0x190 [ 449.194206] handle_mm_fault+0x293/0x7c0 [ 449.198270] __get_user_pages+0x465/0x1230 [ 449.202512] ? follow_page_mask+0x1560/0x1560 [ 449.207006] ? __mm_populate+0x1e5/0x2c0 [ 449.211065] populate_vma_page_range+0x18e/0x230 [ 449.215845] __mm_populate+0x198/0x2c0 [ 449.219737] ? populate_vma_page_range+0x230/0x230 [ 449.224669] SyS_mlockall+0x405/0x530 [ 449.228461] ? SyS_munlock+0xf0/0xf0 [ 449.232170] do_syscall_64+0x1e8/0x640 [ 449.236049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.240896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.246086] RIP: 0033:0x459829 [ 449.249268] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 449.256986] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 449.264249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 449.271517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.278785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 449.286067] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 [ 449.293363] CPU: 0 PID: 21225 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 449.300471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.309822] Call Trace: [ 449.312418] dump_stack+0x138/0x19c [ 449.316058] should_fail.cold+0x10f/0x159 [ 449.320225] __alloc_pages_nodemask+0x1d6/0x7a0 [ 449.324900] ? ____cache_alloc_node+0x162/0x1d0 [ 449.329572] ? __alloc_pages_slowpath+0x2930/0x2930 [ 449.334592] ? ____cache_alloc_node+0x162/0x1d0 [ 449.339299] cache_grow_begin+0x80/0x400 [ 449.343374] ____cache_alloc_node+0x17c/0x1d0 [ 449.347880] __kmalloc+0x21a/0x7a0 [ 449.351432] ? lock_sock_nested+0x8c/0x110 [ 449.355670] ? sock_kmalloc+0x7f/0xc0 [ 449.359481] sock_kmalloc+0x7f/0xc0 [ 449.361367] FAULT_INJECTION: forcing a failure. [ 449.361367] name failslab, interval 1, probability 0, space 0, times 0 [ 449.363114] af_alg_alloc_areq+0x24/0x1e0 [ 449.363127] skcipher_recvmsg+0x741/0xd40 [ 449.363148] ? skcipher_release+0x50/0x50 [ 449.386746] ? selinux_socket_recvmsg+0x36/0x40 [ 449.391418] ? security_socket_recvmsg+0x91/0xc0 [ 449.396178] ? skcipher_release+0x50/0x50 [ 449.400361] sock_recvmsg+0xc6/0x110 [ 449.404078] ? __sock_recv_ts_and_drops+0x470/0x470 [ 449.409096] ___sys_recvmsg+0x21f/0x4d0 [ 449.413077] ? ___sys_sendmsg+0x840/0x840 [ 449.417227] ? __fget+0x210/0x370 [ 449.420704] ? lock_downgrade+0x6e0/0x6e0 [ 449.424868] ? __fget+0x237/0x370 [ 449.428325] ? __fget_light+0x172/0x1f0 [ 449.432304] ? __fdget+0x1b/0x20 [ 449.435674] ? sockfd_lookup_light+0xb4/0x160 [ 449.440173] __sys_recvmmsg+0x226/0x6b0 [ 449.444165] ? SyS_recvmsg+0x50/0x50 [ 449.447880] ? lock_downgrade+0x6e0/0x6e0 [ 449.452476] ? __mutex_unlock_slowpath+0x71/0x800 [ 449.457321] ? check_preemption_disabled+0x3c/0x250 [ 449.462358] SyS_recvmmsg+0x125/0x140 [ 449.466162] ? __sys_recvmmsg+0x6b0/0x6b0 [ 449.470313] ? do_syscall_64+0x53/0x640 [ 449.474300] ? __sys_recvmmsg+0x6b0/0x6b0 [ 449.478461] do_syscall_64+0x1e8/0x640 [ 449.482348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.487197] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.492385] RIP: 0033:0x459829 [ 449.495578] RSP: 002b:00007f6630a1bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 449.503344] RAX: ffffffffffffffda RBX: 00007f6630a1bc90 RCX: 0000000000459829 [ 449.510613] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 449.517901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.525440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6630a1c6d4 [ 449.532712] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 [ 449.540011] CPU: 1 PID: 21224 Comm: syz-executor.2 Not tainted 4.14.134 #30 [ 449.547126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.556488] Call Trace: [ 449.559087] dump_stack+0x138/0x19c [ 449.562735] should_fail.cold+0x10f/0x159 [ 449.566887] should_failslab+0xdb/0x130 [ 449.570860] __kmalloc+0x2f0/0x7a0 [ 449.570872] ? mark_held_locks+0xb1/0x100 [ 449.570883] ? __local_bh_enable_ip+0x99/0x1a0 [ 449.570893] ? sock_kmalloc+0x7f/0xc0 [ 449.570905] sock_kmalloc+0x7f/0xc0 [ 449.570920] af_alg_alloc_areq+0x24/0x1e0 [ 449.594705] skcipher_recvmsg+0x741/0xd40 [ 449.598875] ? skcipher_release+0x50/0x50 [ 449.598886] ? selinux_socket_recvmsg+0x36/0x40 [ 449.598899] ? security_socket_recvmsg+0x91/0xc0 [ 449.598911] ? skcipher_release+0x50/0x50 [ 449.616638] sock_recvmsg+0xc6/0x110 [ 449.620368] ? __sock_recv_ts_and_drops+0x470/0x470 [ 449.625392] ___sys_recvmsg+0x21f/0x4d0 [ 449.625407] ? ___sys_sendmsg+0x840/0x840 [ 449.625420] ? __fget+0x210/0x370 [ 449.625439] ? lock_downgrade+0x6e0/0x6e0 [ 449.625452] ? __fget+0x237/0x370 [ 449.644599] ? __fget_light+0x172/0x1f0 [ 449.648590] ? __fdget+0x1b/0x20 [ 449.651959] ? sockfd_lookup_light+0xb4/0x160 [ 449.656453] __sys_recvmmsg+0x226/0x6b0 [ 449.656470] ? SyS_recvmsg+0x50/0x50 [ 449.656483] ? lock_downgrade+0x6e0/0x6e0 [ 449.656504] ? __mutex_unlock_slowpath+0x71/0x800 [ 449.673252] ? check_preemption_disabled+0x3c/0x250 [ 449.678296] SyS_recvmmsg+0x125/0x140 [ 449.682110] ? __sys_recvmmsg+0x6b0/0x6b0 [ 449.686263] ? do_syscall_64+0x53/0x640 [ 449.690240] ? __sys_recvmmsg+0x6b0/0x6b0 [ 449.694398] do_syscall_64+0x1e8/0x640 02:05:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0xfffffffffffffffd}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 449.698287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.698306] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.698314] RIP: 0033:0x459829 [ 449.698320] RSP: 002b:00007f7f1b1e1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 449.698337] RAX: ffffffffffffffda RBX: 00007f7f1b1e1c90 RCX: 0000000000459829 [ 449.698346] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 449.726488] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 449.726494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f1b1e26d4 02:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 449.726500] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 02:05:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x5d9e, 0x4, &(0x7f0000000440)=[{&(0x7f0000000180)="f84c0f7a6d05b4f5bdedd4fad0953eb1e203bcde6407220f1faa4f7ccf0c22c24b6617ffb0305d918c625e2a1771ac28b76400e09ab3c9cd190ec441065a690936bdd5ad8822627f1269592d08c770d11160ea6f468dcad7b237a505b784082c721d2d486a431967e61c571da412d5a9e20dd949f684a7ad85b29f5db39021fd486abf682e9abf2ea7af4bb1179bbec442ad4f0ead3a85599d5d22f06d72b0a2b75bbf09f2c094fcf659d2c871da0904b66c3f522207e48e02d20236f8f198e22dffc5e5aca48e2cd00a60ef43605c15d5", 0xd1, 0xfff}, {&(0x7f0000000300)="c0d7dd398f066697480ca0864c096be81e0cbe9100ae479c1ae0bdd25c106d3ca9f614d5c155076592c3997295593241c70dc69c19d593cc1f25dc8ee1403ea922a718f9023c7eee91b7f5af4a4c2299ad9ffb2a4f4a7b267b5fa56dca34", 0x5e, 0x9}, {&(0x7f0000000380)="5543c0c423105cfb9a79aeeff52e123e9ce032423d6495137f9d347be6ca06e7c29dc85b2e439b", 0x27}, {&(0x7f00000003c0)="44b94c4e227efa159d95602bfe1b991386b83b9332a7c015d22beec45cbcdb0e818a10ab85f79e211974c3eb49d5b2024b4fd6c9c754712bab7e7074d38bea5733c130164e141ceb887cb63da27fef5289a2406864fce03769f9c5b210663c7c1a9cba6ab589", 0x66, 0x915}], 0x8408, &(0x7f00000005c0)={[{@nodiscard='nodiscard'}, {@nodiscard='nodiscard'}, {@nosuiddir='nosuiddir'}, {@hostdata={'hostdata', 0x3d, 'vmnet1'}}, {@ignore_local_fs='ignore_local_fs'}, {@quota_on='quota=on'}, {@quota_quantum={'quota_quantum', 0x3d, 0xfffffffffffffffe}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, 'bdev,--^*'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@appraise_type='appraise_type=imasig'}]}) perf_event_open(&(0x7f00004e7000)={0x2, 0x229, 0x20000001b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 2 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 449.921868] FAULT_INJECTION: forcing a failure. [ 449.921868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 449.933710] CPU: 1 PID: 21256 Comm: syz-executor.2 Not tainted 4.14.134 #30 [ 449.940806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.941896] gfs2: quota_quantum mount option requires a positive numeric argument [ 449.950258] Call Trace: [ 449.950280] dump_stack+0x138/0x19c [ 449.950301] should_fail.cold+0x10f/0x159 [ 449.950319] __alloc_pages_nodemask+0x1d6/0x7a0 [ 449.950343] ? __alloc_pages_slowpath+0x2930/0x2930 [ 449.950369] cache_grow_begin+0x80/0x400 [ 449.986196] __kmalloc+0x6bf/0x7a0 [ 449.989731] ? mark_held_locks+0xb1/0x100 [ 449.993877] ? sock_kmalloc+0x7f/0xc0 [ 449.997673] sock_kmalloc+0x7f/0xc0 [ 450.001295] af_alg_alloc_areq+0x24/0x1e0 [ 450.005434] skcipher_recvmsg+0x741/0xd40 [ 450.009590] ? skcipher_release+0x50/0x50 [ 450.013730] ? selinux_socket_recvmsg+0x36/0x40 [ 450.018395] ? security_socket_recvmsg+0x91/0xc0 [ 450.023148] ? skcipher_release+0x50/0x50 [ 450.027805] sock_recvmsg+0xc6/0x110 [ 450.032904] ? __sock_recv_ts_and_drops+0x470/0x470 [ 450.037918] ___sys_recvmsg+0x21f/0x4d0 [ 450.041891] ? ___sys_sendmsg+0x840/0x840 [ 450.046035] ? __fget+0x210/0x370 [ 450.049490] ? lock_downgrade+0x6e0/0x6e0 [ 450.053642] ? __fget+0x237/0x370 [ 450.057093] ? __fget_light+0x172/0x1f0 [ 450.061061] ? __fdget+0x1b/0x20 [ 450.064433] ? sockfd_lookup_light+0xb4/0x160 [ 450.069389] __sys_recvmmsg+0x226/0x6b0 [ 450.073385] ? SyS_recvmsg+0x50/0x50 [ 450.077096] ? lock_downgrade+0x6e0/0x6e0 [ 450.081243] ? __mutex_unlock_slowpath+0x71/0x800 [ 450.086077] ? check_preemption_disabled+0x3c/0x250 [ 450.091099] SyS_recvmmsg+0x125/0x140 [ 450.094892] ? __sys_recvmmsg+0x6b0/0x6b0 [ 450.099030] ? do_syscall_64+0x53/0x640 [ 450.102999] ? __sys_recvmmsg+0x6b0/0x6b0 [ 450.107140] do_syscall_64+0x1e8/0x640 [ 450.111109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.115946] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 450.121126] RIP: 0033:0x459829 [ 450.124300] RSP: 002b:00007f7f1b1e1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 450.132012] RAX: ffffffffffffffda RBX: 00007f7f1b1e1c90 RCX: 0000000000459829 [ 450.139277] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 450.146540] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 450.153799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7f1b1e26d4 [ 450.161061] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 [ 450.186701] gfs2: can't parse mount arguments 02:05:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x404482) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000100)={0x3ff, 0x9, 0xa247}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 3 (fault-call:0 fault-nth:97): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 2 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) connect$vsock_stream(r1, &(0x7f0000000100), 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 450.448125] gfs2: quota_quantum mount option requires a positive numeric argument [ 450.467762] gfs2: can't parse mount arguments 02:05:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14, 0x49, 0x0, {0x10000000000000}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 450.490171] FAULT_INJECTION: forcing a failure. [ 450.490171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x400}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0x4, 0x2, 0x6}, &(0x7f00000001c0)=0xffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x5}}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) mount$9p_rdma(&(0x7f0000000400)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x2100000, &(0x7f0000000500)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x6}}], [{@permit_directio='permit_directio'}, {@uid_gt={'uid>', r2}}]}}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r1, 0x4) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 450.585811] CPU: 0 PID: 21283 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 450.592960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.602313] Call Trace: [ 450.604908] dump_stack+0x138/0x19c [ 450.608546] should_fail.cold+0x10f/0x159 [ 450.612698] ? __might_sleep+0x93/0xb0 [ 450.616595] __alloc_pages_nodemask+0x1d6/0x7a0 [ 450.621271] ? __alloc_pages_slowpath+0x2930/0x2930 [ 450.626289] ? __handle_mm_fault+0x1c49/0x3470 [ 450.630884] alloc_pages_vma+0xc9/0x4c0 [ 450.634870] __handle_mm_fault+0x18f3/0x3470 [ 450.639279] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 450.644034] ? find_held_lock+0x35/0x130 [ 450.648088] ? handle_mm_fault+0x1b6/0x7c0 [ 450.652329] handle_mm_fault+0x293/0x7c0 [ 450.656394] __get_user_pages+0x465/0x1230 [ 450.660626] ? follow_page_mask+0x1560/0x1560 [ 450.665130] ? __mm_populate+0x1e5/0x2c0 [ 450.669184] populate_vma_page_range+0x18e/0x230 [ 450.673936] __mm_populate+0x198/0x2c0 [ 450.677819] ? populate_vma_page_range+0x230/0x230 [ 450.682761] SyS_mlockall+0x405/0x530 [ 450.686551] ? SyS_munlock+0xf0/0xf0 [ 450.690257] do_syscall_64+0x1e8/0x640 [ 450.694137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.698978] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 450.704157] RIP: 0033:0x459829 [ 450.707333] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 450.715033] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 450.722294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 02:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000f00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000e80)=[{{&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/17, 0x11}, {&(0x7f00000001c0)=""/184, 0xb8}, {&(0x7f0000000300)=""/145, 0x91}, {&(0x7f00000003c0)=""/213, 0xd5}, {&(0x7f00000004c0)=""/41, 0x29}, {&(0x7f00000005c0)=""/144, 0x90}], 0x6, &(0x7f0000000680)=""/125, 0x7d}, 0x8001}, {{&(0x7f0000000700)=@x25, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000780)=""/120, 0x78}, {&(0x7f0000000800)=""/64, 0x40}, {&(0x7f0000000840)=""/239, 0xef}, {&(0x7f0000000940)=""/21, 0x15}, {&(0x7f0000000980)=""/7, 0x7}, {&(0x7f00000009c0)=""/206, 0xce}, {&(0x7f0000000ac0)=""/208, 0xd0}, {&(0x7f0000000bc0)=""/253, 0xfd}, {&(0x7f0000000cc0)=""/45, 0x2d}], 0x9, &(0x7f0000000dc0)=""/175, 0xaf}, 0x3}], 0x2, 0x2, &(0x7f0000000f40)={r1, r2+30000000}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/uinput\x00', 0x802, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r3, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000fc0)=""/94, 0x5e}, {&(0x7f0000001040)=""/35, 0x23}, {&(0x7f0000001080)=""/172, 0xac}], 0x3, &(0x7f0000001180)=""/84, 0x54}, 0x800}, {{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000001200)=""/233, 0xe9}, {&(0x7f0000001300)=""/99, 0x63}, {&(0x7f0000001380)=""/118, 0x76}, {&(0x7f0000001400)=""/9, 0x9}, {&(0x7f0000001440)=""/219, 0xdb}], 0x5, &(0x7f00000015c0)=""/148, 0x94}, 0x1}], 0x2, 0x2000, &(0x7f0000001700)={0x0, 0x989680}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001740), &(0x7f0000001780)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r5, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 450.729563] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 450.736824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 450.744087] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 3 (fault-call:0 fault-nth:98): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x181001, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000180)={[0x100002, 0x10f000, 0x1, 0x3000], 0x3, 0x8, 0x8}) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:23 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)={0x2, 0x4459, 0xf4, 0x10001, 0x9, 0x1000, 0x8, 0x9, 0x380068c3, 0x1bc4, 0x100, 0x10001}) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="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", 0x140cf53073146d49) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$TIOCSCTTY(r0, 0x540e, 0xc00000000000) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000180)={0x117, 0x80000000, 0x1}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x9, 0x4) 02:05:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 451.124551] Unknown ioctl 1082175138 02:05:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 451.162901] FAULT_INJECTION: forcing a failure. [ 451.162901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 451.194764] Unknown ioctl 1082175138 [ 451.199002] CPU: 1 PID: 21333 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 451.206113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.215467] Call Trace: [ 451.218061] dump_stack+0x138/0x19c [ 451.221701] should_fail.cold+0x10f/0x159 [ 451.225945] ? __might_sleep+0x93/0xb0 [ 451.229828] __alloc_pages_nodemask+0x1d6/0x7a0 [ 451.234500] ? __alloc_pages_slowpath+0x2930/0x2930 [ 451.239521] ? __handle_mm_fault+0x1c49/0x3470 [ 451.244121] alloc_pages_vma+0xc9/0x4c0 [ 451.248111] __handle_mm_fault+0x18f3/0x3470 [ 451.252531] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 451.257293] ? find_held_lock+0x35/0x130 02:05:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='teql0\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x800, 0x7) getpeername$netrom(r1, &(0x7f00000000c0)={{0x3, @default}, [@netrom, @bcast, @netrom, @default, @null, @bcast, @rose, @default]}, &(0x7f0000000180)=0x48) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 451.261362] ? handle_mm_fault+0x1b6/0x7c0 [ 451.265619] handle_mm_fault+0x293/0x7c0 [ 451.269689] __get_user_pages+0x465/0x1230 [ 451.273946] ? follow_page_mask+0x1560/0x1560 [ 451.278457] ? __mm_populate+0x1e5/0x2c0 [ 451.282521] populate_vma_page_range+0x18e/0x230 [ 451.287286] __mm_populate+0x198/0x2c0 [ 451.291185] ? populate_vma_page_range+0x230/0x230 [ 451.296119] SyS_mlockall+0x405/0x530 [ 451.299911] ? SyS_munlock+0xf0/0xf0 [ 451.303629] do_syscall_64+0x1e8/0x640 [ 451.307538] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:05:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="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", 0xfc}, {&(0x7f0000000300)="253276932d252e3495a01b9123930a4c5796e58a38eee36f16cdf7e84d225305230a62b6b69d84f5a6ebb59037d021d495717c4f8caee8140cde39c9e710340b23be7e1f19a34a4d5ae017bdcb3169329f464c5a2368236c32dbf1c65a7ecaed1c2d39886c33a1c490c2f596e2381bb82d3344199d4e128dc36b4188", 0x7c}, {&(0x7f0000000380)="503e8954e98cff47b904fc6f58f0c10672642072c6d5b1e1147294a393865465ec6471b548977251116adb117ab3af5fda7b93342f8a7e722a0c625013b47d17e57d4d23b2f23b0a016408689f05839266a2b00d26f9c868b127f11e4eae3fb5d52f5aa49b40c3bf3dd75479c5204f8552e2e2f2da4896407cfaf02bb190256ac67f0c8b363c35332807b56d01002eb2dd38e324a10d3ef2af88b1abc670640f1beda3047971d4ed98f25de1ed06ca7fe28778ab0aa1703663f5d5303442059bb2dead062ec79437d30d4d591f0b49f5396a1eb2f491e9cac0ecc71836106c53666c90fa4c4e8d9c59b00d826d13", 0xee}], 0x3, 0x0, 0x0, 0x8000}, 0x80) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 451.312391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 451.317585] RIP: 0033:0x459829 [ 451.320778] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 451.328492] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 451.335762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 451.343033] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 451.350307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 02:05:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000200)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x2, 0x56}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000300)={0x14, 0x49, 0x0, {0x10000000000003}}, 0x14) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000180)={{0x3b, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e20, 0x4, 'lblcr\x00', 0x9, 0x400, 0x5}, {@remote, 0x4e23, 0x0, 0x2, 0x7, 0x6}}, 0x44) open(&(0x7f0000000240)='./file0\x00', 0x4000, 0x10) 02:05:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x503640) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x24) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={r2, 0x2}, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 451.357584] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:24 executing program 3 (fault-call:0 fault-nth:99): mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x401, 0x200a00) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000100)=0x2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) socket$alg(0x26, 0x5, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x3000, 0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x7, 0x34040) getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000240)=0x4) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000001c0)={0x7, 0x80}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0xfff, "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", 0x61, 0x200, 0x8, 0x9, 0x4, 0x40, 0x0, 0x1}, r2}}, 0x128) r3 = accept$alg(r0, 0x0, 0x0) socketpair(0x5, 0x3, 0xe7f, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x7, 0x8000, 0x71c75ad5, 0x2, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r5, 0x4) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000440)=0x28000) 02:05:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000300)={0x7fffffff, 0x5, 0x1, 0x0, 0x0, [], [], [], 0x800, 0x100000001}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000180)=""/183) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/keycreate\x00') ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000100)=0x1) [ 451.760923] FAULT_INJECTION: forcing a failure. [ 451.760923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 02:05:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 451.862890] CPU: 1 PID: 21384 Comm: syz-executor.3 Not tainted 4.14.134 #30 [ 451.870036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.879394] Call Trace: [ 451.881987] dump_stack+0x138/0x19c [ 451.885625] should_fail.cold+0x10f/0x159 [ 451.889775] ? __might_sleep+0x93/0xb0 [ 451.893674] __alloc_pages_nodemask+0x1d6/0x7a0 [ 451.898360] ? __alloc_pages_slowpath+0x2930/0x2930 [ 451.903383] ? __handle_mm_fault+0x1c49/0x3470 [ 451.907987] alloc_pages_vma+0xc9/0x4c0 [ 451.911977] __handle_mm_fault+0x18f3/0x3470 [ 451.916400] ? vm_insert_mixed_mkwrite+0x40/0x40 [ 451.921158] ? find_held_lock+0x35/0x130 [ 451.925223] ? handle_mm_fault+0x1b6/0x7c0 [ 451.929476] handle_mm_fault+0x293/0x7c0 [ 451.933546] __get_user_pages+0x465/0x1230 [ 451.937797] ? follow_page_mask+0x1560/0x1560 [ 451.942300] ? __mm_populate+0x1e5/0x2c0 [ 451.942318] populate_vma_page_range+0x18e/0x230 [ 451.951118] __mm_populate+0x198/0x2c0 [ 451.951132] ? populate_vma_page_range+0x230/0x230 [ 451.951147] SyS_mlockall+0x405/0x530 [ 451.951154] ? SyS_munlock+0xf0/0xf0 [ 451.951167] do_syscall_64+0x1e8/0x640 [ 451.951178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.963863] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 451.963873] RIP: 0033:0x459829 [ 451.963879] RSP: 002b:00007f6a44bcbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 451.963892] RAX: ffffffffffffffda RBX: 00007f6a44bcbc90 RCX: 0000000000459829 [ 451.963897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 451.963906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 451.971508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a44bcc6d4 [ 451.971514] R13: 00000000004c5cfa R14: 00000000004da640 R15: 0000000000000003 02:05:24 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$peekuser(0x3, r2, 0xa70) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$UHID_DESTROY(r3, &(0x7f00000001c0), 0x4) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14, 0x49, 0x40000000, {0xfffffffffffffffc}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000100)={0x1a0, 0x8, 0xdd, 0x100000001, 0x0, 0x6}) 02:05:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x6b, 0xffffffffffffffee, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40000) write$P9_RMKDIR(r2, &(0x7f0000000100)={0x14, 0x49, 0x2, {0x40, 0x3, 0x2}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000180)=0x1e) 02:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x80) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0xfffffdca) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3ff, 0x20440) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x640) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000180)="66b80c0000000f23d80f21f86635c00000600f23f80f01d10f0766b8eec959030f23d80f21f86635c00000c00f23f8660fc730c78100000400ba210066b80080000066efbaf80c66b8e132868b66efbafc0cb02deed3e60f35", 0x59}], 0x1, 0x17e530c7079c61c5, &(0x7f0000000240)=[@dstype3={0x7, 0xd}, @cr4={0x1, 0x200}], 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000300)={0x80000000, 0x107, "9b2d3efdb3cad285fcdb716fa6bebc5e2c4ee5d9a798b9f4e0b82b81f0a057c4", 0x5bd2be2a, 0x4, 0x7, 0x10000, 0x6, 0x5, 0xf4, 0x100000000, [0xcea, 0x7fffffff, 0x5, 0x80000000]}) 02:05:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x4, 0x49, 0x2, {0x20, 0x4, 0xa}}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) getuid() r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0xffffffffffffffff, {0xfffffffffffffffe, 0x0, 0x10}}, 0x14) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}) 02:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:25 executing program 3: mlockall(0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9a, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x5b, "f397fc7aa6f61f6b9a0c1493e4e0063ea439064d73da1970bdeef67b6b6f42add3c0e92272dcc7ba1171de177d9b396c6a25d98b78258975a11cf66e6b58cb7d361ad44bb9477f5324b2fc5f68418880bd0c75a641ae81ab2ded360172285758c2554f1703f891a56c906102bc04c0b510e1079d629a15ef36d8ca275ff9a46b"}) 02:05:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x78) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000300)={@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x202000}, {&(0x7f0000000180)=""/166, 0xa6}, &(0x7f0000000100), 0x42}, 0xa0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) write$rfkill(r1, &(0x7f00000003c0)={0x1, 0x3, 0x2, 0x0, 0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000240)="ab553fec94248c32e27d04000000288a", 0xffffffffffffff28) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x4002) 02:05:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000380)={0x30, 0x21, 0x10, 0xa, 0x8, 0x0, 0x3, 0x1c, 0xffffffffffffffff}) r3 = dup(r1) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socketpair(0xb, 0x4, 0x1, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$MISDN_TIME_STAMP(r6, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0x400000000}}, 0xfffffffffffffd4a) recvmmsg(r5, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x8000000000000}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f00000000c0)) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000680)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000006c0)='syz0\x00') recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000180)=""/74, 0x4a}, {&(0x7f0000000200)=""/85, 0x55}, {&(0x7f0000000300)=""/237, 0xed}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f0000000440)=""/50, 0x32}, {&(0x7f0000000480)=""/224, 0xe0}], 0x7}, 0x2000) 02:05:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffe4a) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x2}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x8000) 02:05:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x4302) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000180)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 3: mlockall(0x3) clone(0x18000006, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) dup(r0) 02:05:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000180)={0x0, 0x3, @raw_data=[0x8, 0x4, 0x1ff, 0x6, 0x4, 0x7, 0x8000, 0x1ff, 0xffffffff00000000, 0x1, 0xffff, 0x6, 0xe8, 0x3ff, 0x100, 0x5]}) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000100)=0x13, 0x0) r2 = accept$alg(r0, 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x4}, [{0x2, 0x1, r3}, {0x2, 0x4, r4}], {}, [{0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x6, r7}], {0x10, 0x4}, {0x20, 0x1}}, 0x4c, 0x2) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) write$selinux_access(r2, &(0x7f0000000180)={'system_u:object_r:anacron_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x1}, 0x48) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000100)=0x100000000) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3af6) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 3: mlockall(0x3) clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x3, 0x49, 0x0, {0x0, 0x100000000000000}}, 0x14) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0210030d160000002abd7000ffdbdf2501001400d3000000040006000104000000000100000000000900000000000000020000000000000002000b00f0da0000370000000016000004000000050000003f000000000000001500000000000000090000000000000002000000eca90000150d00000000000002001000000004d3000004d40000000005001700ff8000000a004e2300000800fe8000000000000000000000000000bbffffff7f00000000"], 0xb0}}, 0x40) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = fcntl$dupfd(r1, 0x0, r1) getsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000001600), &(0x7f0000001640)=0x4) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r1 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000001fdc)=[{}, {{0x77359400}}], 0x259) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000004c0)=0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000100)={0xfffffe40, 0x1f, 0x1001, 0x400000000088}, 0x439) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000000c0)={r1}) getsockopt$inet6_buf(r0, 0x29, 0x2a, &(0x7f0000000500)=""/4096, &(0x7f0000001500)=0x1000) 02:05:27 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x800, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x47) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = shmget(0x3, 0x1000, 0x1800, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000200)=""/58) r2 = accept$alg(r0, 0x0, 0x0) r3 = creat(&(0x7f0000000300)='./file1\x00', 0x1) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000240)=0x7) r4 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40000) bind$rxrpc(r4, &(0x7f00000001c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @mcast1, 0x4}}, 0x24) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x0, 0x1}}, 0xfffffffffffffd28) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="f602000094248c32e2140254602c1ef10e", 0x278) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) write$binfmt_script(r2, &(0x7f0000000300)={'#! ', './file0', [{0x20, 'port0\x00'}, {}, {0x20, 'skcipher\x00'}], 0xa, "320d61da4c29f3bd23340866a944a0cf3796b28761097ecedc607d501d72b727a6b683ac2b6480dd9a5af65fa63a80ac2e05ad02f9ff21dcf39f13681d772130460ebd12e557a4826ba740fd961c82ee1ccda7743ae97333cc339822c631914a3f78a2262e7cadbf2e44a9699ca62fc899fc09c90a26af53059225536e51d155a2832ae1e7143a68f04840b152d1c616fe418547eddeec905a0843b2ed0773fc82c0a8ace1f36e91353fb4ae119fc8ded17dbf3cf4a8"}, 0xd3) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000140)={{0x401, 0x7}, 'port0\x00', 0x83, 0x2, 0x3ff, 0x3, 0x5, 0x41, 0x1, 0x0, 0x1, 0x2}) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$TIOCSIG(r2, 0x40045436, 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000240)='\x00', 0xfffffffffffffffd) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0xffffffffffffff0c, 0x0, 0x0, 0xb2) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000380)="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") r5 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) write$FUSE_LK(r5, &(0x7f00000000c0)={0x28, 0x0, 0x6, {{0x58f, 0x9}}}, 0x28) recvmmsg(r2, &(0x7f0000002a00)=[{{&(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000480)=""/200, 0xc8}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/152, 0x98}], 0x3}, 0x4}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000680)=""/114, 0x72}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000700)}, {&(0x7f0000002880)=""/241, 0xf1}], 0x4, &(0x7f0000002980)=""/92, 0x5c}, 0xfffffffffffffff7}], 0x2, 0x40000002, &(0x7f0000000780)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x3, @empty, 'rose0\x00'}}, 0x1e) preadv(r5, &(0x7f00000017c0), 0x199, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) openat$vfio(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vfio/vfio\x00', 0x105040, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) ioprio_get$uid(0x3, r3) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl(r1, 0x6, &(0x7f00000005c0)="7f95446795815ccf90906959d6e348f02f145432b50f20c3c712892295be149b2ba632856db2e7d0c497247c37a4902d350cc6de6f37487c5c482285841a671360fc31048c23face1815499901ed6626750d7b40d5a012aea3e747ea1c4de0148f5e7d2c0ee079a5beb3a77b472110aa14a66c7d12063fdcf09a200bd44bfe7721a9855451438b9371a0161d25284ccd803cdfb99bf2acfef4a3ede25d3479d18ec129bfe171747bdaa166728eb51182dc5a3a7c26af7113a7a27e6d182d7e0824c6053769c5efa08b38357aca55e19f54131c3ca5cb6897bb2c1e45239f202f669a80e4394aee8834c57e349751f765d0e2ac09ce3e553bda57d2af37d35f6061a2f42b926060402ca5a850aa04dbb5bd859a439f778b31dac2a21bd4e7a79361b7c8edb14a83f219cce53096d2333e5d2cb42322b879a06bb81951a3901e36da3b92673a93821bcad8894973c2a56550c87de34f3f8235cca3e813865840fbf30d632cf9fc3be63b12b2327aba9d16d86f0d73b5b1562bf192529217949ef1ef03764c02c74b0d8663ea4f6e8dd19e2dfc38da177d8cde41c82a1000beab9d1baef4c4949b482fd5703f035209fbd5206e695802d96696b2995e93cfa21ecd4567a0b3c8f7feb0cb36893d30839c35bc5ecdf8a3bf912943d8d805f8cc46051f288aa9c88c1f5e88666fa3b0a89759c3c79aec45a74de8ba75861e3dc8a6005488054c868b039416d08ab4e2a3079ce2705556d240c556cc5e6de14096dc01b20200a2aa3a5eeadb143dc845c37de4c0598506d269bfdd7e03fdb9ef435650b3f74267a0d282ca1c07732d6007910b862fd81a9090957495d9f98b20961f25fb942f1265ac0f12c535fcbff6ce496f0f4740193b19bf03f8c43448f08f56c8bd0bf57b269c821ac2150e8937a8c1d3fdb6e2e6834b43a855a9e86e69d6a0329b5f01c4fe124ca5f48b622bfd66e520ab96eec964a649ec171c5a5b50331d8b339e9a77397c7f254a5914a6b5df4d3274b1e5b3b908d3ef4bec425d892efbbede42b31f3b2e5203c95af6fe2d449ac742ffe1259c748b13027649cdd7297a251bec877b5eb922278921e714d44e4a835a8e042bfcf79eab36943ea2e161ac2c62e7a7be1bc2e0518f01d8373622353114cf3ea56d13d21917fa5a606765f3e37f403ebe50c0f2f3a3fd38950be7a92632600010a5f60d5c21efb7aa01bf67f3ae7b5b6b7bf0d0c11a3d2aa48ffb4bdcaa95d8ce8af0dde9d46851d1a79d61aa26d735f263be0cd8d0ddf4cb1b24cdb4f5712e1733a03cedd3dc67b21a55de9c0e8f1e1c7905670d81def25b310e3bf1fa1942500380471848dc9ee8843d61d82e0fc2e7c6a08c85fec94fd416ee49f6fa41114f298fa770b79cec2c3b53d03d36eafde77a05155a52353bb0eb5bcd28ba161dca9cc80d94cbf36af6bcd8e1b57536c376c1e5a4608441799cd6d3ff9b9484458a54c450d4c0e8b5b6b7f21c90ebfb41cc23faa769e1c0d26e267e96688b30e04b7dadeb24296806d0047d2854599e7806328c725a7f879d0a09ffbeb6ab192c83659ea9ac68291c755eb1e7fdae37ac869ba98a242daca3994e085b4a6303d12dab41479d20871f6a3a6cfdfedeab378209e9dbb9fd1231969524822204abde075b239c8bdcce97e40f717480ab37d8cfeab66a58f54609c7b9ac6165cbe7aaaeac0e7afce77a6912f2503337862a2ba8fc13930c4e459b95b7cdac71206e28fd0186a38549331240646cb60601f0bd37ecacaa6a86c62623d5fc26cef418d18132bead6a033ba4a4868b8d6988bcda1bdde96d011f2d1f685da1f98d4b6400271c0bd1bb7dde9dcacff45e33392ffc7e06d4e99a2ed58f6a9605259141d0aefbd5f6e9f355241d5b9d213c75ab3e4f1c79d0b0b47f206634159e446a533bc4157bbea074d0c95574348425d9a232958b3d88c633ce503ef0c4a835428cb363a87d3a55c1b96b4e85fafa35be310bc1edef8c92d69ff9be568c6f9e11cd1c50a595db02f2b4587399fb88070162436a2ec84d173f891563a2cbb897a7e1ab487ec5f8138b48acf10a87219f0fe12752259e7dd0943a121ff90e3e2cdecc5ef9b698dafc68759f1642331978d34855608cbc0d5f74633efe2d643120ac782f07f0d729997d47ed784079b398355d12344a8699cc2f48f697d5b3c27c8882ca0dde9b2402b6ddbe16a3a5bf7a279c0d4bc6c7a990d085cdb3b3b919eb59744b7e260eae45a1371a02cabe66425b7c3fb72900ea513c2891d409b66b49f78cc809ece586647ca8ea16220cf753baa117b185fb1f1f25b64a652c48331fba5ee8bcea4f8d5c871b8307f5e2e139203dcd8086a325a337818bda74039163c0ee11563f9adbb1bc3fa5cac3d3b5c4f8b0462383320736827a51627c98ba3fb31b8fc6cfcd71fa8069a58ac154b2b646df8e32e3284f1c4037eb453f13e26b0313b354fd66e51af01b597d59660b3c0b8904e0029f7494fa7aa636ac66b53b7c7f265dbcaf59993b42fa220d9ed9b2cce451fef1a742828fc450b532ecdb19641c08c0e1590095b4a9b2098925e7fa02b2ae730af12f3150fb7953ce7052309a95c50b4d4c6b2ed904970d17206f20ec4931836bd2b819cb685d3ed7c6e53436734dc0eae7ae545477cd355b9444d5d2b366e3e6d5528884aac85274c405849f1ea13ece90cdda9d0353153421a66659e95a66c3be39288b5caaee9efa07727af0ebc9557d8d18f95b9fe677953f060eff3e2ed00f4b9030dca5d9df61181f1833755c9e41d37c064bcfc69601be93e2e6b01a045893a4c8d1a7964f6a89f442f94237af1d7e11d5ac8670403a49a19d0ed4a0448af9bcbae9daaf0ac8041d0a27daaa76dea2674852ed3f32356eb79ec0e9552509c7992250a69dedc6368193772cd0c3e9baceca3bb55b3c538ceafb8b6f2e5f5e2a95cfc6c9ab18c752c6c661ac650ce4ee97a6f012bb86e8e92678f0f651c85aacdf911802c47249411c981c51225b946c3660b9e19eb78b5f1a9249a7984783b4dd9d4b0ea2e81e11cc579dc0457f0bd7096642c06bf8333e2d20ad6a680678209e5f6ab707ce4d0cffdba56881747103db5fa55e74ac043d63eebaa814c93fceca418a30a89de3df3692d6082a135774c7381af3c8e6d6b5d3c12fe5fa58bd60f83250b0fb0eca2178f2caa29a6a91b41ac04bd99d7930a4aa31107ac9dad5c1b5936186fa73d19d0a8faf65143a1f3bb5fb5fb49d83bf8dfccd514a5ddc7e1424e199b56ad8ec7421d22d86b92297044702c8db68f1a07c7c6021aa10f81306fa06b581f56f1fbf8ffdaee06c9545791ab02944221223045d4fcb41af058079e9114d27be223c2466a59f4db20122f4e7228c3b10624cfb0e01e91a43ca9d16fbfab16e138b92a5c4379a0a89f148196887505498c8d018147f0610cb37ae3c2804df958fdc4b64d9c3e6b9b7b572a6faa2f778cf283e6df8490d28d3542d8bcf43bde3363b923874d63c7b92fc779423420fc08c3de1b8b1eaf9baefff66dff871016d678cec5b54f2636eb48b2598fefc8566e51cb5317b614d316658a3ba40766b39779780a21f9b1dd9cf4768eebb113248fe90b3d8ac09cedd352385b06b91a13993ff9cdea63042ade89eb0fa1b70b1604c6b9680560783488a11b53ccc18aa5e2ad37b94bf76a358592e7725dca68c26c22fb8c05c9ed24e25f78e0133048bd84eeb16400e842a75b88da7e7c13bfe8d59f391f3c2268ef572bcc8bb1638c92928d798cd8f852eb9de2d846be037af0caa67177da04fa6c969e71bdde92f50fc6d5f1a96df752b6b1cb02546e319169b1c77c671ddc9b937811261523813a5bbea18695a06149a308467c163eb88245b9bc19baccbbd7ed4c216b054326f50b1a9aa4ead104eab3f3afad76f453b326d659bca197c015ccb752cacc3f868b48d343228b50c20c9cea6d85c7f19e5d5e0e67bd5e491d94332a30f1633304641dbe5e16fe96a8211f8f08d984ce8868469206ab56f9fd5153d06a6ffa92c6c20ad6f168d0e7221aa1db21cc6d0fc17f147d75b7726c5d0f16c332ff02cb83d2d869994ccc2500c04e688453243fd93b9285c0d78120e5fcf875236a2ccc95bf169654668b2c6f0ac47180ac00fbedf14311bc954152db02f3eb2f2337f7195b9a47cca27a77b4e30135eaf61368d1273720e906378e6aab7da719c290e573140d5bd589b2c167c166c39a4074974c54eb61e3714785bef2fdefa217dbd5d9cf638e72e665fe466c707c60a2f19db82c4e97a79c3622d165e7676e937007325d1c149b1ffa4dc62bb1481e7d3a765efe083b572a021fe1a489c22d3632cc2d7c90b1b78b449bacd55d62e1aa43a753f06cd19c69a21d3643d01f8566c91bde9f4ecf50cc50a610244cac92b3efda5b2d205ca2448086fc052107656d70646685168df58fd96c1e3aac0b49c1eac3eea852b174c6c78cc1ee93a0a0ef59ed59ecd4c28f8ec1e42510db8260231be3c7abc3dd5fbc7beba49383758ce468c28693e3e04965d138cd109896d29171026fdbc7bd4348a83464d9d550aecb1953b19ebc15d24d172fc10206f681984ea4a56be9ac94e4c5e52a572892901601e823dee778db704a3fd89a80e0b7f8d5ef40da9a19ffeac06ae8b2f31eee2e818482b7e31489410a3d858827b269c2f1b198ac0ed391022dc6d95993d27e3390cba0baacb9c1fcda635994bcc04e4374fb4e73365cdb725800638a217ecdf6fd6a9c6f1b0786774aa707fa378fbcfc6b2ccf0565a88c025410cbeceb9f675ef36665a3f0738f2d95429398ef8e9d3d5f1eb1c4837e4b43c8f7005154dd0cacf4ef27fc66b0d8736d7fbde16dac7a25bde255a07edb7dd678cf4588e145e26ab5e2a5d272b54620a3adf6566ea541e9e43a41ab016997cbc23e37d3d3db95e56cf4d5384550fa0f7da904a34259a3d2fae28f44147cfd637e0d2cc9872a60be54d463bbf23e03101124effec8a93e9111efd976f0940e1cd32542dc85b003ffffef4adb2256bc6a62755df9e8de05019752abc9e8cc1ac0cf64d8f33f3174fab874c595f7d46d53c39598402d2e12e2dadd108c1c902b0972996647746ee82a194ecab1f1a94331609e6ce3f68221bf94b596daf6b293bcaa1c1cff5196133cf3ad79db2a00b876401a3c7d350a0ca1c552547ddf579d914d86f71d6b1cc4cff97c8b52864af99fdf75cc5db44677504448ef94cdf32a7a80a3b39df0e31343319c71946fdfa7de8c98f3923573f9c245110fd62f24f9c6b79fa3276dd402c24e5abf583906e97127d068d3ef2dad70a94bad37f9ca27b19c3f979853e348fdb054df6416a3fbbf47a31e084be75d8c922c80279951fa8f0bc5b86374558da7639883bd674a09df559035eb73684184f25fcb029865af64aec75f234a97a91e5548e167dfbb1931e09066efe9c0d9b3af5de0bf428cc92338edecb0d2bd4414db0ebc07f4e80075495b33e7283c57be095a2954dbe19403ac59416002e4a0a344176d79ef70039dea2fa434a1bb6914ee9c4978bebb02d64d2973d04fb33d9d6d760d0127a14477f4971ba3eda95039cb37efb1af51bd419042fffddc724d74cad0a7fa9c547a7511989dfb1dbdef7e600091e73cfbe1fbef4885df21acd2ed38aab50049be429f194b3892a5fb0161d1001f32c6744ab2783831cdb0fbca926fd14803f8c23d95315a210544ce18f6d015f54e4f848a747e9d3c0f4e3e52036f47ff02dcdf729e3cf21c2718c63f61d1b5339516ff05cc1d9d741") recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 455.348651] audit: type=1804 audit(1564452327.952:180): pid=21644 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir066430701/syzkaller.AJbdQy/444/file0" dev="sda1" ino=17707 res=1 02:05:28 executing program 3: mlockall(0x3) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20200800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r1, 0x18433f89ad2b9684, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5f8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x2c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000094}, 0x24040840) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x24000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffe5d) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x1, @null, @rose={'rose', 0x0}, 0x1, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x800) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'erspan0\x00', 0x400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x30bd, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) ptrace$getenv(0x4201, r1, 0x10001, &(0x7f00000001c0)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RMKDIR(r2, &(0x7f0000000100)={0x14, 0x49, 0x2, {0x80, 0x4, 0x5}}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x10400, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xf}}}, [0x3, 0x2, 0x6, 0x0, 0xffff, 0x3, 0x1f, 0x7fffffff, 0x6, 0x0, 0x7fffffff, 0x4, 0x100000000, 0x0, 0x5]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000780)={r2, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000840)=0x84) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x50, r6, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1ff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x50}, 0x1, 0x0, 0x0, 0xc084}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x11c, r5, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x67}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x200}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x73}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000100)={0x1ff, 0x1, 0xfffffffffffffffc}) 02:05:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$9p(r1, &(0x7f00000005c0)="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", 0x1000) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:28 executing program 1: mlockall(0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9a, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000080)={0x5b, "f397fc7aa6f61f6b9a0c1493e4e0063ea439064d73da1970bdeef67b6b6f42add3c0e92272dcc7ba1171de177d9b396c6a25d98b78258975a11cf66e6b58cb7d361ad44bb9477f5324b2fc5f68418880bd0c75a641ae81ab2ded360172285758c2554f1703f891a56c906102bc04c0b510e1079d629a15ef36d8ca275ff9a46b"}) 02:05:29 executing program 3: mlockall(0x3) r0 = syz_open_dev$usbmon(&(0x7f0000001440)='/dev/usbmon#\x00', 0x2, 0x82000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001480)={'vcan0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0xfffffffffffffff8}, &(0x7f0000000300)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x9, 0x8, 0x8000, 0x9, 0x7b7a, 0x7, 0x7, 0x0, r2}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000340), &(0x7f0000000040)=0x28d) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000014c0)={r1, 0x1, 0x6, @remote}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xffffffffffffff88) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f0000000080)=""/231, 0xe7) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x9, 0xc6, 0x8}) r2 = accept$alg(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000100)={'ip6_vti0\x00', 0x7}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000005c0)={0x40, {{0x2, 0x4e21, @loopback}}, 0x1, 0xa, [{{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e21, @rand_addr=0x20}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e23, @multicast2}}]}, 0x590) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) sendmsg$FOU_CMD_GET(r1, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4010000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x6c, r2, 0x204, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0xddb}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000011}, 0x2404c850) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r6, &(0x7f0000000080)={0x14}, 0x262) r7 = gettid() perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x80, 0x0, 0x1, 0x4, 0x0, 0x7fffffff, 0xee51a506b973a7e, 0x2, 0x7ff, 0x5, 0xe4, 0x9, 0x8c05, 0x7, 0xf3e, 0x1, 0x100000000, 0x7c, 0x1, 0x2, 0x3, 0x7ff, 0x81, 0x61f, 0x5a, 0x3, 0x81, 0x401, 0x5, 0x0, 0x7ff, 0xffffffffffffffb4, 0x7, 0x8001, 0x9, 0x1, 0x0, 0xf, 0x4, @perf_bp={&(0x7f00000000c0), 0x5}, 0x40, 0x1, 0x1, 0x1, 0xfffffffffffffff7, 0x10001, 0x7fff}, r7, 0x9, 0xffffffffffffffff, 0x0) recvmmsg(r6, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340)="ab2000288a15ca54bce84c5fc2af8d058a0247000062a5d15b5d557d7115b182ab334e7d4a8a0009c51dae7b8c1fe8861dce695d25a73e077bb31e8b12ea77856cdb15afcfacdd82d8dc1e7364b80f757b1115f3c216379a30ca44fda557f6a7374de165f47b458963c5e427771172685f701a1d80412455216dc6a93dcc3a1dac5c2eef63f67215d39eb20a185e997db9b1ea0cdfb44356339aafa45d97f65529a670adbbf5b8a0bf56e16cbbc1e4c9e4045ac6f442731b4563d0fa48632de1e02073b01a46d383252684", 0xfffffdd9) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x1}, 0x14) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="40000000f9341510d2e4a20b02acfde0c6095c046b3c2cf74fc8d598ddbb3d3e0d6c2e865de34225f0206f9d8323b08541820856b8dba809c9dccdc40ee2e983844450b03565c53e4276b36594a1af792b77601aabc27a5173a498a77322d88dbfc61efe7e80a3ec48f9", @ANYRES16=r2, @ANYBLOB="100826bd7000fcdbdf250d0000002c000200080008000900000008000d000100000008000700fdffffff08000600020000000800030000000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) write$P9_RUNLINKAT(r1, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)=""/66}, {&(0x7f0000000300)=""/225}, {&(0x7f00000005c0)=""/4096}], 0x0, &(0x7f0000000440)=""/96}, 0x3}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)=""/141}], 0x0, &(0x7f0000001600)=""/33}, 0x3f}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000001640)=""/63}, {&(0x7f0000001680)=""/4096}, {&(0x7f0000002680)=""/253}, {&(0x7f0000002780)=""/73}, {&(0x7f0000002800)=""/130}], 0x0, &(0x7f0000002940)=""/248}}, {{&(0x7f0000002a40)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002ac0)=""/181}, {&(0x7f0000002b80)=""/204}, {&(0x7f0000002c80)=""/218}, {&(0x7f0000002d80)=""/209}, {&(0x7f0000002e80)=""/101}]}}, {{&(0x7f0000002f80)=@l2, 0x0, &(0x7f0000003080)=[{&(0x7f0000003000)=""/110}]}, 0x1}, {{&(0x7f00000030c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x0, &(0x7f0000003480)=[{&(0x7f0000003140)=""/52}, {&(0x7f0000003180)=""/13}, {&(0x7f0000003200)=""/155}, {&(0x7f00000032c0)=""/217}, {&(0x7f00000033c0)=""/189}]}, 0x4}, {{&(0x7f0000003500)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x0, &(0x7f0000003940)=[{&(0x7f0000003580)=""/193}, {&(0x7f0000003680)=""/151}, {&(0x7f0000003740)=""/45}, {&(0x7f0000003780)=""/141}, {&(0x7f0000003840)=""/140}, {&(0x7f0000003900)=""/60}]}, 0x4}], 0x4000000000001bf, 0x12000, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) 02:05:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000100)={0x5, 0x1, 0x3, 0x0, 0x800}, 0xc) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) fcntl$setlease(r0, 0x400, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000200)={0x7f, "11bcf9db1a6bfc675d14784b52b0a58142f463a10664fa2f06370af05c1c72c0", 0x200, 0x8, 0x8, 0x4, 0x6}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r2}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) fcntl$setlease(r0, 0x400, 0x0) recvmmsg(r1, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000200)={0x7f, "11bcf9db1a6bfc675d14784b52b0a58142f463a10664fa2f06370af05c1c72c0", 0x200, 0x8, 0x8, 0x4, 0x6}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', r2}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 02:05:29 executing program 3: mlockall(0x9) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000180)={0x0, @bt={0x7fff, 0x3, 0x1, 0x0, 0x1, 0x10000, 0xffff, 0x5, 0x80, 0x0, 0x3, 0x0, 0x1, 0x4, 0x9, 0x20}}) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000540)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000006c0)={0xb, 0x10, 0xfa00, {&(0x7f00000005c0), r3, 0x22c}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r4, 0x3}}, 0x18) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) 02:05:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000000c0)}, 0x123}, {{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)=""/90, 0x5a}, {&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/93, 0x5d}, {&(0x7f0000000100)}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x5, &(0x7f00000015c0)=""/235, 0xeb}, 0x5}], 0x2, 0x100, &(0x7f0000001740)={r1, r2+10000000}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001780)={0x0, 0x100000000}, &(0x7f00000017c0)=0x8) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0)=0x6, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000001800)=@assoc_value={r4, 0x7ff}, &(0x7f0000001840)=0x8) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffd09) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) getpeername$llc(r3, &(0x7f0000000100), &(0x7f0000001880)=0x10) r5 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r5, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$usb(&(0x7f0000007480)='/dev/bus/usb/00#/00#\x00', 0x4, 0x800) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000074c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000075c0)=0x100) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x8cb, 0x10, 0x5, 0x101}, &(0x7f0000007640)=0x18) r3 = accept$alg(r0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x42000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x8) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000180)=0x1e) 02:05:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x6202) write$P9_RWRITE(r2, &(0x7f00000001c0)={0xb, 0x77, 0x1, 0x8001}, 0xb) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e23, 0x7, @rand_addr="181c6e5d9730704b568250437ef34290", 0xa106}, 0x1c) 02:05:29 executing program 3: socket$unix(0x1, 0x7, 0x0) mlockall(0x3) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x23a1, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0x1ff, 0x59, "a9b4e6677af968765840a76823943fd417b23382f852e5a65ea45b3aca645082e18618ce5e94e856b4958067c985a9142a033fa13bce537734bde6d206f19ec6a2bb44abfe40ae933af137f909ca90e61de82d13b4cf35a766"}, 0x61) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000180)=0x1e) 02:05:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = dup2(r1, r1) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000300)={0x1, 0x63}) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r4, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x100000000}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xffffffff]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000180)=0x1e) 02:05:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'ip6gre0\x00', @ifru_map={0xf0a, 0x6aa, 0x1, 0x3, 0x81, 0x2}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000c40)='oom_score\x00') sendmsg$key(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x2, 0xb, 0x4000000, 0xf, 0x7, 0x0, 0x70bd28, 0x25dfdbfd, [@sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@mcast2, 0x3, 0x10, 0x14}]}, 0x38}}, 0xd0) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) mlockall(0x3) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x10000) clone(0xfffffffffffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/validatetrans\x00', 0x1, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x3) 02:05:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x202483) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f0000000100)=0xe8) 02:05:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) 02:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x400, 0x4480) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000300)={{0x2d, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x2, 'wrr\x00', 0x20, 0x1, 0x64}, {@broadcast, 0x4e21, 0x2000, 0x9, 0x40a, 0x80000001}}, 0x44) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000100)=0x3) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) 02:05:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) fcntl$notify(r0, 0x402, 0x2f63cdd6f3103f9c) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7f, 0x6f0001) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 3: mlockall(0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x2) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0x3}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x800, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000200)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) tee(r0, r1, 0x4, 0x0) r2 = accept$alg(r0, 0x0, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x94, 0x5a1000) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x80}}, 0xec) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) fcntl$setflags(r0, 0x2, 0x1) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x10000, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180)=0x7, 0x4) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000200)={0x6080000000000000, 0x5000, 0x3, 0x2, 0x1c}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = dup(r2) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) modify_ldt$read(0x0, &(0x7f0000000300)=""/171, 0xab) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000000c0)={{0x3, 0x3, 0x7ff, 0x1, 0x2}}) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f00000005c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008005000058030000000000001802000098040000980400009804000004000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="0000ff00"/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000010000000000000073797374656d5f753a6f626a6563745f723a6770675f68656c7065725f657865635f743a73300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1e000100000000ffffffff000000ffaaaaaaaaaaaa00000000000000000000000000000000000000ff000000ff00000000000000000000000000000000000000000000000000000000000000000000ff00000000ff000000000000000000000000000000800000fffa0005766574683100000000000000000000006e72300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000080200000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac141427e000000202000000cafd4568000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff00000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x5d0) 02:05:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000000c0)={0x3b, 0xfffffffffffffffd, 0x3, 0x0, 0x0, [{r2, 0x0, 0x1}, {r0, 0x0, 0x2aa}, {r0, 0x0, 0xb6a1}]}) 02:05:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x7, &(0x7f0000000740)=[{&(0x7f0000000180)="21e0f8ad0d9ed7ccde7751204fdce72dd859f0fee605197f250b7f2f97659df0382f17a315ff529f54a23995ea4d0659d00928ce7063e21b0a251096bc2f77be5b67034ed2dc7127470d5de1e218040fde4c0b0800c762baf8189e3fd06e38e491a5ecf59ac9f43b49d8374ad1d40237950b1b454ed21ea04d69a55722242cfb3ba1861ddd39f063592dbd6fce83350e7f162dc425c67162a57752d049d6e5c3dd9f0a7bdb5b0258a20a826ed9513630a7ac9e93e3d736db66e007a5dd525fe0ca64d4cba0ac3c4511142fda72689fd01fbffd028d40077003a9", 0xda, 0x6}, {&(0x7f0000000300)="4aa85b405ad5ace58c07bf7a5f35d2077e16e8e4a0dc09aff6f3dfecd337e96bc00010c77f98303b86387dcdff00e33395911fce268a42a8d0200e97f70ecccbae1cb16ca006bdd93db3249b135c16d6feea1be1a63083e2b1e8e806ab3410d5cb8e7815dd429386a51977c7ccf7c1d4d280be5dff40c87010282f9ed4b36a2cd88c7a29d5fb7903d042d997fa788e4dd8d3aee5de0cb76d4c778f06576584eebf32437674fdae53c72f4bd5dbbc4bffbecba9e9cadb76d4023ff41a2600e7e361704bee1ce93f7ac1e6b0687946311960f04ef9cf9d93afb484a87d75fb35661f00501d", 0xe4, 0xc60a}, {&(0x7f0000000400)="d8d16ea11efc727829ecbe90a229525a7f28d4a72c4f0a89f25932fe7789b0af91150315b08e840e3d0cee39e6ae9b0e8d30803a2b60b2026420d625", 0x3c, 0xfffffffffffff6b0}, {&(0x7f0000000440)="9b7cb831cb14894a1faa8e382f268c6f99ad59b60c2f171f461f0e72dff8f011d0a5d9d139dd8c4bdab893fa44cae44c1345f0237844b0a5021c6e9e570ccd680ca695de4b067ea719a1cc808d5c35cc1e", 0x51, 0x7}, {&(0x7f00000004c0)="8cc4", 0x2, 0x101}, {&(0x7f00000005c0)="00d93f34ebb1bd657be9ad377d615aa6e262dd0cb0368d168ea3a7589007d4645eec7b4d9a17b3020c9d855af2228431e4220d1f36df33ee69701351d7e2581800b61ea15ed8d605558a17ee0ae66ce7fe567c80ac914081654e233bf35afac883054da3722cdd5eee4bda0e60cca6e65b8c14d837d270adedf96e9eb1b000452a7bd4", 0x83, 0xffff}, {&(0x7f0000000680)="e72718bf7ac88a1cde42bb2cc46412623c18e26bc5b47887c6fa284505b1b18fe362afac93a334b4596adea790c66f2efd7343758d72540b980490c86ab23acd9cf75dad984c98135e5258cf7cdfe5a7edfb0a38d00f4c7b9911c21c7e65d7a5fda393de13ac4a0661daae32eb4eb4e77774ee60d0c76f1953cd3ae0ce431386002e5e38a89bed9b4ac1afa7805d90debb6012438fe90e111c86011c8fa380e9eb17aceddb25b8730e6eea33c1699dc52263", 0xb2, 0x2}], 0x10820, &(0x7f0000000500)='\'eth1[\\#\x00') 02:05:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="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", 0xfc}, {&(0x7f0000000300)="253276932d252e3495a01b9123930a4c5796e58a38eee36f16cdf7e84d225305230a62b6b69d84f5a6ebb59037d021d495717c4f8caee8140cde39c9e710340b23be7e1f19a34a4d5ae017bdcb3169329f464c5a2368236c32dbf1c65a7ecaed1c2d39886c33a1c490c2f596e2381bb82d3344199d4e128dc36b4188", 0x7c}, {&(0x7f0000000380)="503e8954e98cff47b904fc6f58f0c10672642072c6d5b1e1147294a393865465ec6471b548977251116adb117ab3af5fda7b93342f8a7e722a0c625013b47d17e57d4d23b2f23b0a016408689f05839266a2b00d26f9c868b127f11e4eae3fb5d52f5aa49b40c3bf3dd75479c5204f8552e2e2f2da4896407cfaf02bb190256ac67f0c8b363c35332807b56d01002eb2dd38e324a10d3ef2af88b1abc670640f1beda3047971d4ed98f25de1ed06ca7fe28778ab0aa1703663f5d5303442059bb2dead062ec79437d30d4d591f0b49f5396a1eb2f491e9cac0ecc71836106c53666c90fa4c4e8d9c59b00d826d13", 0xee}], 0x3, 0x0, 0x0, 0x8000}, 0x80) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x503640) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x24) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={r2, 0x2}, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 3: openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r0, &(0x7f0000000000)='(', 0xffffff1f) mlockall(0x4) clone(0x20008001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0da275acc34933c3cafe3d0ef104fc107df5ab3692d3000000000000000000", 0x5a) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x4e, 0x7f, 0x7, 0xff, 0x0, 0x85, 0x2042, 0x0, 0x0, 0xffffffffffff7e8e, 0x3, 0x1, 0x3, 0x7fffffff, 0x47, 0x401, 0x401, 0x6, 0x6, 0xffffffffffff8000, 0x6, 0x200, 0x1528, 0x7, 0x4, 0x101, 0x8, 0x2f, 0x7, 0x5, 0x8001, 0xffffffff80000001, 0x1, 0x20, 0x0, 0xffffffff80000001, 0x0, 0x7d52, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x100, 0x5, 0xfe82, 0x9, 0x9, 0x5d, 0xfffffffffffffff8}, 0x0, 0x20000000000000, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='teql0\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x800, 0x7) getpeername$netrom(r1, &(0x7f00000000c0)={{0x3, @default}, [@netrom, @bcast, @netrom, @default, @null, @bcast, @rose, @default]}, &(0x7f0000000180)=0x48) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in=@remote, @in=@rand_addr=0x101, 0x4e21, 0x0, 0x4e23, 0x8001, 0x0, 0x80, 0x0, 0x0, r2, r3}, {0x8, 0x4000, 0x7, 0x10001, 0x73, 0x7, 0x8, 0x22d}, {0x10000, 0xffffffffffffff3c, 0xbd, 0x5fd}, 0x2, 0x6e6bb7, 0x0, 0x1, 0x3}, {{@in6=@empty, 0x4d4, 0x3b}, 0xa, @in6=@mcast1, 0x3502, 0x7, 0x3, 0x6, 0xfffffffffffffffe, 0x8000, 0x3f}}, 0xe8) ioctl$SIOCRSACCEPT(r1, 0x89e3) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000180)=r3) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x480000, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000180)={0x0, @reserved}) 02:05:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x5d9e, 0x4, &(0x7f0000000440)=[{&(0x7f0000000180)="f84c0f7a6d05b4f5bdedd4fad0953eb1e203bcde6407220f1faa4f7ccf0c22c24b6617ffb0305d918c625e2a1771ac28b76400e09ab3c9cd190ec441065a690936bdd5ad8822627f1269592d08c770d11160ea6f468dcad7b237a505b784082c721d2d486a431967e61c571da412d5a9e20dd949f684a7ad85b29f5db39021fd486abf682e9abf2ea7af4bb1179bbec442ad4f0ead3a85599d5d22f06d72b0a2b75bbf09f2c094fcf659d2c871da0904b66c3f522207e48e02d20236f8f198e22dffc5e5aca48e2cd00a60ef43605c15d5", 0xd1, 0xfff}, {&(0x7f0000000300)="c0d7dd398f066697480ca0864c096be81e0cbe9100ae479c1ae0bdd25c106d3ca9f614d5c155076592c3997295593241c70dc69c19d593cc1f25dc8ee1403ea922a718f9023c7eee91b7f5af4a4c2299ad9ffb2a4f4a7b267b5fa56dca34", 0x5e, 0x9}, {&(0x7f0000000380)="5543c0c423105cfb9a79aeeff52e123e9ce032423d6495137f9d347be6ca06e7c29dc85b2e439b", 0x27}, {&(0x7f00000003c0)="44b94c4e227efa159d95602bfe1b991386b83b9332a7c015d22beec45cbcdb0e818a10ab85f79e211974c3eb49d5b2024b4fd6c9c754712bab7e7074d38bea5733c130164e141ceb887cb63da27fef5289a2406864fce03769f9c5b210663c7c1a9cba6ab589", 0x66, 0x915}], 0x8408, &(0x7f00000005c0)={[{@nodiscard='nodiscard'}, {@nodiscard='nodiscard'}, {@nosuiddir='nosuiddir'}, {@hostdata={'hostdata', 0x3d, 'vmnet1'}}, {@ignore_local_fs='ignore_local_fs'}, {@quota_on='quota=on'}, {@quota_quantum={'quota_quantum', 0x3d, 0xfffffffffffffffe}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, 'bdev,--^*'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@appraise_type='appraise_type=imasig'}]}) perf_event_open(&(0x7f00004e7000)={0x2, 0x229, 0x20000001b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 3: mlockall(0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x0, 0x100) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000000)=""/55) 02:05:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="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", 0xfc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1, 0x0, 0xff37}}], 0x1, 0x0, 0x0) 02:05:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0xbc, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x480000, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000180)={0x0, @reserved}) 02:05:32 executing program 5: openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r0, &(0x7f0000000000)='(', 0xffffff1f) mlockall(0x4) clone(0x20008001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 3: mlockall(0x3) 02:05:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0xc00, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x9) socket$alg(0x26, 0x5, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x0, 0x0) write$capi20(r2, &(0x7f00000001c0)={0x10, 0x5, 0x84, 0x82, 0xf5cf}, 0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x3f}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000300)={r3, 0x100, 0x10}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80000, 0x0) write$capi20(r2, &(0x7f0000000100)={0x10, 0x8001, 0x82, 0x83, 0xd4, 0xa}, 0x14) syncfs(r5) 02:05:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000240)) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000180)='cgroupmime_typewlan1user}\x00', 0xfffffffffffffffb) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/95, 0x5f) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1000405, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@fowner_lt={'fowner<', r3}}, {@obj_role={'obj_role', 0x3d, 'rfdno'}}]}}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000400)={0x0, 0x3, @start={0x2, 0x1}}) 02:05:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x3af) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32e27d04000000288a", 0x396) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) getsockname$tipc(r1, &(0x7f0000000100)=@name, &(0x7f0000000140)=0x10) 02:05:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) fsetxattr(r0, &(0x7f0000000100)=@random={'trusted.', 'lrw(serpent)\x00'}, &(0x7f0000000180)='skcipher\x00', 0x9, 0x2) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) fsetxattr$security_capability(r1, &(0x7f0000001780)='security.capability\x00', &(0x7f00000017c0)=@v1={0x1000000, [{0x400, 0x6}]}, 0xc, 0x1) openat$vimc0(0xffffffffffffff9c, &(0x7f0000001740)='/dev/video0\x00', 0x2, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000001700)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000240)=""/237, 0xed}, {&(0x7f0000000340)=""/60, 0x3c}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/176, 0xb0}, {&(0x7f0000001440)=""/71, 0x47}, {&(0x7f00000014c0)=""/138, 0x8a}, {&(0x7f0000001580)=""/34, 0x22}], 0x7, &(0x7f0000001640)=""/139, 0x8b}, 0xe9c34d6}], 0x1, 0x0, 0x0) 02:05:33 executing program 5: openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r0, &(0x7f0000000000)='(', 0xffffff1f) mlockall(0x4) clone(0x20008001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}, 0x6}], 0x1, 0x0, 0x0) 02:05:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x6, 0x76, {"09d96a59da6e77b646274bbc3efe8201"}, 0x0, 0xffffffffffffffff, 0x1}}}, 0x90) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffe09, &(0x7f00000000c0), 0x1}, 0xfffffffffffffffc}], 0x400000000000327, 0x0, 0x0) 02:05:33 executing program 3: setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 02:05:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) syslog(0x9, &(0x7f00000005c0)=""/4096, 0x1000) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000180)={0x9, &(0x7f00000000c0)=[{0x4, 0x8, 0x100, 0x7}, {0xfffffffffffff801, 0x2, 0x4, 0x9}, {0x20, 0xab, 0x3, 0x1}, {0xc6b, 0x8, 0xffffffffffffff01}, {0xe3, 0x1, 0x7f, 0x40}, {0x4b6f000000000000, 0x6, 0x7, 0x4}, {0x3, 0x5, 0x9, 0x1f}, {0x100000000, 0x6, 0x2, 0x6}, {0xd3bb, 0x38, 0x80, 0x7f}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) recvmmsg(r0, &(0x7f0000005200)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/82, 0x52}, {&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f0000000200)=""/87, 0x57}, {&(0x7f0000000400)=""/14, 0xe}, {&(0x7f0000000440)=""/56, 0x38}, {&(0x7f0000000480)=""/175, 0xaf}], 0x6, &(0x7f0000000540)=""/31, 0x1f}, 0x1}, {{&(0x7f0000000640)=@nl=@unspec, 0x80, &(0x7f0000001b80)=[{&(0x7f00000006c0)=""/151, 0x97}, {&(0x7f0000000780)=""/201, 0xc9}, {&(0x7f0000000880)=""/68, 0x44}, {&(0x7f0000000900)=""/191, 0xbf}, {&(0x7f00000009c0)=""/202, 0xca}, {&(0x7f0000000ac0)=""/182, 0xb6}, {&(0x7f0000000b80)=""/4096, 0x1000}], 0x7, &(0x7f0000001c00)=""/179, 0xb3}, 0x1}, {{&(0x7f0000001cc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001d40)=""/2, 0x2}, {&(0x7f0000001d80)=""/144, 0x90}, {&(0x7f0000001e40)=""/167, 0xa7}], 0x3, &(0x7f0000001f40)=""/165, 0xa5}, 0x4}, {{&(0x7f0000002000), 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)=""/24, 0x18}, {&(0x7f00000020c0)=""/12, 0xc}], 0x2, &(0x7f0000002140)=""/51, 0x33}, 0x7f}, {{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000002180)=""/201, 0xc9}, {&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000002280)=""/106, 0x6a}, {&(0x7f0000002300)=""/137, 0x89}, {&(0x7f00000023c0)=""/57, 0x39}, {&(0x7f0000002400)=""/30, 0x1e}], 0x6, &(0x7f00000024c0)=""/212, 0xd4}, 0x8}, {{&(0x7f00000025c0)=@xdp, 0x80, &(0x7f0000002840)=[{&(0x7f0000002640)=""/136, 0x88}, {&(0x7f0000002700)=""/106, 0x6a}, {&(0x7f0000002780)=""/15, 0xf}, {&(0x7f00000027c0)=""/107, 0x6b}], 0x4, &(0x7f0000002880)=""/30, 0x1e}, 0x7}, {{&(0x7f00000028c0)=@nfc_llcp, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002940)=""/85, 0x55}, {&(0x7f00000029c0)=""/81, 0x51}], 0x2, &(0x7f0000002a80)=""/106, 0x6a}, 0x1}, {{&(0x7f0000002b00)=@ax25={{}, [@null, @default, @remote, @remote, @bcast, @default, @netrom, @netrom]}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002b80)=""/217, 0xd9}], 0x1, &(0x7f0000002cc0)=""/194, 0xc2}, 0x8}, {{&(0x7f0000002dc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000004200)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/203, 0xcb}], 0x2, &(0x7f0000002f80)=""/250, 0xfa}, 0x7f}], 0x9, 0x40012000, &(0x7f0000003080)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0xd5e242aad84384f7, 0x49, 0x1}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) [ 461.227746] audit: type=1326 audit(1564452333.832:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22069 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 [ 461.481331] Unknown ioctl 28677 02:05:34 executing program 5: openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x2, 0xa0001) write(r0, &(0x7f0000000000)='(', 0xffffff1f) mlockall(0x4) clone(0x20008001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, r0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x7) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = dup(r1) write$P9_RRENAMEAT(r2, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x100000001, 0x400000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000080)=0x8) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0xc) [ 462.016454] audit: type=1326 audit(1564452334.622:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22069 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 02:05:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000980)={{}, {0x1, 0x1}, [{0x2, 0x7, r2}, {0x2, 0x2, r3}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x2, r6}, {0x2, 0x2, r7}, {0x2, 0x4, r8}], {0x4, 0x2}, [{0x8, 0x5, r9}], {0x10, 0x5}, {0x20, 0x1}}, 0x64, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r10 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r10, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r10, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xa2, 0x1, 0x0, 0x1a, 0x200000003, 0x3f, 0x20, 0x323, 0x38, 0x3a9, 0x9, 0x2b45, 0x20, 0x1, 0x1, 0x8, 0x400}, [], "7de814522a154f146f1c1525c7f68647e5b48b09e88e754508f42998da441c1b1cecbb2661b588fe32e2e440c7d99731f597c3f23bbcdfe1515804d3e4db5eaa542670456364a1324497f3316157696c5667cdec1dd87e200f77659fbe632c71ebc509fc0ce5650c79ae31205c845e02e9c000fac9e66ad43202c53e4b69ff54fa47b7a53fb429cdfad5632ea878a3c89789d4c3d1a2081c2531a71a83b5334031911be07f81ef131fd1b4636fc252c430a9a9297aab21c714ee80bd0afd2d3039478b23e02969bf657a", [[], [], [], [], [], [], [], [], []]}, 0xa02) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000002300)=[{{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)=""/190}, {&(0x7f00000023c0)=""/114}], 0x0, &(0x7f00000003c0)=""/88}, 0x7}, {{&(0x7f0000000440)=@hci, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/68}, {&(0x7f0000001000)=""/171}], 0x0, &(0x7f00000010c0)=""/19}}, {{&(0x7f0000001100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001180)=""/5}, {&(0x7f0000002440)=""/28}, {&(0x7f0000001200)=""/170}], 0x0, &(0x7f0000001300)=""/4096}, 0xffffffffffffffe0}], 0x400000000000091, 0x0, 0x0) 02:05:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x40) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000300)=@srh={0x0, 0xc, 0x4, 0x6, 0x1, 0x40, 0xb4, [@loopback, @rand_addr="929b262e4eefaa91995ae23de2ef6d9a", @loopback, @empty, @local, @dev={0xfe, 0x80, [], 0x19}]}, 0x68) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f00000001c0)=0x1ff) fsetxattr$security_smack_transmute(r1, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) 02:05:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x80000001, 0x40) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x1f}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0xc0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={r1, 0x80000, r2}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x687f, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="d8fd5fa7fb837b75d26f01f614fa6611511bdb99bb6c09aa2fecda8c749c69113e75ca4d340470a835574a1d05b36c2d2d71b4d16d744e55dab418b7ee2e184ea412291de5272d86f6e95df905748c077de20f94b87be14115672172a292d290d97129e97eae997f1655d6d5672cf6289cf7b6b93ab3ccd4026ba1ef85adaef011c0c6f77f862a69655e3be32540d1b946f4900c8bf6f4aa4984f4ca42c6d7a8931d796e5c5e5193e62b9f908eb09daf1041a05f4a572f4ef8bb30e4216296fe7fe6edf4a7f3ce86516cf86d197630719a80cf7681846b922c19d573ec42a8e216c4b6559b4f", 0xe6, 0x4}, {&(0x7f00000005c0)="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", 0x1000, 0x4}], 0x10000, &(0x7f0000000340)='\x00') recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xfffffe09, &(0x7f00000000c0), 0x1}, 0xfffffffffffffffc}], 0x400000000000327, 0x0, 0x0) 02:05:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x8, 0x2}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x3}, &(0x7f0000000340)=0xffffffffffffffab) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) 02:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1ff, 0x111002) accept4$tipc(r2, &(0x7f0000000180)=@id, &(0x7f00000001c0)=0x10, 0x80800) pipe2(&(0x7f00000000c0), 0x80000) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:35 executing program 3: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x800) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) socketpair(0xd, 0x80803, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = dup(r2) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x9}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r4, 0x6}, &(0x7f0000000440)=0x8) mlockall(0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0x1c, 0x30, &(0x7f0000000240)="cc2fb81cf1cd910cb15d6c17d6a11e50dde75a9f3316b713876dab5e", &(0x7f0000000280)=""/48, 0x2}, 0x28) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000180)) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/204, &(0x7f00000000c0)=0xcc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$netrom(r3, &(0x7f0000000100)={{0x3, @bcast}, [@default, @rose, @remote, @default, @rose, @null, @bcast, @netrom]}, &(0x7f00000001c0)=0x48) 02:05:35 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) accept4$tipc(r1, &(0x7f0000000100)=@name, &(0x7f0000000180)=0x10, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r3}}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r1, 0x0, 0x0) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x429) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = msgget(0x0, 0x8) msgrcv(r2, &(0x7f0000000180)={0x0, ""/132}, 0x8c, 0x0, 0x800) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000300)=0x9) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x4c000, 0x0) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="553fec94248c32e27d04000000288a00", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000180)=""/164) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) r4 = getgid() getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000009c0)={0x0, 0x4, 0x80}, &(0x7f0000000a00)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000a40)={r5, 0x400, 0x30}, 0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)=0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xfffffffffffffe89) fsetxattr$system_posix_acl(r2, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="02000000010001000000000002000500", @ANYRES32=r3, @ANYBLOB="040001000000000008000100", @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=r6, @ANYBLOB="26c9468c4bb7bf0100000010000000", @ANYRES32=r7, @ANYBLOB="10001000000000002006000000000000"], 0x44, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000a80)={0x3180000000000000, 0x81, 0x9, 'queue1\x00', 0xfffffffffffffffe}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x4) write$capi20(r1, &(0x7f0000000900)={0x10, 0xd47f, 0xff, 0x83, 0x1, 0xd0}, 0x10) timer_create(0x1, &(0x7f00000007c0)={0x0, 0x3b, 0x1, @thr={&(0x7f0000000640)="7576504673dfe9230e2a3ecfd2dd63688cf583bdba501e9f22b4b124654da1087c3c0d7554751f3f6eca7ab1c1e05a952d2987bff06befed24488d64be5b8857d2ddcd4c8cbe3f78ca", &(0x7f00000006c0)="2c0edfc3d057eb25cc7f54c0c34b5af06c2e830b8741738958b20f1c998b532f31e01c09478cb4a930cc684d1690a1cae4cc3184773a19cdc7a0794d62fc213f1753c5880b6b61ea719b06018467ff75a3d7736628aec06f454b180e3c7468a464e8c407dfedffc2ac26d634d9d27f06333b357b67e1c32d5960b09af17055d6c7f6e109f1b59e486d48c18ca47b0a5bf957f06d86ad1c0d7dfa055ce4124d98b5204796bc415b1698c34a9fbfe6c5c8c2942d654543edfb5309735f6eb20c4cb550504aadd0999e7c16"}}, &(0x7f0000000800)=0x0) clock_gettime(0x0, &(0x7f0000000840)={0x0, 0x0}) timer_settime(r8, 0x0, &(0x7f0000000880)={{r9, r10+10000000}, {0x0, 0x1c9c380}}, &(0x7f00000008c0)) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:36 executing program 5: mlockall(0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x0, 0x100) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000000)=""/55) 02:05:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) pause() r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x200, 0x400000) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{0x6, 0x7, 0x400, 0x2}, {0x52, 0x1, 0x5, 0x7ff}]}) 02:05:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1, 0x0, 0xfffffffffffffc63}}], 0x1, 0xfffffffffffffffe, 0x0) 02:05:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x81, 0x100) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='\x00', 0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) 02:05:37 executing program 3: mlockall(0x3) clone(0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{0x3, 0x1, 0xfff, 0xffffffff, 'syz1\x00'}, 0x5, 0x204, 0x8, r1, 0x3, 0x1000000000000, 'syz1\x00', &(0x7f00000000c0)=['keyring\x00', '@wlan0*em1mime_typevmnet1wlan1em1&ppp0proc@\xb9\x00', '\x00'], 0x36, [], [0x81, 0xd1, 0x80000001]}) 02:05:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xe29, 0x29a6428a47b6e531) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x1000010000002}, 0x101) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x3, 0x1) ioctl$KDENABIO(r2, 0x4b36) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) 02:05:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x1, 0x0, 0x0) [ 464.570746] FAULT_INJECTION: forcing a failure. [ 464.570746] name failslab, interval 1, probability 0, space 0, times 0 [ 464.609162] CPU: 0 PID: 22230 Comm: syz-executor.5 Not tainted 4.14.134 #30 [ 464.616297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.625657] Call Trace: [ 464.628255] dump_stack+0x138/0x19c [ 464.631904] should_fail.cold+0x10f/0x159 [ 464.636067] should_failslab+0xdb/0x130 [ 464.640049] __kmalloc+0x2f0/0x7a0 [ 464.643606] ? mark_held_locks+0xb1/0x100 [ 464.647760] ? __local_bh_enable_ip+0x99/0x1a0 [ 464.652450] ? sock_kmalloc+0x7f/0xc0 [ 464.656258] sock_kmalloc+0x7f/0xc0 [ 464.659907] af_alg_alloc_areq+0x24/0x1e0 [ 464.664063] skcipher_recvmsg+0x741/0xd40 [ 464.668227] ? skcipher_release+0x50/0x50 [ 464.672394] ? selinux_socket_recvmsg+0x36/0x40 [ 464.677109] ? security_socket_recvmsg+0x91/0xc0 [ 464.681874] ? skcipher_release+0x50/0x50 [ 464.686027] sock_recvmsg+0xc6/0x110 [ 464.689748] ? __sock_recv_ts_and_drops+0x470/0x470 [ 464.694783] ___sys_recvmsg+0x21f/0x4d0 [ 464.698766] ? ___sys_sendmsg+0x840/0x840 [ 464.702922] ? lock_release+0x44d/0x940 [ 464.706905] ? lock_downgrade+0x6e0/0x6e0 [ 464.711067] ? __fget+0x237/0x370 [ 464.714524] ? __fget_light+0x172/0x1f0 [ 464.718505] ? __fdget+0x1b/0x20 [ 464.721882] ? sockfd_lookup_light+0xb4/0x160 [ 464.726377] __sys_recvmmsg+0x226/0x6b0 [ 464.730356] ? retint_kernel+0x2d/0x2d [ 464.734248] ? SyS_recvmsg+0x50/0x50 [ 464.737967] ? lock_downgrade+0x6e0/0x6e0 [ 464.742128] ? __mutex_unlock_slowpath+0x71/0x800 [ 464.746969] ? retint_kernel+0x2d/0x2d [ 464.750887] SyS_recvmmsg+0x125/0x140 [ 464.754687] ? __sys_recvmmsg+0x6b0/0x6b0 [ 464.758847] ? do_syscall_64+0x53/0x640 [ 464.762831] ? __sys_recvmmsg+0x6b0/0x6b0 [ 464.766992] do_syscall_64+0x1e8/0x640 02:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000001c0)={0x7, 0x0, 0x78e0, 0x7fffffff, 'syz0\x00', 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000100)={0x6, 0x1, 0x100}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 464.770884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.775738] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.780928] RIP: 0033:0x459829 [ 464.784112] RSP: 002b:00007f53b453dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 464.792064] RAX: ffffffffffffffda RBX: 00007f53b453dc90 RCX: 0000000000459829 [ 464.799334] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 464.806614] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 464.813883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53b453e6d4 [ 464.821158] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 02:05:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) 02:05:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 2: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f00000005c0)={'syz1\x00', {0x4, 0x100000000, 0x1, 0x7fff}, 0x4b, [0x0, 0x400, 0x5, 0x8, 0x81, 0x3, 0x0, 0x9, 0x7, 0x0, 0x4, 0x548, 0x0, 0x800, 0x7, 0x71, 0x8, 0x6a, 0x2, 0x4, 0x81, 0x7, 0x2, 0x8, 0x8, 0x9, 0x100000000, 0x2, 0x5, 0xfffffffffffffff7, 0x9, 0x2, 0x80, 0x1000, 0x9417, 0x8, 0x80000001, 0x3acd20a9, 0x2, 0x81, 0x100000001, 0xca1, 0x9, 0x8, 0x53, 0x63, 0x9, 0x1, 0x3, 0x3, 0xfffffffffffffff7, 0x7, 0x400, 0x0, 0x2, 0x4, 0x80000000, 0x7fff, 0x5, 0x650710e7, 0xee, 0x5, 0xff, 0xfffffffffffff800], [0x4, 0xffffffff, 0x9, 0xfff, 0x8000, 0x5, 0xbaf, 0x8, 0x8000, 0x8, 0x0, 0x4, 0x9, 0x1, 0xae0e, 0x6, 0x64c, 0x8007, 0x3, 0x1, 0x0, 0x9, 0x2168d677, 0x1, 0x5, 0x15db6cb6, 0x9, 0x100, 0x401, 0x8, 0x5c83, 0x7, 0x100, 0x0, 0x0, 0x7ff, 0x200000, 0x1, 0x6, 0x845e, 0x6, 0xffffffffffff2bdd, 0x1, 0x6, 0x101, 0x3ff, 0x2, 0xfffffffffffffffa, 0x401, 0xc70, 0x7ff, 0x9, 0x3ff, 0x401, 0x100000001, 0x2, 0x3, 0x2, 0x3, 0x9, 0x875d, 0x8000, 0x67, 0x81], [0xdcd3, 0xa6, 0x100, 0x1f, 0x898, 0x9, 0x10001, 0x9, 0x33ff, 0x0, 0xffffffffffff0000, 0x0, 0x2, 0x1ff, 0xfffffffffffffff9, 0x80000000, 0x34, 0x6, 0x100000001, 0x895b, 0x9, 0x1, 0x0, 0x1, 0x9, 0x2, 0x8001, 0xfff, 0x4, 0x80000001, 0x8, 0x3ff, 0x7, 0x3, 0x1000, 0x1, 0x6, 0x6, 0x9, 0x2, 0xc0000, 0x7ff, 0x3, 0x8, 0x10000, 0x1ff, 0x10000, 0x0, 0x1, 0x8001, 0x9, 0x4, 0x7ff, 0x1, 0x6, 0x100000001, 0x1ff, 0x8, 0x10000, 0x8, 0x4, 0x0, 0x9, 0x8], [0x451, 0x6, 0x800, 0x5, 0x9, 0x9, 0x5, 0x508, 0x3ff, 0x5, 0x7, 0x1, 0x1ff, 0x7, 0x100000001, 0x9, 0x5, 0x0, 0x1, 0x9, 0x7, 0x2, 0x4, 0x1, 0x7fe7, 0xffffffff, 0x8, 0x5, 0x7, 0x8e0, 0x9, 0x400, 0x7, 0x9, 0x3ff, 0x81, 0x4, 0x20, 0x6, 0x0, 0x7, 0x101, 0x7, 0xff, 0x10000, 0x1, 0x1f, 0x51e, 0x1, 0x20, 0x2, 0x4, 0x146800000000, 0x8, 0xe97d, 0x4, 0x0, 0xd24e, 0x5, 0x3, 0x6, 0x9, 0x3, 0xac]}, 0x45c) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000240)={0x15001, 0xf006, 0x8, 0x40, 0x7b}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = accept$alg(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8020080}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r6, 0x2, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x48040) write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r5, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000200)) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000440)=0x2, 0x4) dup3(r3, r0, 0x80000) ioctl$UI_DEV_CREATE(r4, 0x5501) 02:05:37 executing program 5 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 465.041552] FAULT_INJECTION: forcing a failure. [ 465.041552] name failslab, interval 1, probability 0, space 0, times 0 [ 465.096675] CPU: 0 PID: 22259 Comm: syz-executor.5 Not tainted 4.14.134 #30 [ 465.103812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.113171] Call Trace: [ 465.115771] dump_stack+0x138/0x19c [ 465.119419] should_fail.cold+0x10f/0x159 [ 465.123580] should_failslab+0xdb/0x130 [ 465.127565] __kmalloc+0x2f0/0x7a0 [ 465.131109] ? af_alg_get_rsgl+0x3d1/0x530 [ 465.135347] ? sock_kmalloc+0x7f/0xc0 [ 465.139154] sock_kmalloc+0x7f/0xc0 [ 465.142787] skcipher_recvmsg+0x217/0xd40 [ 465.146947] ? skcipher_release+0x50/0x50 [ 465.151091] ? selinux_socket_recvmsg+0x36/0x40 [ 465.155764] ? security_socket_recvmsg+0x91/0xc0 [ 465.160529] ? skcipher_release+0x50/0x50 [ 465.164687] sock_recvmsg+0xc6/0x110 [ 465.168404] ? __sock_recv_ts_and_drops+0x470/0x470 [ 465.173420] ___sys_recvmsg+0x21f/0x4d0 [ 465.177403] ? ___sys_sendmsg+0x840/0x840 [ 465.181557] ? __fget+0x210/0x370 [ 465.185025] ? lock_downgrade+0x6e0/0x6e0 [ 465.189180] ? __fget+0x237/0x370 [ 465.189196] ? __fget_light+0x172/0x1f0 [ 465.189206] ? __fdget+0x1b/0x20 [ 465.189218] ? sockfd_lookup_light+0xb4/0x160 [ 465.196631] __sys_recvmmsg+0x226/0x6b0 [ 465.196647] ? SyS_recvmsg+0x50/0x50 [ 465.196660] ? lock_downgrade+0x6e0/0x6e0 [ 465.216302] ? retint_kernel+0x2d/0x2d [ 465.220206] ? check_preemption_disabled+0x3c/0x250 [ 465.225233] SyS_recvmmsg+0x125/0x140 [ 465.229037] ? __sys_recvmmsg+0x6b0/0x6b0 [ 465.233189] ? do_syscall_64+0xcf/0x640 [ 465.237165] ? __sys_recvmmsg+0x6b0/0x6b0 [ 465.241315] do_syscall_64+0x1e8/0x640 [ 465.245204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.250062] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 465.255250] RIP: 0033:0x459829 [ 465.258441] RSP: 002b:00007f53b453dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 465.266155] RAX: ffffffffffffffda RBX: 00007f53b453dc90 RCX: 0000000000459829 [ 465.273424] RDX: 0000000000000001 RSI: 00000000200031c0 RDI: 0000000000000005 [ 465.280694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 465.287963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53b453e6d4 02:05:37 executing program 3: mlockall(0x7) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000040)) 02:05:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x101000, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x1, 0x1f, 0x496b, 0x1, 0x0, 0x4, 0x80001, 0x2, 0xe2f60000, 0x8001, 0xffffffffffffffff, 0xa96, 0x8, 0x10000, 0x0, 0x6, 0x5, 0x7fffffff, 0x7, 0x3, 0x40, 0xfb, 0x4, 0x5, 0x8000, 0x2, 0x8, 0x8, 0xaca7, 0x1, 0x7, 0x7, 0x12d, 0x9, 0xffffffffffff0001, 0x401, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0xc056538cf171c68c, 0x1, 0x101, 0xf, 0x401, 0x717ff18a, 0xffffffff}, r1, 0xd, r2, 0x1) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000300)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0xa0000, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x34a, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x18b}, 0x1}], 0x1, 0x1, 0x0) 02:05:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x60) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000180)={0x0, "94dc1aec6685a9d4cea0ca59abe7bbf6a3a6b0b7a87ee819a4be0182e421b2d7", 0x6, 0x20, 0x200, 0x2, 0x2, 0x6, 0x3f}) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)=0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0x6c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r6, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r6, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:37 executing program 5 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 465.295227] R13: 00000000004c6d4f R14: 00000000004dc050 R15: 0000000000000006 02:05:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x80000000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x4, 0x7, 0x40}, &(0x7f0000000200)=0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x3f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, '/dev/midi#\x00'}], 0xa, "dc37d1a7dd2a2b95a8c1c4f96fa50fcfd3e0de20ed205aaeb7fec34d4aa99f9cd50f7299dd610087c87c5c1b403b5065928fe3ec920a695e3aca5646c5b29a09ac6524fa4f73913a80f9e121ac8a"}, 0x65) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x5, 0x4000) ioctl$VT_ACTIVATE(r2, 0x5606, 0x7) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x208000) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f0000000100)=0x6, 0x4) 02:05:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x8) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r1}) connect$vsock_dgram(r2, &(0x7f0000000180)={0x28, 0x0, 0xffffffff}, 0x10) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100, 0x1) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x1, 0xfffffffffffffffd}}, 0xfffffffffffffff7) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) fstat(r3, &(0x7f00000001c0)) 02:05:38 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = getpid() r2 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000040)={0x5, 0xffffffffffffb264, r1, 0x0, r2, 0x0, 0x8, 0x3}) 02:05:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) setfsgid(0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000100)={@empty, @loopback, 0x0}, &(0x7f0000000180)=0xc) bind$can_raw(r1, &(0x7f00000001c0)={0x1d, r2}, 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = fcntl$getown(r0, 0x9) sched_setscheduler(r2, 0x0, &(0x7f00000000c0)=0xa6) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000180)=0x20900801d) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x10000, 0x0) 02:05:38 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x4e, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000140)=0xffffffffffffffe0, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) bind$bt_hci(r4, &(0x7f0000000240)={0x1f, r5, 0x1}, 0xc) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000001c0)=@buf={0x1000, &(0x7f00000005c0)="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"}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000100)='syz1\x00') write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) openat$usbmon(0xffffffffffffff9c, &(0x7f0000000180)='/dev/usbmon0\x00', 0x602000, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4, 0x40fc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x7fffffff}, &(0x7f0000000200)=0xfffffffffffffc72) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYBLOB="01000400000000000700e0000f2f061704df8345626a4976917fabfffa0a9c5250681dbe7eeeefab92491068ec4bef6a4d88eb57e19b6a71bb2ac76af8eef1c139ad611d3cce8cf0ab5c0f51c66730945916e680b53aaca58ebf39179ab7c4ad094611ea9a1f5828cfb68d5af47527bed09380cd1107527a825fb69fc0e23eb6be3933796c50064bd190"], 0x10) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x83, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0xd0}}], 0x1, 0xfffffffffffffffe, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x30000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x108, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x89}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x1) 02:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x10000, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x66a76c58a9137bb1) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mlockall(0x3) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7, 0x0, 0x1, 0x200}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000000c0)={r1, 0x7fffffff}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1}, 0xfffffffffffffffc}], 0x40000000000016b, 0x40000000, 0x0) 02:05:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x20, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x8140, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000001c0)={0x2, 0x4, 0x101, 0x1000, &(0x7f00000005c0)=""/4096, 0x11, &(0x7f0000000100)=""/17, 0xb, &(0x7f0000000180)=""/11}) 02:05:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt$llc_int(r1, 0x10c, 0xd, &(0x7f0000000100)=0x4, 0x4) r2 = getpid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000180)=r2) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-aesni-avx2\x00'}, 0xffffffffffffffec) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="2c1f82d2c7118160aabc1e7b1eb4d601b55e528a36a28771863723fd46b45824be4300e2700e63cb299be31b68b37a975b28c43ac9b6f814691b21a482cd1d", 0x3f) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000240)=0x7, 0x4) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x100) r2 = openat$cgroup_int(r1, &(0x7f0000000180)='memory.high\x00', 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x800) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f00000001c0)=0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000008c0)=r3, 0x4) io_submit(r5, 0x7, &(0x7f0000000880)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x5, r1, &(0x7f0000000200)="7ab84c9712ca657e6065f258bdc7fb560a83a5995420986b20b1b5eb45c08031138d395388359d532a9286921a9eb99e937dac0d019c66f58f197c2f118b9d3e2e8e4336a336d8e1277d51975ec288e4e528dcd52a65e2f71ca88ec7fc9d3bf4a40cc3aa71509c1d6d38b461433c0578ff38", 0x72, 0x6, 0x0, 0x1, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000340)="8b179689ceacbe779cf652e6b9f10dfdfdfab42b06ebad269531d6be1bc1cd5937a7a95d7c38635b4a6df768038dd3a556c38f069a68e73e4e5ca58165931d11b95ee4dd6635927afbd70bbe97ff9846e007015bd941de557685251c386052f2c9a6e4a9c5fc8c73e3a3a873a90a7a7c9d18389a65c6594e8cff82379969b6c21f8142bd8dae97854cc2a7520cb3be61", 0x90, 0x2, 0x0, 0x0, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x3f, r1, &(0x7f0000000440)="e67d33d43cbcaaf690231294d56a1768e17599c8985c2332dad93f6452689435471a506e8795bde70a9d6c1c6484eec6d6a775bfee0f9563fdbe481a5f13b771016ac426be47f65aae36a1b166aee9f99b002f2ad9e12ec40a6e51ab8462a3c8878a4dc947304aecf9b6f1876b32be5978aba7389bd8dbddf87daf80060ff2d4a279702d90aae56c133b2bb1804f73c16e4e", 0x92, 0x1, 0x0, 0x0, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x308, r3, &(0x7f00000005c0)="3473574330a3f12c618245eb00f972d3d114809e26c6b2ed340dca4c56607709b09cdc5a410ab200870f1e795ef13f68ca81c19bf8a54036b2df43d71f4c0386ded7058d022d66bbddab45d202d36f7b3cfb8ae66c010879bccbca8ba7dcea5e5b23ddb960e08b982350f148223d287b81e71481e5f436fc4058a0c944c052fc42705bf22d2f1107a3088dce196f338756d9894c28631e989a1173ade6a5d110ba0957a46b55f7f7142b30cbe2defb84383e5eb91c18d1fbe2507929d6f9028b0f6e33f123057452dbae0e2ff9f9bbf6b49f4c445e834d2e949a1cb8bb703610a8f16f651590bc87e6f8b0f8430cd203afa935b01023e3", 0xf7, 0x1000}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0xd, 0x4, r4, &(0x7f00000006c0)="52f75baaddda871877c1be1534a12a4c27488442eb518f583843bf6404dc55f29fea47a41ae7c55e7a1fdf57d285db3a207fd50c76c82cdb1be3dee4031f25b80c8e5e06a79a3322caf71f0cd0ce2ec431ca15c705052fae6e341a86f5d9d7c0f5f2fa4652f272ddf1cb59d79131430696", 0x71, 0x2, 0x0, 0x1}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000780)="e376298bec6c6bd6bd4a58c7fd788c4f438f46144f61e61b0aa9009ae24b", 0x1e, 0x80000000, 0x0, 0x1}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x8, 0x4, r0, &(0x7f0000000800)="1011bef812921dc0cf62", 0xa, 0x4310, 0x0, 0x3}]) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r6 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r6, &(0x7f0000000080)={0x14}, 0x262) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) recvmmsg(r6, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = dup2(r0, r0) connect$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.opaque\x00', &(0x7f0000000180)=':\x00', 0x2, 0x1) 02:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/87, 0x57}]}}], 0x1, 0x0, 0x0) 02:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200000) ioctl$TIOCSIG(r1, 0x40045436, 0x21) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200, 0x0) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40) sync_file_range(r0, 0x9, 0x0, 0x0) 02:05:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffecc) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4be, 0x800) 02:05:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = semget$private(0x0, 0x4, 0x84) semctl$GETZCNT(r2, 0x3, 0xf, &(0x7f0000000100)=""/16) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x100, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000300)={0x4, [0x4, 0xce, 0x1ff, 0x10001, 0x5, 0x0, 0x1, 0x9, 0x6, 0x3, 0x1, 0x4, 0x2, 0x4, 0x2, 0x1, 0x8000, 0x0, 0xac74, 0x7f, 0x1, 0x80000000, 0x9, 0x0, 0x3, 0x23, 0x7, 0xffff, 0x2, 0x1, 0x9, 0x9, 0x6, 0xfffffffffffffff7, 0x4, 0x2, 0x3, 0x0, 0x81bd, 0x4, 0x1, 0x8, 0x0, 0x6, 0x9, 0x62b8, 0x8fe, 0xfff], 0xb}) write$P9_RMKDIR(r3, &(0x7f0000000080)={0xfde2, 0x49, 0x2, {0x0, 0x2}}, 0x14) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f0000000200)="a7abfeffffff99f4e527a288d5ff7dfd38036904d07c05cfabea36916cf232149650031e46a5facd6110ec3be30bc1a213", 0x31) socket$alg(0x26, 0x5, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x2, 0xa, 0x5, 0x7, 0x21, 0x0, 0x70bd29, 0x25dfdbfd, [@sadb_x_sec_ctx={0x1d, 0x18, 0x2, 0x1, 0xe0, "e2e84c70ed215c0a5743bf81ee1cf92887659882cbd7980dcf2e0afe34dddfd2a02b675cef4e857a98bcd882750a4179d92ecb913fc6ba6516d426dc915b503cb7dedb295144668c1ee363300047e3bbf8102b0f60b02d2b1a2baf99746c00e0171a33f6369882eabf7d6ac07541674364c22983cb08b87f579c12b4c6f2e63f99f9768731dff4c300d999f7dc1857b67cd3011ca814ec35765193a58a79adf0b3397e7c40e96c0bfda8f4700862d2cf4fa8c997a5af500cbcd356c6b53d606f66f13416e09b088efd6885d0c93e52b0ea635e064a3765bbb6956ef0f79c1af4"}, @sadb_x_sa2={0x2, 0x13, 0x3ff, 0x0, 0x0, 0x70bd28, 0x3503}]}, 0x108}}, 0x8000) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$MON_IOCH_MFLUSH(r4, 0x9208, 0xffff) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x20000, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000180)=0x77e) 02:05:39 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x880, 0x40) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x1}}, 0xfffffe77) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) [ 466.957867] QAT: Invalid ioctl [ 466.972536] QAT: Invalid ioctl 02:05:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80, 0x0) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000100)=0x9, 0x4) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0x800}}, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x62f, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x8001, 0x0) 02:05:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 3: mlockall(0x3) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x123c00, 0x0) r1 = getpgrp(0xffffffffffffffff) sched_getaffinity(r1, 0x8, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xfffffd61) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x108) setsockopt$inet6_dccp_int(r1, 0x21, 0x1b, &(0x7f0000000040)=0x3, 0x4) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000140)={0x7, 0xbfb, &(0x7f0000000400)="892be51fef2bd66785df66c24acc7f4f732e6c76ae28130a54c59ccf84e3347589b4feab1014fd80283cd095f174b6c00a0814675004ed79a000194688e66c8cde1fd643d0f3bfd431233aa59cf966ebd2ac86af83bd001db8af9c3165e529cdcad4b88d0c64800144583f1b84a2a14a3b6a22838bbf5d2f", &(0x7f0000000480)="6429f7be9755bb798cdec3837c96ebb14f77a5b6886c60392408254d7c8e919096de82ae40867eab360ac08d9ea0fc0be581e5c4810c0e7c19356f150d29d6686eff66f55ccce67aaeb035e7ce32fb7a728b26e8b23844db4475ed73295cc9d696d40f7b64f319e52214faee76a877c17c1fee2b7b36b2ba387851a3542b31c088e2a2e1567448bef43d0fd348757bf8d56625fc95526fcfe998e3699cce2de3a7068ff22660f2b5f8d87ecee8faadb830063ca931529ba87761b8d977b133cc8f1a36f7", 0xfee8, 0xc4}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000003c0)="ab5545ecfabc0a4594248c32e27d04000000288a", 0x5) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0x0, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r3 = accept$alg(r0, 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000100)={0x0, 0x8, 0x7fffffff, 0x204}) recvfrom(r4, &(0x7f0000000180)=""/79, 0x4f, 0x10000, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x3, 0x4, 0x0, 0x0, {0xa, 0x4e20, 0xefe, @dev={0xfe, 0x80, [], 0x29}, 0x8}}}, 0x80) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x1, 0x1, &(0x7f00000000c0)=""/57, &(0x7f0000000180)=""/233, &(0x7f0000000300)=""/232, 0x1000}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x1, 0x0) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f00000005c0)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x24800, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000001400)=""/4096, 0xa5a}], 0x100000000000003e, 0x0) r6 = accept$alg(r0, 0x0, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000200)=0x4) write$P9_RMKDIR(r6, &(0x7f0000000080)={0x14}, 0x262) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000300)={r6, r6, 0xbc2, 0x73, &(0x7f0000000180)="02088a111aba053c7ebea9a0804b0b06502563d017174ef4105532f2dbe510c5cc541915f7b2bfa16007341e4b1bba6b2c372cac4c2963b45a0775d9b9244e9cca2ebc5777adf8d39af5ac39c854f5374ff7b419006c553b0da2952415232bd276066d9e036d2e8221820c8621df0dc7d003e4", 0x100000001, 0x1, 0x1, 0x3, 0x1, 0x0, 0xffffffff, 'syz0\x00'}) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x14) ioctl$KVM_PPC_ALLOCATE_HTAB(r7, 0xc004aea7, &(0x7f0000000400)=0x800) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000100)={0xfc, @broadcast, 0x4e23, 0x0, 'sed\x00', 0x10, 0x8000, 0x65}, 0x2c) recvmmsg(r6, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) accept$inet(r4, &(0x7f0000000240)={0x2, 0x0, @dev}, &(0x7f00000003c0)=0x10) fchmod(r0, 0x0) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0xfffffffffffff52c}, &(0x7f0000000200)=0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r5 = socket$packet(0x11, 0x40800000000003, 0x300) syz_emit_ethernet(0x300b00, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b409000002000000000000000000000000ffffe0000002ff020000000000000000000000000001880090780009040060b680fa0000000000000000000000000000ffffffffffff00000000000000f7b328c8ffac14ffbb"], 0x0) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000180)=0x100, 0x4) recvmsg(r5, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x3, 0x101000) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000300)={0xae9, 0x7, "2eeb6ee7767f217e3187add6af23a44bc8e249e2fdab4f0eece33de8e2539cde", 0x6, 0x9, 0x9a, 0x9, 0x10}) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8001, 0x6100) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0xc0000, 0x0) fanotify_mark(r2, 0x80, 0x4000000a, r3, &(0x7f00000001c0)='./file0\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) truncate(&(0x7f0000000240)='./file0\x00', 0x3) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) 02:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x9, 0xffffffff97152943, 0xfffffffffffff800, 0x5, 0x0, 0x7, 0x1400, 0xc, 0xf7, 0x81, 0x98b5, 0x10, 0x8, 0x79, 0x7ff, 0x81, 0xffffffff, 0x1, 0x0, 0x80, 0x1, 0x9, 0x1, 0xffff, 0x8, 0x0, 0x4b5, 0x2, 0x6, 0x8f05, 0x800, 0x7fffffff, 0x2, 0x7, 0x3, 0x1000, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x2}, 0x200, 0x1c39, 0x1df84532, 0xf, 0x9, 0x7b, 0xffffffff}, r2, 0x8, r1, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="ab553fec94248c32e27d04000000288a", 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) write$P9_RSTATFS(r2, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xfffffffffffff253, 0x0, 0x8, 0x419, 0x4, 0x1, 0x5, 0xc0b, 0x7ff}}, 0x43) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000180)={0xffffffffffffffdf, 0xea, "78fd8f6273de5b345a1a4277b9205a97dc74eb95f43904bb10ee420c08c7e76824f6e1f8d89f9ff97e9a2989aeca45abb584b09cef66c3e5505c591199ec5afee551a5dcf600ea059e0f62b57d4c27cf926e4e933fee5d81bfa2a5cda7d3012f4a2951bd7aca6b8e11ccb8b36bfa00d62a8bc91044b9d0a57fb7abc47d99b204f388f524a9636e74c072568ada7cce0a29cb1883cddc926d71784f35f172a2870e62c5b4acb4420c22ec32fb47efebed1664361f3cab69cab7f8ace772d65d85cc14174adee61a80ead1c30ee689376685863ab8bc8bfa8be73715266b13f87f46125fe9155f9aebac44"}) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x440) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000080)={0x0, 0x4, 0x3009, 0x1}) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) 02:05:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000280)) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000180)={&(0x7f0000000100)=[0x0], 0x1, 0x38000000000000}) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x4, 0x3}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000340)={r3, 0x3}, &(0x7f0000000380)=0x8) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20002008}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r4, @ANYBLOB="000027bd7000ffdbdf25070000003000020008000d000100000014000100000000000000000000000000000000000800050001000000080006000100010048000300080008000300000008000500ac1414bb14000600000000000000000000000000000000000800010002000000080003000300000008000800060000000800030003000000480001000800090035000000080004004e240000080002003c000000080005000300000008000600776c630008000b007369700014000300ac1e010100000d000000000000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x800}, 0x800) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/87, 0x57}], 0x1000000000000154}}], 0x4000000000002e8, 0x0, 0x0) 02:05:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000640)={0x0, 0x8, 0x9, 0x1}, &(0x7f0000000680)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000006c0)={r2, 0x100000000, 0x7, 0x6}, &(0x7f0000000700)=0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80400, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x12, 0xd, 0x800, 0x70bd25, 0x25dfdbfb, {0x7, 0x0, 0x7}, [@typed={0x4, 0x53}]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x4000010) fanotify_mark(r1, 0x88, 0x800102b, r4, &(0x7f00000003c0)='./file0\x00') setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000400)=@ccm_128={{0x303}, "216398e0bc970975", "c66df5b32ebffc0f3b2f5720847a55bf", "5a15e034", "a9f1fcc263ce47a5"}, 0x28) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x3, 0x1ff, 0xffffffff, 0x5, 0x20}, &(0x7f0000000240)=0x98) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000480)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000800)={&(0x7f0000000440), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14, r6, 0x303, 0x70bd25, 0xffff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r4, 0x28, &(0x7f0000000500)={0x0, 0x0}}, 0x10) ioctl$TIOCCONS(r4, 0x541d) write$FUSE_BMAP(r1, &(0x7f0000000740)={0x18, 0xffffffffffffffda, 0x8, {0x23dcac05}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={r7, 0x2, 0x10}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000880)=ANY=[@ANYRES32=r5, @ANYBLOB="c2000000f6280ea4b5b05996564ced3d8543370c59949e7bb8d92179a8041ec17a3d6c2ebb74a4b05a44fc7e5113b979e454513d4ed8b068c54e22f85111325613bc081ffe4afe36bdb6b174e7a294a3ddfee97c1f92c18e7b9b31c954e00b308cc5b4a5bd5e7279092928e7dc2ddba879bffabccffb3618a2cc5c050c48a5a1f71f298e72cf66670c1b56048446f699e58e2cc16002897fb649927f5e579818cc09ed5ae13dc29870771d389b7fa716bf7144d581de2274b4e11f54e479107fc6de24a7d5593b3e3a4f284cd9c95dffa1"], &(0x7f00000004c0)=0xca) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) kcmp(r2, r3, 0x5, r1, r1) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0x6, 0x4, 0x6}, &(0x7f00000001c0)=0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x400}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r2, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x7ff) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$inet6(r3, &(0x7f0000004800)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=[@hopopts={{0x13, 0x117, 0x3}}], 0x18}}], 0x2, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0xc759, 0x8, 0x8, 0x306}) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000174, 0x0) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007540)=[{{&(0x7f0000000200)=@caif, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/36, 0x24}, {&(0x7f0000000340)=""/68, 0x44}], 0x2, &(0x7f0000000400)=""/85, 0x55}, 0x7}, {{&(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000005c0)=""/182, 0xb6}, {&(0x7f0000000680)=""/208, 0xd0}, {&(0x7f0000000500)=""/38, 0x26}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/220, 0xdc}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/188, 0xbc}, {&(0x7f0000002940)=""/136, 0x88}], 0x8}, 0x5}, {{&(0x7f0000002a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002b00)=""/209, 0xd1}, {&(0x7f0000002c00)=""/110, 0x6e}, {&(0x7f0000002c80)=""/149, 0x95}, {&(0x7f0000002d40)=""/80, 0x50}, {&(0x7f0000002dc0)=""/208, 0xd0}, {&(0x7f0000002ec0)=""/75, 0x4b}, {&(0x7f0000002f40)=""/191, 0xbf}, {&(0x7f0000000540)=""/5, 0x5}, {&(0x7f0000003000)=""/232, 0xe8}], 0x9, &(0x7f0000003200)=""/198, 0xc6}, 0x3b}, {{&(0x7f0000003300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003380)=""/216, 0xd8}, {&(0x7f0000003480)=""/61, 0x3d}, {&(0x7f00000034c0)=""/34, 0x22}], 0x3, &(0x7f0000003540)=""/144, 0x90}, 0x4}, {{&(0x7f0000003600)=@un=@abs, 0x80, &(0x7f00000047c0)=[{&(0x7f0000003680)=""/44, 0x2c}, {&(0x7f00000036c0)=""/118, 0x76}, {&(0x7f0000003740)=""/4096, 0x1000}, {&(0x7f0000004740)=""/97, 0x61}], 0x4, &(0x7f0000004800)=""/53, 0x35}, 0x7}, {{0x0, 0x0, &(0x7f0000005d00)=[{&(0x7f0000004840)=""/232, 0xe8}, {&(0x7f0000004940)=""/39, 0x27}, {&(0x7f0000004980)=""/20, 0x14}, {&(0x7f00000049c0)=""/121, 0x79}, {&(0x7f0000004a40)=""/206, 0xce}, {&(0x7f0000004b40)=""/37, 0x25}, {&(0x7f0000004b80)=""/197, 0xc5}, {&(0x7f0000004c80)=""/100, 0x64}, {&(0x7f0000004d00)=""/4096, 0x1000}], 0x9, &(0x7f0000005dc0)=""/48, 0x30}, 0x200}, {{&(0x7f0000005e00)=@hci, 0x80, &(0x7f0000006f80)=[{&(0x7f0000005e80)=""/14, 0xe}, {&(0x7f0000005ec0)=""/41, 0x29}, {&(0x7f0000005f00)=""/4096, 0x1000}, {&(0x7f0000006f00)=""/108, 0x6c}], 0x4}, 0xc4df}, {{&(0x7f0000006fc0)=@xdp, 0x80, &(0x7f0000007300)=[{&(0x7f0000007040)=""/98, 0x62}, {&(0x7f00000070c0)=""/176, 0xb0}, {&(0x7f0000007180)=""/237, 0xed}, {&(0x7f0000007280)=""/22, 0x16}, {&(0x7f00000072c0)=""/41, 0x29}], 0x5, &(0x7f0000007380)=""/11, 0xb}, 0x101}, {{&(0x7f00000073c0)=@isdn, 0x80, &(0x7f0000007500)=[{&(0x7f0000007440)=""/163, 0xa3}], 0x1}, 0xffffffff}], 0x9, 0x2002, &(0x7f0000007780)={0x77359400}) 02:05:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2, 0x101800) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x1, 0x100000001]) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 3: mlockall(0x3) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x0, 0x20}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="ab0000000000003e1b000b000fccde980040d42894000000003cabcf6e700b2f4188683d53dd04435a4c322f56d1ad5ded73bcaa87f4671a1d1c934a0a2a79567bcb", 0xfffffffffffffee3) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="9dce041ae3c9a139", 0x8, 0xffffffffffffffff) keyctl$assume_authority(0x10, r3) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000001c0)={0x3, 0x1}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000100)={0x3, 0xfffffffffffffd33}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x349) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32e27d04000000288a", 0x199) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) flistxattr(r0, &(0x7f0000000180)=""/216, 0xd8) 02:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xb0bbac14) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x1}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000180)="2203539bfe68be43dcec712c36644588c823c7e37d4429505ca6fc17050e08ca05731c006d5ca34a84396aa0d64a3f457d9027fd812fab6df28025a465dd877171e8ad3063b70ba9ef69423b04e1b3ed4749473a24cf888e67a802987a84439b4d52dc70", 0x64}, {&(0x7f0000000200)="7fc69615ceb3acfc305c9a52ed7cf712fbfbde7f5044c837dc50837a77eeb6c574fd4de6cc3e4f5bfa5d587d03d2fb27000e23f4ca9d7385150c2130d6ee8cae1c50e266463aa5e935acc59881161da6cdd27f5fd54c3dd90e1d50c16e07ea983c9eecb783c8f52ddb3c2f5f91951aa710", 0x71}, {&(0x7f0000000300)="cf9d53fe1f0fc9af98b726e8cf03bdd43c29b22a0c1dd4c35d3018329ba1d48d7503c660bb4746131775d9043ba250c70ca5eaf80d60327de27a2a80d715c4c2cf111235e473af0bedefcca99e37f10c7b284801b40824ba0a53a7ef0c8880def8e74e4f9a52629b049b9d104a28689a873da6d5b74d067978eb396474f99a921f5fad9c0fe427e109b5cca5165cc1f5eac5f8001e514528a04a7d01e0f6bde1f4faecb7bcfc019372c031d5930aef", 0xaf}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="47f659d5090d2cd5a957adf099c25364e3e818ce1779e37e4b453f76693aa66dab40db45307e04a5a6ec34851d613429b624da069ad86fb0c41480c46cf9bb9631de97c5b86188ea578a9cbde557836585c7a8fbd5ebfc560859e7ed2f4f7a2b1354816c655b60e8ef5e5a3a02c6f138c3d56ec7c42ce724a9dada87b39487046c13b6f9a2260b60cccdc0e8420e0b7a322897108752", 0x96}], 0x5}, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x400402, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000100)=0x7) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000003c0)={0x80000000}) 02:05:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x121000, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0x1, 'syz1\x00', @default, 0x7ff, 0x4, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x20000) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000100)) 02:05:41 executing program 3: mlockall(0x3) clone(0x10000000000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/226, 0xe2}, {&(0x7f0000000300)=""/33, 0x21}, {&(0x7f0000000340)=""/181, 0xb5}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/95, 0x5f}, {&(0x7f00000004c0)=""/142, 0x8e}], 0x6, &(0x7f0000000640)=""/7, 0x7}, 0x4}, {{&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)=""/23, 0x17}], 0x1, &(0x7f0000000780)=""/197, 0xc5}, 0x3}, {{&(0x7f0000000880)=@sco, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/221, 0xdd}, {&(0x7f0000001a00)=""/5, 0x5}], 0x3, &(0x7f0000001a80)=""/74, 0x4a}, 0xff}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000001b00)=""/19, 0x13}, {&(0x7f0000001b40)=""/38, 0x26}, {&(0x7f0000001b80)=""/222, 0xde}, {&(0x7f0000001c80)=""/158, 0x9e}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f0000002d40)=""/75, 0x4b}], 0x6, &(0x7f0000002e40)=""/145, 0x91}, 0x80000000}, {{&(0x7f0000002f00)=@can, 0x80, &(0x7f0000003340)=[{&(0x7f0000002f80)=""/209, 0xd1}, {&(0x7f0000003080)=""/213, 0xd5}, {&(0x7f0000003200)=""/87, 0x57}, {&(0x7f0000003180), 0xfffffffffffffcb9}, {&(0x7f0000003280)=""/25, 0x19}, {&(0x7f00000032c0)=""/97, 0x61}], 0x6}, 0x20}, {{&(0x7f00000033c0)=@l2, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003440)=""/79, 0x4f}, {&(0x7f00000034c0)=""/40, 0x28}, {&(0x7f0000003500)=""/171, 0xab}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, &(0x7f0000003700)=""/198, 0xc6}, 0x3}, {{&(0x7f0000003800)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003880)=""/210, 0xd2}, {&(0x7f0000003980)=""/140, 0x8c}, {&(0x7f0000003a40)=""/15, 0xf}, {&(0x7f0000003a80)=""/91, 0x5b}, {&(0x7f0000003b00)=""/174, 0xae}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/234, 0xea}, {&(0x7f0000003d40)=""/235, 0xeb}], 0x8, &(0x7f0000003ec0)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000004ec0)=@caif=@rfm, 0x80, &(0x7f0000006080)=[{&(0x7f0000004f40)=""/4096, 0x1000}, {&(0x7f0000005f40)=""/6, 0x6}, {&(0x7f0000005f80)=""/234, 0xea}], 0x3, &(0x7f00000060c0)=""/19, 0x13}, 0xf1bf5bf}], 0x8, 0x40000141, 0x0) 02:05:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x400082) 02:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x139580) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000100)={0x81, 0x7, [0x400, 0x0, 0x8, 0x2, 0x3], 0x8000}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000180)={0x101, {{0xa, 0x4e24, 0x9, @loopback, 0x1}}}, 0x88) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x12}, 0xfffffffffffffffe}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000300)=""/10) 02:05:42 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/sequencer\x00', 0x200000, 0x0) r1 = getpgid(0x0) write$FUSE_LK(r0, &(0x7f0000001900)={0x28, 0x0, 0x1, {{0x3ff, 0x8000, 0x1, r1}}}, 0x28) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000001800)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000300)=""/208, 0xd0}, {&(0x7f0000000400)=""/216, 0xd8}, {&(0x7f0000000500)=""/64, 0x40}, {&(0x7f00000005c0)=""/205, 0xcd}, {&(0x7f00000006c0)=""/154, 0x9a}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000540)=""/35, 0x23}, 0x2}], 0x1, 0x40010042, &(0x7f0000001880)={r3, r4+30000000}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000180)={&(0x7f0000000100)=[0x1, 0xfffffffffffffffb, 0x2, 0x3, 0x3, 0x20], 0x6, 0x4, 0x7fffffff, 0x4, 0x81, 0x9, {0x0, 0x3, 0x7, 0x0, 0x8, 0x5, 0x9, 0x40, 0x3ff, 0x6, 0x2, 0x3, 0x9, 0x40, "4a06728aeeedf6268416bb43f4e99d50bb6c9e0e13804ae8b7977afb7ecb8ac4"}}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x480000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x9, 0xffffffffffffffc6, 0xd13, 0xaf57, 0x81}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000440)={r2, 0x8000, 0x30, 0x7b08, 0x1}, &(0x7f0000000380)=0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32e27d04000000288a", 0xffffffffffffffaa) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = fcntl$getown(r0, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)) r3 = accept$alg(r0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10813, r1, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0xfffffffffffffe79, &(0x7f0000000100)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x100000000, 0x0) 02:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="c6553f288a0000000000000000000000fa5cf39bded26983af5d08418a42d318316b703669f931b8cd5f45b895a2bbd9f3940876c3d3bf04d435a7b72286950834361a53ca98dfe8831a09118d8c7a36b5ac2d5a1a24571cfd34102d730ab7", 0xc) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f00000003c0)={0xc227, 0x3}) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000300)={'ip6gretap0\x00', 0x3}) r3 = dup2(r0, r0) getsockname$ax25(r1, &(0x7f0000000400)={{0x3, @bcast}, [@rose, @netrom, @netrom, @null, @remote, @rose, @rose]}, &(0x7f0000000480)=0x48) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x155, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x117}}], 0x1, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x900110}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="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"], 0x344}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000900)=0x4) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) connect$vsock_dgram(r3, &(0x7f0000000a80)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000940)=0x0) r5 = geteuid() lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a40)={r4, r5, r6}, 0xc) 02:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)="3151bb423836505f767ac7b3c99fcb6123c63da02efec073aeaadf8e739942106bc8032d53b0060b4f12a2c662a804db8e5bfde406fead83bcb067af767e1cc73a83c0e414e54c3535d2d31b2c74fb566a7beb8ad5b100e73389a0a92c83b10d4f2998ead04a27d06a2d633e410ade9bb1e1b9576447566f8912378ac2c424dff9f9c700fc1ec4abe76aa47f37dfc745b5d9ab6569dedd0e6ab59142090696aa46208074f5eae542f20ab8082cfe910ded5852ce61", 0xb5, r0}, 0x68) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000380)={0x2}) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000100)={0x7, 0x79, 0x1}, 0x7) syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x82}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 3: mlockall(0x401003) mlockall(0x100000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x80000, 0x0) fcntl$getflags(r0, 0xb) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x101000) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000180)='/proc/self\x00') write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x200, 0x2, 0x9, 0xee15, 0x6, 0x3, 0x6, 0x6, 0xc0, 0x40, 0x2a3, 0x143, 0x100000000, 0x38, 0x1, 0x6, 0x854, 0x9}, [{0x3, 0x80, 0x300000000000000, 0x1ff, 0x3, 0x800, 0x1, 0x1}], "d3adde09984e5f9f9c34e6a55d12847b3626d33d79c866fa010998e20554f7f21437f820e14933045aa5cd9c9373cb440abc89b41d0ce88d834a44d434481c8f9cc0e913740995c2cf49d1a43876ed900f4711602f09ad0b62f4ea5e0aaa3c4ea64445f835a1cc18b101ab9081ecb217405153"}, 0xeb) 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) fadvise64(r1, 0x0, 0x3, 0x5) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) flistxattr(r0, &(0x7f00000005c0)=""/4096, 0x1000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x204000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x8, 0x800}, {0x101, 0x8, 0x5, 0x79}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) fcntl$getown(r1, 0x9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) flistxattr(r2, &(0x7f0000000180)=""/138, 0x8a) write$P9_RMKDIR(r2, &(0x7f00000000c0)={0x14}, 0x14) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) fcntl$addseals(r0, 0x409, 0x2) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) fgetxattr(r1, &(0x7f00000000c0)=@random={'security.', '\x00'}, &(0x7f0000000180)=""/128, 0x80) 02:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x67d) r1 = accept$alg(r0, 0x0, 0x0) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x359) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000200)={0x2b, 0x4, 0x0, {0x3, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f00000000c0)={0x8001, 0x0, [], {0x0, @bt={0x83e2, 0x8, 0x1, 0x1, 0x9, 0x61, 0xfffffffffffffffe, 0x4, 0x3, 0x0, 0x5, 0x10000, 0x0, 0xbdd, 0x6, 0x9}}}) 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffe9a) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ab0600ec94248c32e27d04000000289c22606d5c94c2bfc4df2e43b7640d1b38a3b3fbcb2737e827fb0baa82f5881db0b5d4e9d58e01567c03000000de5ae943a04d7e391d0272825e93a8537fdee52ef09d60a535c9d6d0e2f4da7a3650b9738dbf072211c728895beefcba1e9cffdcd2f61415b2f15d541bbeced482edf33a1f6c25bad2e94136e090000000926000000b88e2a68f07a688", 0xfffffffffffffe70) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1000000000000070}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xff, 0x10, 0x7}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e20, 0x7b, @remote, 0x8000}}, 0x6, 0x3, 0xf07, 0x100, 0x10}, &(0x7f0000000240)=0x98) 02:05:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2281, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000003c0)={@ipv4={[], [], @local}}, &(0x7f0000000400)=0x14) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000480)={0xf005, &(0x7f0000000440), 0xcf03bfa03d79dfb3, r0, 0xd}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) write$P9_RSTATu(r0, &(0x7f0000000280)={0x82, 0x7d, 0x2, {{0x0, 0x6d, 0x5, 0x3f, {0xb2, 0x1, 0x3}, 0x1000000, 0x81, 0x8001, 0x4, 0x7, 'wlan0-@', 0x5, ')!]@/', 0x13, 'system{@selfselinux', 0x1b, 'eth0systemposix_acl_access)'}, 0x0, '', r1, r2, r3}}, 0x82) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000340)) fcntl$dupfd(r0, 0x0, r0) 02:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_ifreq(r2, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) ioctl(0xffffffffffffffff, 0x3, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) r4 = fcntl$dupfd(r3, 0x0, r1) socket$alg(0x26, 0x5, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x4000, 0x0) linkat(r4, &(0x7f0000000100)='./file0\x00', r5, &(0x7f00000001c0)='./file0\x00', 0x1400) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="c0dca5") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) syz_open_dev$sndtimer(&(0x7f00000004c0)='/dev/snd/timer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x200) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x3ff) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000000c0)=0x2, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(morus1280-avx2)\x00'}, 0x58) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) [ 470.066439] bond0: The slave device specified does not support setting the MAC address 02:05:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 470.186601] bond0: The slave device specified does not support setting the MAC address 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x100000000, 0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10004100}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x93}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff062}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x70}]}]}, 0x74}}, 0x20000040) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x261, 0x49, 0x8000000000000, {0x0, 0xffffffffffffffff, 0x800000}}, 0x14) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x1b2, 0x49, 0xfffffffffffffffe, {0x4, 0x0, 0xfffffffffffffffc}}, 0x11a) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1, 0x0, 0xfffffffffffffe04}}], 0x1, 0x0, 0x0) 02:05:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:42 executing program 2: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000005) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffd41) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='bpq0\x00'}) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x10000, 0x0) 02:05:43 executing program 3: mlockall(0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x400000000000002e, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000500)='reno\x00\xce\xbfE\x1dqu\bg\xb1D\x94\xd5y\x80\xf2\x99\r\x931%\xf5\xba\xfa-\x85^\xe5\x13\xf6>*<\xc2N\x87h\x82\xf2\xd9\xd6W]\x10\x17\x95ty\xf4\x1a\xd0\xc4\xe3bh\x12\xf1a\xc8\xeay\x18\f?\x02 =\xee\xde\xc3\tdz\xc8\x9c\xa2\xb0\xf2\x18\n\xa5\xb7u\xbd*\x8c\xe4\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x64) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) clock_gettime(0x7, &(0x7f00000001c0)) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) setsockopt$sock_timeval(r2, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0xffffffffffffff04) write(r3, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r3, &(0x7f0000000300)=""/31, 0x1f, 0x200100, &(0x7f0000001880), 0x9) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r6 = accept4(r4, 0x0, 0x0, 0xfffffffffffffffc) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="824967d68bc0a43fa768c96c602e677dedc8668fb3c2bc003e7093505b1ac969eea29b735b01b55e53654d5595e28dfa5f4d778ee1e99205223ebefae2f8dca7b9d8172810223d522463a97f7522ac6ce7a30ad61978e78e9ad84e32d3442916ce41b5ccf69e13bffab7a532286ecfba0b0156f69955be72399f182821a452e2ad37206442141a0f1921c79267e7e06284f1c17d079489acc3267d2fef35ed4314", 0xa1, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="87f1beea2bc3eb12fbcb29530d23c592f33f5e94c926a131b1b92efc8561311e5b8faeacd61926953467062d6937ffd305304481558c2cbc600510177af6bc", 0x3f, r7) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getdents64(r8, &(0x7f0000000200)=""/116, 0x74) 02:05:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x373, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}, 0x6}], 0x4000000000002fe, 0x0, 0x0) 02:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x267, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) connect$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x1ff, {0xea6, 0x5, 0x7ff, 0xcb83, 0x8, 0x5}, 0x80000000, 0x4}, 0xe) 02:05:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x321) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x8001) r2 = accept$alg(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', r3}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r4, 0x0, 0x83, &(0x7f0000000180)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f00000005c0)=""/4096}, &(0x7f0000000200)=0x78) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$TIOCNXCL(r4, 0x540d) 02:05:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e21}, 0x6e) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x21c080, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001900)={r2, &(0x7f0000001700)="d1b008e1337044c5a088603d3ff3b57aff2447683ab00648c5eb9ba8b39e3eb4553b89e5591a41d99020ea1751f59b836ce7d316856278653af926df74290f0b90bd69bb5e99926ceadd596b7e3ed14649c6c7ca4a887a433606c1b939d23be52c880b0941b9ba8be715675a2089071d10a1ebecf45c1bcf5234853ec0b0e0d2c417339cf7aff230764f590e0627b5d50d01129977b7d04531a5e0997520fccdfab85500b3618bdaf55689d8690085a1789d873ce15b5422ad8d56ccf6e8b99c54278d552acc9444e8b13affc7d189dcb1859e5df323fab5bfe310d4c6b5329d357c", &(0x7f0000001800)=""/228}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000015c0)={0x8, 0x0, [{0x3000, 0xd4, &(0x7f0000000180)=""/212}, {0x6, 0x20, &(0x7f00000000c0)=""/32}, {0x107000, 0x1000, &(0x7f00000005c0)=""/4096}, {0x0, 0x0, &(0x7f0000000100)}, {0x0, 0xdb, &(0x7f0000000300)=""/219}, {0x100004, 0x5a, &(0x7f0000000400)=""/90}, {0x3000, 0x6a, &(0x7f0000000480)=""/106}, {0x10000, 0x74, &(0x7f0000000500)=""/116}]}) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000001940)=[@in6={0xa, 0x4e21, 0x5, @remote}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @loopback}}], 0x48) 02:05:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x800) 02:05:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1410c2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)={0x1, r3}) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) 02:05:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1) write$P9_RLCREATE(r1, &(0x7f0000000180)={0x18, 0xf, 0x1, {{0x8, 0x0, 0x8}, 0x5}}, 0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1, 0x0, 0x25a}}], 0x1, 0x2001, 0x0) 02:05:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000100)={0x2}) 02:05:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) rt_sigsuspend(&(0x7f0000000180), 0x8) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2a6, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000100)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000001c0)={{0x210, 0x2a, 0xff, 0x6, 0x9, 0x6}, 0xfffffffffffff26c, 0xe7, 0x4, 0x0, 0x6, "208da49ae192696289ba1c2d64945491fcb6e70a1456796b7661588705b97ceeba32a8d07218874eae539187d9f8b6c9742219bcb6ad865c1127ef0bc2abc28cc9279af0d00098ef5ac785cd4d111dd1cf5c26b400b2e928308cae7b73aff708361fc2f40800544e8461308d1fcf4a45582bba1b928a8e208dc07ad72fb9c09b"}) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 3: mlockall(0x3) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80) getsockname$tipc(r0, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r2 = getpid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r2) 02:05:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x3) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000180)=0x8) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x7ff, 0x10800) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x80000000000}}, 0x14) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000200)={0x8, 0x5, 0x7ff, 0x7, 0x7ff, 0x7}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'md5\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="56999aa912669f8e24b30321ec12bf2b10b65bbcc27320206de714e9c71808377aec336318e92f5b30f52f249fe93f4df40df7442caae3376462f593de2ebc823e6a51a01abc445136724ce5becc1efd2ec8f7f3d94c75cda29eb97ad3f99fcd7b8f5812b441ec04e063130c8011a60f2e8bbf167890e15d1348f4a22bb918d9370cd838e522a959ca649cf721d841", 0x8f) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000100)={{0x7, 0x401, 0xff, 0x8, 0x3, 0x1}, 0x7f}) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x9) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x2}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x42009000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x620, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f00000005c0)) 02:05:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0xfffffdee, &(0x7f00000000c0), 0x1}}], 0x61, 0x0, 0x0) 02:05:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0x4}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-ce\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000001c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="bd06efebdcf26d9e627c95be73895ccc5fcbeb3f5cc9e05d9996fc4ca9428934f583c6c4d3a5d246d51d1b4d59a6122ff9267615a70101fb40ede1b9f28a3d81394938f88b8e70415bd983ad574b8bda6ecb7f584c117189c463229cc0580f30c81e5b6cb179dd5503e599653b75daaceea1fd1d5a9e5337931cc414941284", 0x7f) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x8c}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1ffffffffffffffc, 0xc90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x400) write$rfkill(r2, &(0x7f00000001c0)={0x8, 0x5}, 0x8) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000200)=""/79) 02:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'os2.', 'lrw(serpent)\x00'}) 02:05:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fdinfo/3\x00') getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'mangle\x00'}, &(0x7f0000000240)=0x54) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x50080) fchmodat(r3, &(0x7f0000000100)='./file0\x00', 0x88) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 3: mlockall(0x3) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x490, 0x278, 0x0, 0x0, 0x3a8, 0x3a8, 0x3a8, 0x4, &(0x7f0000000080), {[{{@arp={@local, @multicast1, 0xff, 0x941529a9af981d77, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xd0b, 0x63ba, 0x4, 0x4, 0x9, 0x4, 'lapb0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0x204}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@dev={[], 0xe}, @dev={0xac, 0x14, 0x14, 0x25}, @loopback, 0x1, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x1, 'syz1\x00', 0x1}}}, {{@arp={@multicast2, @loopback, 0xffffff00, 0xffffff00, @mac=@remote, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@broadcast, {[0xff, 0xff, 0x3dcbba873baf164a, 0x0, 0x0, 0xff]}, 0x6, 0x2, 0x4ace, 0x3, 0x7fff, 0x6, 'lo\x00', 'ip6gretap0\x00', {}, {0xff}, 0x0, 0x200}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "46300ebc7014961b4a8928f435ff3c276bb22ee30d339e3aab03565c4705"}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x1, @broadcast}}, 0x80) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r1, 0x0, 0x0) r4 = dup3(r0, r2, 0x0) ioctl$RTC_AIE_OFF(r4, 0x7002) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x1, @loopback, 0x4}, @in6={0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, [], 0xc}, 0x4}, @in6={0xa, 0x4e20, 0x1, @mcast2, 0x7fffffff}, @in6={0xa, 0x4e21, 0x26, @remote, 0x4}, @in6={0xa, 0x4e20, 0x6, @remote, 0x2}, @in6={0xa, 0x4e20, 0x10001, @loopback, 0x8}, @in={0x2, 0x4e24, @rand_addr=0x8ce2}, @in6={0xa, 0x4e20, 0x0, @rand_addr="7d880a4694b22d2b7dff442f3d08bffa", 0x8}], 0xd4) 02:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240)=0xc, 0x4) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x1000, 0x0) r3 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) r4 = inotify_add_watch(r1, &(0x7f0000000640)='./file0\x00', 0x1000000) inotify_rm_watch(r3, r4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@ipv4={[], [], @loopback}, 0x10000, 0x2, 0x2, 0x4, 0xffff, 0x11}, 0x20) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x1d8000000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000580)=""/145, 0x91}], 0x1) r5 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14}, 0x262) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ptrace$setregset(0x4205, r6, 0x1, &(0x7f0000000000)={&(0x7f0000000480)="7a17326d43ccb72788617f75f0a1478e624ffd59a165d57ab5f123723bde5b293acf3969caf21d15107e0f5435f75f8e714b475455bf586c7d755d7947d8e79bcca33736850e283e9d7a08195d34a1947090483ede6caf21255b01f670caaf170108a6ccd73d4147781f9259eb4bee2170de86429fefac294baf6137d7eb7a3cefd506052c0269d62edc194809f79eff826d21b3ce81ba47ba023ab505939a2f4c6254", 0xa3}) sched_setscheduler(r6, 0x0, &(0x7f0000000200)=0xd0d) 02:05:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-ce\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000180)) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000180)='skcipher\x00', 0x9) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x800, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4000) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1a000073657270656e744b00010409000000000000000000fb0eff87ec6b000080de1cccfe3247e075d6efa8cf8e90f37a1d4be45dc25424fe474bbfab430df9b024d5b0e0"], 0x1a) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x40) 02:05:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000180)=""/245) 02:05:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 02:05:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x6f}}], 0x1, 0x0, 0x0) 02:05:46 executing program 3: mlockall(0x3) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400102, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'netdevsim0\x00', 0x1}, 0x18) 02:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) connect$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$nl_route(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000007060000feb6a292f00125bd7000fbdbdf2502347595c01d84"], 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x80) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="ca080003002000020001"], &(0x7f0000000440)=0xe) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000006c0)=@assoc_id=0x0, &(0x7f0000000700)=0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000740)={r4, 0xfff, 0x79cf595f, 0x8, 0x3}, 0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000480)={r3, 0x0, 0x0, 0x5, 0x3}, &(0x7f00000004c0)=0x18) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f00000007c0)=""/221) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101000, 0x0) write$P9_RSTATFS(r6, &(0x7f0000000200)={0x43, 0x9, 0x1, {0xfffffffffffffffe, 0x3, 0x9, 0x0, 0x40, 0x8, 0x0, 0x1, 0x4}}, 0x43) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000540)=0xe8) r8 = getgid() chown(&(0x7f0000000500)='./file0\x00', r7, r8) 02:05:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000000c0)=0x8001) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7, 0x8000) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x2, 0x2, 0x6}}, 0x6) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) 02:05:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab557d04000000288a", 0x9) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0x231, 0x4e86, 0xffff}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) set_mempolicy(0x0, &(0x7f0000000180)=0x2, 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x418001, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x3) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) uname(&(0x7f0000000180)=""/192) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x3f, 0xf7f, 0x1, 0x7fffffff, 0xfd}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0xad75}, 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0), 0x0, 0x0, 0x0) 02:05:46 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10800, 0x0) getsockname$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/mcfilter6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) write$smack_current(r0, &(0x7f0000000040)='posix_acl_access&(\x00', 0x13) 02:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8ce7, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000100)=0x8, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x8bfb57a2e583ec6b, 0x49, 0x0, {0x43, 0x1}}, 0x262) recvmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000180)=@nfc, 0x0, &(0x7f0000001800)=[{&(0x7f0000000200)=""/76}, {&(0x7f0000000100)=""/13}, {&(0x7f0000000300)=""/228}, {&(0x7f0000000400)=""/105}, {&(0x7f0000000480)=""/193}, {&(0x7f00000005c0)=""/93}, {&(0x7f0000000640)=""/4096}, {&(0x7f0000001640)=""/137}, {&(0x7f0000001700)=""/195}], 0x0, &(0x7f00000018c0)=""/153}, 0x2}, {{&(0x7f0000001980)=@hci, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001a00)=""/150}, {&(0x7f0000001ac0)=""/238}, {&(0x7f0000001bc0)=""/241}, {&(0x7f0000006480)=""/1}, {&(0x7f0000001d00)=""/46}, {&(0x7f0000001d40)=""/138}], 0x0, &(0x7f0000001e80)=""/143}, 0x146}, {{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000001f40)=""/68}, {&(0x7f0000001fc0)=""/24}, {&(0x7f0000002000)=""/223}, {&(0x7f0000002100)=""/202}, {&(0x7f00000064c0)=""/174}, {&(0x7f00000022c0)=""/171}, {&(0x7f0000003200)=""/4096}, {&(0x7f0000002380)=""/18}, {&(0x7f00000023c0)=""/37}, {&(0x7f0000002400)=""/5}], 0x0, &(0x7f0000002500)=""/5}, 0x2}, {{&(0x7f0000002540)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x0, &(0x7f0000002940)=[{&(0x7f00000025c0)=""/57}, {&(0x7f0000002600)=""/45}, {&(0x7f0000002640)=""/98}, {&(0x7f0000004200)=""/4096}, {&(0x7f00000026c0)=""/56}, {&(0x7f0000002700)=""/88}, {&(0x7f0000002780)=""/191}, {&(0x7f0000005200)=""/4096}, {&(0x7f0000002840)=""/204}], 0x0, &(0x7f0000002a00)=""/187}, 0x3}, {{&(0x7f0000002ac0), 0x0, &(0x7f0000002e80)=[{&(0x7f0000002b40)=""/113}, {&(0x7f0000002bc0)=""/61, 0x116}, {&(0x7f0000002c00)=""/145}, {&(0x7f0000002cc0)=""/244}, {&(0x7f0000002dc0)=""/22}, {&(0x7f0000002e00)=""/100}], 0x0, &(0x7f0000002f00)=""/173}, 0x80}, {{0x0, 0x0, &(0x7f00000062c0)=[{&(0x7f0000002fc0)=""/237}, {&(0x7f00000030c0)=""/201}, {&(0x7f0000006200)=""/190}]}, 0xb2a6}], 0x212dd175a2d7705, 0x0, 0x0) 02:05:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="288a0000000000000000000000004900", 0xffffffffffffff43) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) keyctl$session_to_parent(0x12) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x143000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000005c0)={@dev, @rand_addr, 0x0}, &(0x7f0000000600)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) accept(r2, &(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000001340)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000001380)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14, 0x800) accept$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001500)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0}, &(0x7f0000001580)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000001b00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001ac0)={&(0x7f00000015c0)={0x4f0, r4, 0x301, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0xb8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x1ac, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r11}, {0x260, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1, 0x8, 0x44, 0x8}, {0x3, 0x101, 0x7fff, 0x81db}, {0x6, 0x81, 0xff, 0x1}, {0x10000, 0x5, 0xfffffffffffffd48, 0xa5}, {0x400, 0x2, 0x5, 0x1}, {0x6, 0x1, 0x1, 0x3}, {0x3, 0x0, 0x6, 0x2eac}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x8001, 0x3, 0x8, 0xfa4d}, {0xc5, 0xfffffffffffff000, 0x81, 0xd419}, {0x4, 0x3, 0x100000001, 0x9}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9f}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}]}, 0x4f0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x80, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RUNLINKAT(r3, &(0x7f0000000100)={0x7, 0x4d, 0x2}, 0x7) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000100)=0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) 02:05:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x30000, 0x0) getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0xfffffffffffffffe}, 0x14) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:05:47 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1, 0x10}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x94, "88efe53444804b206af9ee93e349f23aa6ce95cc0e614889c6fee7cc65319b2914f79aa5effc6ef244c01597d5b98718b20b526e110226eca1fbba98d593727219cecf66a1eb00166903bf3116407d9e4d14e2d80dcdf9044a7df630a6cbf6163fbf46760042e393a14da9b284d91ffd249ee9a6d5ebd36e81e76d434719a22d725a2e3352906a06fbe6f832f438e22e58164784"}, &(0x7f0000000180)=0x9c) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x101, 0x10001, 0xfffffffffffffffc, 0x4, 0x400, 0x200, 0xfa1, {r2, @in={{0x2, 0x4e22, @empty}}, 0xf8e049a, 0x1, 0x5, 0xf31f, 0x1}}, &(0x7f0000000280)=0xb0) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2002, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000005c0)=""/4096, &(0x7f0000000100)=0x1000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), 0x4) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x4000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r1, &(0x7f00000003c0)="7b7862542149bc9ea1bd3971bca6cc96bfbf077115860f53499ea43ed7b5beeb8b66d6997cc1e04433976b817a2db720f9ef194e904c69840c079829850180bf0241c06f2ff7afd64531b7473b29e7d8dfbe706e75360ddb37c2c881a7aea26925c1fa80e50dddf87e70b9170e05195fa38ae5d86295231c104945ba160cde87c2e04656bd34038467a60b4a02b29eb99f372594bbf218903005de15b07341ce01f85d56c6bffb7b10b70713ee70335657c788e3b8ad2c7b6c6917c01a9e100e40bbb241608d", &(0x7f00000004c0)=""/53}, 0x18) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000200)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x57e6f42b, 0x8200) r2 = accept$alg(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000380)={0xc}) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) lookup_dcookie(0x20, &(0x7f0000000300)=""/83, 0x53) accept4(r0, &(0x7f00000000c0)=@ethernet={0x0, @dev}, &(0x7f0000000180)=0x80, 0x80000) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x20002) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) bind$packet(r1, &(0x7f00000004c0)={0x11, 0x0, r2, 0x1, 0x218, 0x6, @remote}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x9) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x0, 0xfffffffffffffffb, 0x2, 0xffffffffffffff84, 0x71cee780}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) chmod(&(0x7f00000000c0)='./file0\x00', 0x8) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 3: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x9, 0x10041) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x6, 0x8) mlockall(0x3) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bond_slave_0\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x7f, 0x75, "dd549e7f8f3405e38415c8fc99363ee2ac8d7a558d4f74005dca0f38a29dd603f7c5440b63fd4e6ae3f5514bef7610b29a293c4b7063e738a0ac095eed5fc9d3d885fcb19959f32be7b6638d2f88cddac77ff067c0f6a4e996a5880d7a4889d1947106a84670610dc8efd8738cddfdf465b2ec49b6"}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x248, 0x0, 0x3fe00000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) socket$inet6(0xa, 0x6, 0x100000000) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x2200) syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x422080) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x997f, 0x7}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x400000, 0x6, 0x8200, 0x7, 0x8, 0x7, 0xffffffffffffffc1, 0x100, r3}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) fchownat(r1, &(0x7f0000000100)='./file0\x00', r2, r3, 0x400) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000080)={0x14}, 0x262) write$P9_RLERRORu(r1, &(0x7f0000000400)={0x16, 0x7, 0x2, {{0x9, 'skcipher\x00'}, 0x5746}}, 0x16) recvmmsg(r4, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r1) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="baf80c66b8c05d4f8b66efbafc0cb8e2b5eff30f1c442d0fae8f80006567f2ad0f21e23e3ed3557f2e660f38810065260f01c30f01c90f3807fa", 0x3a}], 0x1, 0x8, &(0x7f00000001c0), 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="818ecae0183dcd4f90a569d9b7597351aad2fe53686344e2744321164abd7b82efa2da3a5bde462c", 0x28) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x68400, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xed, 0x101000) connect$x25(r3, &(0x7f0000000100)={0x9, @remote={[], 0x0}}, 0xfffffffffffffc2d) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) [ 475.655240] QAT: Invalid ioctl 02:05:48 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x0, 0x3, 0x4, 0x0, 0xfffffffffffffc00, 0x2012, 0x4, 0x3, 0x0, 0x2, 0x9, 0x5, 0x80000001, 0x6, 0x5, 0x4, 0x2, 0x7, 0x9, 0xffff, 0x2, 0x9, 0x2c45, 0x1, 0x3, 0x3, 0x1, 0x6, 0x6, 0xa5, 0x0, 0x246b, 0x8000, 0x5, 0x0, 0x0, 0x61, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x400, 0x1, 0x40, 0x8, 0x7, 0x8, 0x5}, r0, 0xa, 0xffffffffffffffff, 0x1) mlockall(0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x7, 0x70, 0x0, 0x55730ad5, 0x1, 0x6, 0x0, 0x100000001, 0x4000a, 0x8, 0x221, 0x3, 0x10001, 0x93, 0x3, 0xffffffffffffffff, 0x7fffffff, 0x100000001, 0x5, 0x0, 0x8, 0x0, 0x5bbf, 0x3, 0x4, 0xa76a, 0x57, 0x3, 0x8000, 0x8, 0x2043, 0x80000001, 0x4, 0x3, 0x2, 0x40, 0x2, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x20116, 0x8001, 0x70000000000000, 0x0, 0x3, 0xb6, 0x8}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xa4101, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) recvmmsg(r1, &(0x7f0000000200), 0x0, 0x40000040000002, 0x0) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0xffffffff, 0x400000) 02:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f00000001c0)=0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = fcntl$getown(r1, 0x9) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r3) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000100)={0xd6ceb4639f9f1e71, 0x4d, 0x2}, 0x4) 02:05:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) 02:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffead) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) getpeername$netrom(r0, &(0x7f00000000c0)={{0x3, @rose}, [@remote, @null, @bcast, @default, @bcast, @remote, @null, @default]}, &(0x7f0000000180)=0x48) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='lrw(serpent)\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/netfilter\x00') ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f00000001c0)={0x200, 0x1, 0x7, 0x1, 0x8f57}) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x9) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x0, 0xfffffffffffffffb, 0x2, 0xffffffffffffff84, 0x71cee780}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x80000, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000300)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1}, 0x14) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, r4, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x4d, 0x9, 0x4, 0x1, "5eb61376c7f18492f1bcde8d54564bfe88ad7be8e504a41d2bc239e238b88dd5c9f2bc8e566df519676ca3ec432383da8ddae52ae46b17befac1024143c9c16b", "edb8621b7e4424945de55f1001340aeef992c0353ab1a3e1c285d5c2060b2a03", [0x50b5, 0x8]}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 02:05:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) recvfrom$packet(r1, &(0x7f0000000180)=""/138, 0x8a, 0x2000, &(0x7f0000000300)={0x11, 0x1b, r2, 0x1, 0xfffffffffffff472, 0x6, @remote}, 0x14) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000100)) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 3: mlockall(0x3) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x3, 0x5, 0x7, 0x0, 0xdda4, 0x4, 0x1, 0x9, 0x208000000000, 0x1000, 0x0, 0x7, 0x5, 0x6, 0x5, 0xfffffffffffffff8, 0x100000001, 0x3, 0x8, 0x7fffffff, 0xc00000, 0xff, 0x3f, 0x3, 0x7ff, 0x0, 0x80000000, 0x35, 0x8001, 0x7ff, 0x80000000, 0x80000001, 0x7, 0x5, 0x9, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x401}, 0x0, 0x1, 0x6, 0x8, 0x8, 0x8, 0x800}, r1, 0xd, r0, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0xb83f, {{0xa, 0x4e23, 0x7, @empty, 0x800}}}, 0x88) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20500, 0x0) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000040)={0xfff, "a942e70f02f9afd0338043a0bd1514df5b00da92d5edb82ffa73647aa00548ac", 0x3, 0x9, 0x7, 0x1710, 0x40000, 0xc}) getpeername$netlink(r0, &(0x7f00000001c0), &(0x7f0000000200)=0xc) clone(0x84090000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000240)=0xc, 0x4) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x1000, 0x0) r3 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) r4 = inotify_add_watch(r1, &(0x7f0000000640)='./file0\x00', 0x1000000) inotify_rm_watch(r3, r4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@ipv4={[], [], @loopback}, 0x10000, 0x2, 0x2, 0x4, 0xffff, 0x11}, 0x20) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x1d8000000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) readv(r2, &(0x7f0000000280)=[{&(0x7f0000000580)=""/145, 0x91}], 0x1) r5 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") write$P9_RMKDIR(r5, &(0x7f0000000080)={0x14}, 0x262) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ptrace$setregset(0x4205, r6, 0x1, &(0x7f0000000000)={&(0x7f0000000480)="7a17326d43ccb72788617f75f0a1478e624ffd59a165d57ab5f123723bde5b293acf3969caf21d15107e0f5435f75f8e714b475455bf586c7d755d7947d8e79bcca33736850e283e9d7a08195d34a1947090483ede6caf21255b01f670caaf170108a6ccd73d4147781f9259eb4bee2170de86429fefac294baf6137d7eb7a3cefd506052c0269d62edc194809f79eff826d21b3ce81ba47ba023ab505939a2f4c6254", 0xa3}) sched_setscheduler(r6, 0x0, &(0x7f0000000200)=0xd0d) 02:05:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:48 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x400}, &(0x7f0000000200)=0x8) 02:05:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x54) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x7fffffff, {0x3dd2, 0x9, 0x4, 0x374, 0x7fffffff}, 0x5, 0x4}, 0xe) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000100)) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x2400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000005c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0xd01, @remote, 0xffffffff}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e22, 0x248, @ipv4={[], [], @remote}, 0x20}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x2d, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xffff}, @in={0x2, 0x4e23, @loopback}], 0x94) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x400002, 0x0) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f00000004c0)={0x0, 0x8, 0x8c8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000440)={&(0x7f0000000340), 0x10, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="27000000000103000000000000000000", @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0300008001000000020000200001004f98bbd13aa7d39ad56d50a70ac4d0090066c4585b2ba48739"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x48001) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYRESHEX=r4], &(0x7f0000000540)=0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000001c0)={r5, @in6={{0xa, 0x4e23, 0x3, @empty, 0x51f}}, 0xad6, 0x40, 0x7fff, 0x7, 0xff}, &(0x7f0000000300)=0x98) 02:05:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14}, 0xfffffffffffffda0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)="8e5d9b344f0d743ced6e56365ab6b2377071c68fe3323b37f9ccf79440109f5ed41d16765927fa851e235b9147f55267ffdea1ec253966af647bae18a839449201af3b59faf9f13c43dcd83971eb0199d079b3038c43ce0928a1ea27181edf0f304f18a1ab7f0dc6b6de03049ea9b682360154acb2dd12f90a679b23451499339ce676a87bddf5176afca59810ac6ce265bca3e92a2c68ca380ec76331526b8f23246348a22fe3b85d48f54d44734f2c0818fa152c41920bb5c583d783c0faf006dde3154e8c74fb7659f17dafc95f00c4d7d5", 0xd3, 0x0) keyctl$describe(0x6, r2, &(0x7f0000000300)=""/27, 0x1b) 02:05:49 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7, 0x2) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x1, 0x3, {0xfffffffffffff000, 0x5, 0x8, 0x81}}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/87, 0x57}], 0x10000000000003cb}}], 0x1, 0x0, 0x0) 02:05:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200140, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, &(0x7f0000000100)=""/36, &(0x7f0000000180)=""/65, &(0x7f0000000300)=""/211}) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 3: mlockall(0x3) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/171) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000000)={0x0, {0xfffffffffffffff9, 0xffffffff}}) clone(0x200400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) 02:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3524000000000000, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000100)=0x2, 0x8) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}, 0xfffffffffffffffe}], 0x1, 0x0, 0x0) 02:05:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ab553fec7418b51bc781a6f648c16376ae942feb63ba673597dd00289a", 0x1d) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'team_slave_1\x00'}) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x41, &(0x7f0000ff2000/0xc000)=nil, 0x80000001}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000300)={0x0, @reserved}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in={0x2, 0x4e20, @empty}}}, 0xce) splice(r1, &(0x7f0000000240), r2, &(0x7f0000000480), 0x100000000, 0x6) recvmmsg(r2, &(0x7f0000000200)=[{{0x0, 0xfffffffffffffc7f, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x800, 0xc000) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100)={0xfffffffffffffffe, 0x10000, 0x8, 0x2}, 0x8) bind$x25(r1, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x3612) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r1, r0) accept4$llc(r2, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10, 0x800) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000040)="9302563fe17e8e30d8bee68ab17d1127", 0x10) 02:05:50 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000001c0)="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", 0x1000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0xcd, "87f371ecdf72cc6ccfc8faf44d22aa65a537cf5f7cec4c34cc52d643f546b58af2a4adc2ef2fe2589cfe551911bd4a9cc6f733579601dd6822d749f4502bdf2dbcc92bcdfe52001be1ebe53093b955c59d3adefc024703e7d9dbf3baeec17943f227fb51b571cd142ec7b138e450e092932ffea5c92e65dbea4726e0360fc15817dca787bb1693a89d7c953bc6a3dc8527fe518b8c11de6ec2cf4210b4af4ffc0a310acc7d20884bb5b5ddbf11d4bef00c36dfbbf16523c24d484637356eba89233f5a0ae59aa692a3aba3c5de"}, &(0x7f0000000140)=0xd5) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x3}, 0xc) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x100000ca}}], 0x0, 0x0, 0x0) 02:05:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xff, 0xe402) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x1}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) r6 = getuid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000640)=0xc) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000008c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xffffffffffffffff]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000980)={{}, {0x1, 0x4}, [{0x2, 0x2, r3}, {0x2, 0x4, r4}, {0x2, 0x1, r5}, {0x2, 0x7, r6}, {0x2, 0x6, r7}, {0x2, 0x4, r8}, {0x2, 0x0, r9}, {0x2, 0x1, r10}], {0x4, 0x2}, [{0x8, 0x3, r11}, {0x8, 0x3, r12}, {0x8, 0x7, r13}, {0x8, 0x0, r14}, {0x8, 0x0, r15}], {0x10, 0x3}, {0x20, 0x2}}, 0x8c, 0x2) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab0395be695383b3b42e04000000d66480010f1831288a", 0xffffffffffffffed) r2 = accept$alg(r0, 0x0, 0x0) r3 = fcntl$getown(r0, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x4, 0x1}, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x3, 0x98}, &(0x7f0000000200)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x1}}, 0x10) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r3, r1, 0x0, 0xc, &(0x7f0000000100)='nodevvmnet0\x00', r4}, 0x30) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x10001, @empty, 0x4}}, 0xfff, 0x2, 0x9, 0x9, 0x1f}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e24, 0x3, @ipv4={[], [], @rand_addr=0x1f}, 0x493}}, 0x3, 0x40}, &(0x7f0000000100)=0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0xfffffde1, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0xffffff93}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socketpair(0x0, 0x80a, 0x4abf, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x2000) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff9d, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x8001) 02:05:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) 02:05:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000000c0)='lrw(serpent)\x00', 0xffffffffffffffff}, 0x30) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000200)={0x4, 0x0, [], {0x0, @reserved}}) syz_open_procfs(r1, &(0x7f0000000180)='map_files\x00') prctl$PR_SET_PTRACER(0x59616d61, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000001c0)='ns/mnt\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0), 0x1, 0x2000000000000, 0x0) 02:05:50 executing program 3: mlockall(0x3) r0 = socket$netlink(0x10, 0x3, 0x1f) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003080)={'team0\x00', 0x0}) sendmmsg(r0, &(0x7f0000003680)=[{{&(0x7f0000000000)=@ethernet={0x306}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="e3bc3d588e04a9f04a7949a3c089bd7a614086ec8e9c16d3b7e1fdad6954c58dfbfb7d5cb631b55b415774e9509e74a61324bff2381c149b66cad67134abe800e9c653539a0e623ea9c8c457de71fd73f499874fb813436f0e63aa75147a78e4adb6712c712ce7577e63adfe417aaf6f01c478254c0ba8262580aceb82892887f2dde8c9474d59b75b33972d97e5abe4cdca23cb", 0x94}], 0x1, &(0x7f0000000180)=[{0x48, 0x10d, 0x6562, "d61a5ebe9e41da088519ce8f020a375152c22c5b835ea10b81dd5735fc91844fb6ec1426734b9b2ccc53d026635f9d21c1c5"}, {0xb0, 0x110, 0xab, "5e6242cb5bbff3d339dae438053901f5fa08bca1755dc78422cea0a50bbd26f802262d43a6174c61996a53405521627b4d61a8d464b2e89e82cd5692cf94bf1a075e4135c562e71c141f573e968b07ff193092bc31644000beed6e50ede55fa830d321a3c787006ff7364b52c385a4ec4d817299cf362485c5532fcbd57f66492f3f22612ebe04e2d5f3d3be25108225f53b531178e0347e897778dcce"}], 0xf8}}, {{&(0x7f0000000280)=@ethernet={0x7, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000300)="1c067e6706105a47befc188bff72eef932b4e0c5189effd9e6512dfbf9a9f772deb9d7e73ea9706690c3cedbc0e91cf3fdc6c382040d5b92fb0b2c0e11d97da5689eabc6f9b81f0fa1472d79293eeadec261baf8c7", 0x55}, {&(0x7f0000000380)="febde4dac167d173a41cddbb6fc67324e32e47f5e478c48dc5e305faa44450c83d14e1dd729b6b5841803cd26816a66548b315d1edf8568fd63160ce8d3ec7909db6efa6b5c4622d84aa82f923c12c057e1d8d4911d13286bd4ae1fc59fe8ce8d2f04e2499ecf3c2958fd1f4838d70e68dd5af3adb8b1a07901b13a9963dcbece273f7ae4340b47052c20d035f02f7035edb2858a862efce3c81c6b3db517dab856131d3f3308a9d9bc1db224b84df617ea6f7ad965839d7a870a18cc945ba220b16da898973668880816cf40887ad62835b66a773de57ade30a2b03ce9628d4148f", 0xe2}, {&(0x7f0000000480)="2feae16b2212ce2b2b33dc3ee68db63699cc5a8d31e5f91fb11352a6cfdf13250e0cb5018e7c3f669de73b47f80d0ee3ff6e0b93447d23f0a29d8e82a2cd88cfecfddd5b54e60f31f59612f49897407f7e1c49af767dcd57b8cd937a6e26616c1ac4a95ffc94bf6caf008ce221879f01fea96410a647e15b658d87c572f0c724f50a37c0bf3fdc04169f02", 0x8b}, {&(0x7f0000000540)="71f33a92fe7fbc87d41ab0d017fdd93748a42fcc6f28f296610a3e12309fcb117a7c9ad2840411dd1461a138bc6645f73d7700a1855a4381e0e46d0dae0fc561f0c062807883fa690cf66c28a7e97f15efe4e1abfc5c4c5cee0e3cde8a59309ba0dcb93f3b07e7ca9c332be8db21883e3b9b479c7c", 0x75}, {&(0x7f00000005c0)="203f21a7a0b5490d8ec0030bb9847259fc47c2d368a04195e40647eee8600c99ec0a7af8d24ebf5bde8513083e69e153", 0x30}, {&(0x7f0000000600)="77ce8c75f406b8da714cc56a2bbccc61092d51507e8d72ece0faa41ed6ea1d8d87921d20a7a919fc2385e75b3c768676c76fdaa7e8509f57f8870a19f45c601291fe49c6fb4806d2714e81ed62b7a7ce8a71b60c67d53fe883cf1bc5b9e32054dedd162777e7", 0x66}, {&(0x7f0000000680)="d37fbb8ef0ebc11619ca13aa2541fabea2a088c1249fd1ceb0e78f72c73fdec7572f870a00d68da7b6daf48f090eaa865ecf3c40dade7156e09f5deafbddb324160754eeed996653b57c99b9f17bffe93b1870f6f22cda29c1fd50dfdfe0912991fd15ea2a9e2b2e46b749e0e69e8a16d8fe84190b71bccc2d01e71c01be4aa1a77a6094a5812624510e97ef2b3d3f1f9659", 0x92}, {&(0x7f0000000740)="31c49c04e82948e451ec9c88c0d6d55c1c8bc8fb2af21d68e40f875557f06efa53f4361dbc559909bd5ccd4c1db6ec02165169c679aad6de42e657b1b6cd545c279ac86e3eb9bb0d5fab0df91586595bfa474ed9f756d4df4875de0593ff11525a455c", 0x63}, {&(0x7f00000007c0)="9437c13cc6de2301d5ebd9b767d276ad67f76629a74149fc89e6a8b8549088f174173f06a31e9e35482dd4a05eb0d16e2e73c5e843d7fd7668666563156c29cbbbb3ff18e1471e0e1844f07e739b7a14cfdd356fb2a3d28f29099e6a7d518fb4e15e20476e122eafd100313e0ac88d0fca5b79b3162ea2da294bccd7e8958caf8758e640", 0x84}], 0x9, &(0x7f0000000940)=[{0xe8, 0x118, 0xfffffffffffffffd, "dd633fc324a1e46d8a11a9cd0dd02487d30ce83c7be3b5f0a79f104ef53583c9259d9127a4708b7209870467ea83682eb8af818c45bb8711ae1bfb95eb67cae3590dc91651be76b234c5e9b909080e8fdd2530cfb8bd50b95fd6206c172d9998412167ea77db691b37c17116da4eeb5d8cbabac1a36fbfbcddb46372ae5e91120623a1376afdfaecf378614984f31d5780f489af8f9c8673105c6f272f387141146e378ead389291a840669ea876cdb735453736c4c55f2e1035f0d4cc7890a0fa9c82e8fd0cd8f23899ce5b89c3f2fcdc3bc742315f61"}], 0xe8}}, {{&(0x7f0000000a40)=@l2={0x1f, 0x1, {0x7e4e4066, 0x3, 0x7, 0x1, 0x8, 0x2c36}, 0x80000000, 0xfff}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000ac0)="5eb4918755ca7890d106f1655f4aa68a1502d3f62454ecd9a81c81c9d14c461563aab7c62225b95ab51035b64b1f34634ecd42c65a8acad493836be82896d383cba2a4ae7090b2521b335ae93ac8a1f739cd1d45c728ba56b3eb2372255441767eea2dbef0aa4db1c638c38a6c40cd6b53429b420f1894deb90fd2ea812f03f79bcf63f1ed5421eafc0344e228c22fcafb99674b3a665cf1e29baa25de66e9f37fa0c07c30a33492ee8bf08e3f96fe4bad00aa233cc9c3d7b2885592fde8510dc7623763610bffe1c3ccef01a1d1372ae96306e3098b2de94727cd1f44", 0xdd}, {&(0x7f0000000bc0)="511829fdfe8844e31da71130b0c06086729bf27e1908bc1d134063efe0b78e45cfb8aee3b4bdeec4a14ac2e36bda1f08ba9323432b2859a2996f716eb6efff88e9364941085203bedada5a8c915e5b1071dc5dcdf5c500e3a682e71d4bd7cfbbbc350d5236760a2fd30d02d6c41bf9aa612fe167d212741fdd2ddd28f60bec28cb46b559c1abdeaafd53fb72685bd80a9b1b7b54636035bfba4d3c2b75efa8fc2303c42887caa0a58cd50a67d6e8fae751a8987943abcbd41ec1ecfeec30d0bfa721ca3703f8b61650b8bc173c0b008134a008aaf30c0d50c9", 0xd9}, {&(0x7f0000000cc0)="688e815cd767", 0x6}], 0x3}}, {{&(0x7f0000000d40)=@llc={0x1a, 0x7, 0xd09, 0x2, 0x2, 0x6, @local}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000dc0)="b572a612a1faa497f54e7c7e7bedc050b7aa361ad58b5d0db0d8268d17bcb8d32943de67ea2d493038bc59472f406c3a96e1c195e1fd3b191d6d2ecc1ce4f65b66748b89d8b66424f6b61a29d8ab42163350a342d72facd9497ee95d311aab1d6712aa72dae37ff675e0d5f38851bea3ac32e3d2647343dd62e1fef9575ff2b737324ba34626ce923d729d96022b9e3cd9aead8587c77e1ccdbeae703bb453e29d7a1dbaebd0f004884ba953f7c966c91eb3529f3428f8be33fea96cc689f657090af5fee70879aa27c68e270a8cc466915fbe4e6901742be16c7e817e6c615ff85440bdd3888d3a694636fa", 0xec}, {&(0x7f0000000ec0)="a9ca855b8a428f87516ef74353153277dcf1c4ef4902ee191e56fab55eea281229271bcf97f43ca4c9755b3870fd1cad3c805bdfc809617beb4d47d7713b1766dc0ff207b61a7382db2e200d660f9177cf9ba2e0a259adec3cbbefa559b57febda65f2a275d10083836803f0f47af1d53f14bb", 0x73}], 0x2, &(0x7f0000000f80)=[{0x1010, 0x119, 0x5, "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"}, {0x88, 0x101, 0x20, "9593b31c72341506697b0b5376354e3b333a659d28281ea8da234c8b1b5bf362ed59b10570150b9b4853da1843567911b74767432ee6749ab08396880ff211a3330b486a90a9b9d7f6313bb5779f2f346a977a9a29794ecb2420c051d8d0cfd7fde9b5695f2f6712ebab6af28ae5ca329c6cce3aff"}, {0x50, 0x0, 0x7f, "1c5c8e662ba74d4ae85522f3567705a11cc947ce080ec78fe1b103b0a29eb2ed73c3c9bbb00efafd0005f1f36c1a41aacdcd01770eb27cd2b9acf4eaa42d0e"}, {0x1010, 0x117, 0x9, "f5c6e685a4a36249e2f769f904d8a880c8c88def5e964ed2ece09d872a49ff8a64c2ceb11d75b6d84872403188d9e4401393c85b0e0dc651f9380cfa6dbe83458e1acd4a3f947bdadd5c4bad930ad037ad0b72367ee3ad1673d4ca422e63086bf50a20bb348e2e89ba623449a845b4fefac0d56f88415055ad2f1eac04d7a8bd8910ec64533f5791906976a64742cd998f3d17244098deb4f2b8f3dc55d8f28a5794cf90727d5fdfc00153fde28529f7e326fd56731b393bf129e6ca803d16d2c3e45955d0aee1b18a135c0e2cd62b6c30faf1aea63c18b833683a8ce88704558f38cfe96252ad3b36b95dcae5e8f49dea7ed1d11a5f456ae4cbbb6058194569d52989e235dc09246e08b14fd37433fa49900e0cd95ecdbd70d0e517ec2451fd3e06c1631eb504ce6c85994b3b68038d9e328d3c68d81afe902c123dcba1fe883b0bad28adc03a15c8dfed36392a7452cba7d619d4ad44d959738198ad625e374eeb1554224ade0eb32b6d0cdf3cedaff5ef62c5d5f6909a17de0aeacb970b98d37aa14e23358cb3c4ccf2de05b09c3549a2d06746e2b4ec254385e8db5c4836149b918e5a8ed412ee58551b057380cdada41feaec65e04d387106c312ee20724bbd3f40aced2df082586d15b0f5d7c6555a6d6847e15114bcd37dedb7e5ad219e6baf694dd570834fae036405365229755089a7ba3229ab25eb22bdfa4cfae04854705bb7e592e2d6b206bb30c3cc06c3919a6c4bbb1b2581fd6edcf620bf1c506c846483deffe987b79eed26b4b332af42b66301d1a277923641495a356504938f25f957aa82e7cb92a321f04874b8352ff55156bbf24544ae34c6b7bc886a18b12d7abd36f626d1c26d857055e327ffdcdb74ea711ccaef50b29855dec65172c4a07f3b8bcfd90d570f93c3b0d81e2c9bd6af5ce98786ecd1c6609c89f62a4f16ed10fcc2bd924870f018f2ab94f54286d20f7108a547e7b99a847f0dde75d8ce5f54791bee9aaf6dbbae08c6ec1b33202dc782fd42db20a10571ec58b260d642bec0a89e73e17d327ac42f857f3d5fb690f0022b8a633b438b583cf7c0aabd45e1fc241911e9ac78e805432444dd0746aae477f020830cbc7d86f8469690eb1de66a1a2d6ca638de0b9bb2218def16411a2aa09c963352c14387752b09436b7e2b19b6af0dd931f00126314ed25082646140589d1467b387f2fc3a36b249e1be112b2d5fe0614ef6fd073beab7d1fa27be06d88af467f7b6d959a9c152212dc13ff929ee408950889bed00596c658300000957568960062094db35c238132ad9c4837096ff4f65d907ff8a11dcc1d12530c1bd409b1605ca099e7a51e3e3e058dbf55a5016587354c579c16cbdd4653b94344b0ab50679ba578745145ebf96d46e50fd0fb007a7127f0b21888dfb03a7a905a35d8b9925031b552177bc93d9f044ea7ed73e78bb915f90ccbdc56e4edd30cd610466495bb33cfaf364978f9b468757d1a5e1a3dc79d12d7ccf0deceb58862d4c6b41287ab6cbc38160422b5bc6ab6700111fe6e1552649bdc7547f93f525e54bdf5a33c454aefc732c2f1ba4f3c01925eb7feb1ab94223bf073c75db7c2a5de64985625ebcd2f428fa06073d7e8b41e5d8747b1f96a4000e5df40163e42540cbcc66d2c091d1f623665dfff5a9f958b4da3d55f3a9418524a97a6d421f2a1a3f62dc44fe9a9fbfbc137cf473fea0edf7b4676cd8724f79f35d78e3bfbbcdc566771b06a925ed1b5888be309905bacfc01be4c25e894d1b371e328a5b6c83cb3a84959dd86d731c9517b2dd11f0b8a5c760efd40a161b0e01b56cfe1aab00b6f3231f25325516de9dab339d3cae32a9e9509f15b7166145c1e07fcab0c80d095414800144e2eabe862e30e42eaa192fccc04dbf5bf47bfb49009ea1e1ebb6ad938a745b2a6cae62407e7212c475f14afe5cc907abad5af120b80936614fd73709466e8ca797403b6a55982893c1e6458a52f0bd406a588515b6e91d4957a92cde7c0bc63d631d192b17a15f7f8ffedbefd9a597c2c2b70344f6b6df6457e952f5c842f1dde5a67cbbd6f35c2c544a587a20c32a3afca1daa974e4761b31057878ec1c5e23b2ccf93b457fa6a4feb5f6b4a7006b8f4513ed74c4ed41309a0f1226497beae2f36482dd70315d631ff0f46139d3fb76e06dfd2e71d9840342b175e66277f59e13b4965fe4984d57f5a05a06097b927af8cfd74b5b7f98d8d1e27db39f5618d00e9da7591f9f169f1f190a19051b2714c3ed0b471429338bd7afbd8d575973c2764a9c720593779226d63485d1032fec89fd7a1f06edc1eff443524f65a624bae8a74e55b748a57ce9a7a9ddeae94a0579c5bc0b774183801aee33b1cc7b6b740c2ed9e558e145e3f4bfa93efd63ed1c63acdbe180973554a57449ba4a0c69ec70be2b2f73115bd225700e3d75b35caa1f096583f74cced856b131a2ff8222e70cf0cad5b07b22f5a773eb50ed673bf5c7b3da573047e38bc93f81c21a79c1fc613b3654d2c4e3eb29f2c3ed639f6e942478882b57de747c8e3930563d7ed295169f2910aa664c83a330a92a4dcf4f68ed8ca8f3d8c8570924bb07d1221025b867132760098b199e93a1a3989861b4a11d29d5c58caafa8223ea538faea2f49587e08323faf13b24447d761d7d2c6389de854b52df03ad2392dcc957a4f7358503689b2552a42a6f219e2ca2ee7b5e3b1c2d682ed582f86d89f2fcbd5dec2d2cef384bea3b5b702d9a4abbf3fe8bd75ff00777d983f9c33199a25334b2588d5acac5ed5953925baa46f073a68352b8164662dfe339aa73aaaa5d7a54ab015bf3eb5b73bb1c20df8fbf9c3b8393bdc38d3f910580bfcec57a9fd451675bb3a59f12e1def2f88fc67289a52e5a68b23c84b464802d0bb2293ad47ce78c2f557c543aa0335f1eb30ac8c7e6b4501a68b8ce37f1499ef521827e881ba89646abf20234e7c8ed727e6c56bf1a6faed28d9f6acb5588ec4d4bbbb3ada6c7ed148244a706a00645f7e90d1a73174c8d62aa19d502850ef5fd7ef57dd6ba63d99472ca763e74e430ea2c5ba3c4ece3d3d336712d55dbb4f6a5eb7cfb529f51cbf8074b6cd8c48788cdeb211887940c02d98501f11afb7f60146fe747dd57d7134c714e4eaa8c7a7c6dfb8bea08ce282437e245175745e5f347148150ed983fd94da80ca0be94b7972bde265c52533a653ef606d5b9a766ebfd9fa1fa7ef24d07fffe31d0bc18775d6204b1ba3948124ecb49cf084beec25f892de46ce7d35f7967d29eac43df93f33e66854eabe3b95c408bff9c5e9f242babec8c6179f888b3d33d4fc5be01c6fa1917162af1746c96fd82a0bab50e3ef8345509369540dd8928948900a502a95ab03136e5a571932b8c8316681f8fcb5e236b669c54a36d8a0b353f2f752c96b85c4a0298ad80e4b0a8e4dab803e667bdf842367f5ecbbe05e4f8eed9417c3bbd81bf89109cf537ea2dada86996ad8a1332c86e4402db23baa5cd1b88d29e1e79524f942bc55475543fb0fb2cd3f6de5a801b1f1ec6d225cc1b6d68497ff26b38987183a3ee193a2e54abe329ce27c28d19244cb04f4e1197516b22f50d0492a2476dcd3b4439e64c93d65e21d834f2fb5725354b5d8c7cc5a758a39ace394716f1e5d82b5c5a79e3cb1fe9e40e22c2cd9db2112fab2538655e9c7feaf7d15b404b8b7c4bfdb57c1b7096cb8e56c48185c9df92b5ff43dcc849a321b39b94013688fbc893dbc49b463b64183d65252fb50dd96c0b628dfdc28008d7500853eeea112e332e8208f388f2c4037621bfca8bd9dfc88bb456162b5c9be70f9fcbd4da3b6598f59acd7a90928362ba2ec96889093d7236b663e24c6c7155ae099df381fd40e2e15b4e688664bea31e0de0931cf847cc6ae5282d0ac709273aa1b826c987dbbee30aaaa6f9028d9abd2433e91023146cd64240e53335a018bbed55af90793b3cd3445b50ea1d525d3df18d65a6122eb5aa931b4d33bee12408ae53b05ff6e3103e1985b1b4a7ec70fbdfb42d8f2a7335c5c39b34c78bd8bfa779c6b9eeabc40f6383e58a765b647138925ebd59dfec85fa3e4abc7b1aa26687a7ce22e38a7a99cbfe1192a71119ac6da15df48a646d67af663b3e0218d9115c1cf8196e1b922717ee1bea3d4e7fa535f02d7e99d79d8fad260bbbc6c64189c178e7b9e4a3f00abaff20ec14aefd559d1dddc30930459c2e367857a3241c8408bdd82419ba402318a7498f6ecf82da753ed5fb17ed63dc3685c9d874bba4ee184aa399f066fae07aeacad9d6efa2c12a2009751f0bbd5b1dafc9b08af1f166db3a60f16bcfac2509cb7a2a12e1de09ae697869e259e77f3faf6816f5b838db2fdb0f07b7f5a65a7bfe08708de3b90ef8fe8dad317a1601d7103f51cd210f35efee4aecc500ae1724dffec988736f018ecf3c54d313f8745fb2957ddce27e5a7f3d240104c6ad28ca3424974f5278c33fbb99c97909c0c6f7587bd63900b5b47aa6e974e6703c98c30adf1f092102be207fdfc6b7212cc2d33c278148dace6a9d074c6dc92453e98d62a2272c5d91cfe085f96d83c435a609fddbe836b7d0b0f1311f144b04f8d977f3d1be92083d5ae92eed8d31f2264c85a5a50c0f77a7d3e3c82cc00c4520915f3e7851cb39be1b0fd7152f72cf2e8594d000f63572d6b161f6f4e4b185a3b3f5ea2a59430e54ab95a5a2e9fba942e3db6cadc69684368d124b5df966233cc9db8e18ef7bb45b56e9106f2cffffc21140a32c1237970af3b0b02556350d39f90c81b638545abccd5a23d75b10da6c845964c432ff288b2aefe37fcccd0e50ccb9ba02809a2e40bb4b0ca3ca14337c57bbe581575531778072926cf8c05d19fedf7c0a2f7e2570b0932ed4789e59a5025b5f3ea7aae1e1a937e739ce717b319045b9c79ddcac4b07fdfbc4a54cb6aa4d27d81e1e41cec41977aea8ddf7fd5d01a41a8f82f94f633d524f26aa78b86ca83fb331d3d76c1a9a76e2485ba9c31a3e3ba18fe35b8f1ddcc31046c597aad4cdb86bfa3f170cc28093f791fad263d9e985b4bc14a433c873ce3eb9fd14f721d2e96d41cd7e5f925d686ecabca43bcc5a8b25fc1c95195fabcbe84774e6caff724ea4678daa20a274a08da95f92fadf3cfb0b7d0201d9583514b9254461f26856a8d531402a45c09807ba15422bbcff7550d38fd713dd313a94674c6126b58e8f7b21d1f839d2096f975b135ac0bb8df756c4560e3b0e406f7eff3f9e73d65ff00e1fced7518e5b609fdd1b99784d71cae15a29c71a19e36f79733c0ce169f09042db36a37f5b07cb4421fdc86bfade74814b6f6e71b99203d4107822e6b7c4545920f1c883af03dee43bc30c1ab5512fb21fd23af5d92b3a1956a8007dd685ee7a6222d8bd29fabae30f7d10eaeb9362305b93279da9dca3068d6414be0709e2e6609df2cb74e3b9a5ee5205020dd098c5ba2bd4d5bcb97c8c55fcfbafcb88520031320b943cec4274f7a854b9075c5fb1c7f632c6693bb14bb6bc1c2fc180730cfc01b375d88aba2b099dd7c905a55d40d22f744e7ff1553daaa310eb6da0dae2fd99265c4a6a4486f161b384627f691d93114dac9428f3800687135982ccce9b82d68ea54502f020a35674abaccf6c72c45822310d5bb58376392b73e5d2ca2ea68c28efa644d253f840091b3236a94b455bd1d2bf1652d8e7ec12fbe8519a5903a3c4a0e83a04964109387f00b5a4d1645070eef360970cb8b46266c0b7ac8ff1c67d1cd783632252251a7bae67cb"}], 0x20f8}}, {{&(0x7f00000030c0)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003140)="aefd76e397422fb2", 0x8}, {&(0x7f0000003180)="98cbbe6eb60f4cf68e0241ef56305ed4b1a5bfca09c3f48f148d9bb119b052babd40fe8ed514cbac070e3e88eacfa8dcb18e7f08aa0528c910a5e63d4c59f8e507b1ceead88fcb82a0add4e1dc5ac40766484cb8c72b00df1a2f3fbbf5352ccd66477e84d5cd0e8420bb6d4e09c9802a66190e38bfc8d91885d868fe7b17a945e8b86714027842a4058268f2a5627098b964e8725b229dbe7da00621e0d93aa05a67bfa9c1b1cb1c3d94a3dc2faeadeb42accd89dfa85eb012ded3e158b804d6e07d0fdff1c3c39f3ba1ff", 0xcb}, {&(0x7f0000003280)}], 0x3}}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003300)="9807b8b8e197ff47fcd75e5f07846c3ea9a6dee57f5a8cd47518b37120c4a508bb06a9beeb8e88659764cad05113d67162ceef3f6646460d9671ccd7b2800f9e692e1e3184db6d2a6f8706d42f7c44b884251668d2b7956bfdbfd0cba72b92f005705ed3a5b81b2cf05c0df1709689eb9166c6bcdc1ac9f6f2484bea0abf9e839d49f65775698d5d68b0", 0x8a}, {&(0x7f00000033c0)="13d40bc75c32eaaf6c2cfd692dd5211f4fdae48695", 0x15}], 0x2}}, {{&(0x7f0000003440)=@isdn={0x22, 0x2, 0x20, 0x3}, 0x80, &(0x7f0000003600)=[{&(0x7f00000034c0)="bd0d72434a711953015a48e30c13a9a5d2884d3e2037e4d9ea716667cb9b54dfc93e13df45dc69ea29cccfb0b434ff9c2f9a587a2b353eb724d5d2785c5a4b8b29de4b64881bc26dae5a00d775ae54c51282a1b93e93e1a887dcd29af418677a39ba1689ef02afb73f71deac5d04c66c08164062bea96e5fd4c98cfbd96d025051c97a43c61f5f2d59a6de1a4f252e3e7237bc2e5af59b4e5b5ed04cc2ac2150dde3105fc62515eddbe88c22a5749a923c", 0xb1}, {&(0x7f0000003580)="55ea33c9077a6e7d9fc669038d9e37e907495dff0bccffffbde016a87875aed094d8f99965c0bebb3d6265", 0x2b}, {&(0x7f00000035c0)="97ff5771c0856086dc5024ea1520ae24efaf339d13f56f1077a93132", 0x1c}], 0x3, &(0x7f0000003640)}}], 0x7, 0x8000) r2 = dup(r0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000003840)={'nat\x00'}, &(0x7f0000003280)=0x54) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) 02:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d0400f800288a", 0x9679f8f7) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) bind$llc(r1, &(0x7f00000000c0)={0x1a, 0x310, 0x0, 0x9, 0x38, 0x26f, @remote}, 0x10) 02:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000180)=@xdp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/132, 0x84}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)=""/163, 0xa3}], 0x3, &(0x7f0000000400)=""/93, 0x5d}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x378) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}]}}], 0x1, 0x0, 0x0) 02:05:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) times(&(0x7f00000000c0)) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ioprio_set$pid(0x3, r2, 0x0) 02:05:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x200000c, 0x20010, r1, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) fsync(r0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'bond_slave_1\x00', 0x80}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x400) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x4) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:50 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000100)) 02:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="07f1843c58f49ca7a0194b326923d92000bcbda8d7dcd551bc7f8c9d9d675fd4d5800ea81b747028c82e38b606e3d016269ccc2b7ed744bde51b178cb8cebba2d45de9c2054d8260f6d47fe18cceac66085297db11c6362b912b939a8c08ecbe474556d164a7c9ff6b7707b69e093877c734b625edcce275fbd7c4bfdfaf2bdb7d1380e1", 0x84) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 3: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200a80, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x100, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r1, 0x28, &(0x7f00000003c0)}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x3e9d3a5f8d2b93c1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x10, @time={0x77359400}, 0x0, {0x8d, 0x81}, 0x8000, 0x3, 0xdba}) write$binfmt_elf64(r0, 0xfffffffffffffffe, 0x0) r3 = geteuid() syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="4412b2a02c578d088d9e2b6054bd70702f133c386ea53f77bc33e8c968b50c3b4f7f2724fb6be1a62c9753936e1f8b98a0b193f6e8be9e12d08841402c8291d1b9ea112f428d3de202c05e78ada55342a152de15fcd0c3e713d7324da25ba8aa21b3a5bc1c8cb73daba46f79b05ea4d616955f38441f54d513d5c2516c11d24770177dd9ff0006d846afa346186271cc959296b817dfddeec65cd506902f45c21191e10798a0bd15c043781acc839c21ef9240b39e2a5f0e0642cb109b01", 0xbe, 0x3}], 0x1210000, &(0x7f00000001c0)={[{@shortname_mixed='shortname=mixed'}, {@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@fat=@discard='discard'}, {@shortname_win95='shortname=win95'}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}, {@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@euid_gt={'euid>', r3}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/rfkill\x00'}}]}) 02:05:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x102000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0xd0, r2, 0xb00, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff7fffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000040) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x4800) ioctl$RTC_AIE_ON(r2, 0x7001) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1, &(0x7f00000005c0)=""/4096, 0x1000}, 0x2076f771}], 0x1, 0x10000, &(0x7f0000000300)) 02:05:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x2) socket$alg(0x26, 0x5, 0x0) 02:05:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x0, 0x0, 0x2}}, 0x37f) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) preadv(r1, &(0x7f0000000200), 0x6, 0x30) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000500)=@req3={0x8, 0x2, 0x7, 0x1e3, 0x90, 0x5, 0x8a}, 0x1c) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000000, 0x80) ioctl$RTC_WIE_OFF(r4, 0x7010) 02:05:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xffffffffffffff17) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = dup(r0) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_open_procfs(r4, &(0x7f0000000300)='net/ip_tables_names\x00') 02:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0x200, 0x4) 02:05:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 479.129307] FAT-fs (loop3): Unrecognized mount option "permit_directio" or missing value 02:05:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200002, 0x0) write$rfkill(r0, &(0x7f0000000040)={0x9, 0x4, 0x1, 0x1}, 0x8) mlockall(0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b1000/0x400000)=nil, 0x400000, 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000100)={0xffffffffffffffa3, 0x49, 0x0, {0x0, 0x4, 0x200000000000000}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x240) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000180)={0x0, [0x1e07, 0x1, 0x0, 0x101, 0x80000001, 0x20, 0x1, 0x80000001, 0x100000001, 0x1, 0x25, 0x5, 0xfff, 0x101, 0x6, 0x7, 0x8001, 0x8, 0x5, 0x5, 0x65, 0x515f, 0x100000000, 0xacf, 0x3, 0x2, 0x40, 0x9, 0xf34, 0x40f00, 0x5, 0x100000001, 0x20, 0x20c, 0x80000001, 0x4, 0x9b, 0x1f, 0x6, 0x9, 0x3, 0xfffffffffffffe00, 0x3ff, 0xfffffffffffffff7, 0x7, 0x9, 0xfffffffffffff431, 0xffffffffffffffff], 0x4}) 02:05:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x80000000000000, 0x0, 0xfffffffffffffffe}}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[]) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002740)={0x0, 0x5}, &(0x7f0000002780)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000027c0)={r3, @in6={{0xa, 0x4e23, 0x7, @remote}}, 0x2, 0x1000}, &(0x7f0000002880)=0x90) 02:05:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4}}, 0x26) getsockopt$packet_buf(r1, 0x111, 0x1, 0x0, &(0x7f0000000040)=0xfffffffffffffe7a) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) read$alg(r3, &(0x7f00000000c0)=""/90, 0x5a) r4 = dup(r2) accept$packet(r4, 0x0, &(0x7f0000000200)) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 479.480785] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 02:05:52 executing program 3: mlockall(0x3) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x6}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r1, 0x6}, 0x8) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xffffffffffffff55) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) [ 479.589427] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 479.625590] overlayfs: maximum fs stacking depth exceeded 02:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx2\x00'}, 0x13e) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000180)=""/146) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) [ 479.634698] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 479.658282] overlayfs: maximum fs stacking depth exceeded 02:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x6f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x14d4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0xfffffffffffffffe}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x15a, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0xfffffffffffffffd, 0x0) 02:05:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}, 0x3}], 0x1, 0x2001, 0x0) 02:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x45}, 0x20000080) 02:05:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}, 0x1000000000000}], 0x1, 0x0, 0x0) 02:05:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:52 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000400)=""/215, 0xd7}, {&(0x7f00000005c0)=""/168, 0xa8}, {&(0x7f0000000500)=""/52, 0x34}, {&(0x7f0000000680)=""/229, 0xe5}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/90, 0x5a}], 0x8, &(0x7f0000000540)=""/14, 0xe}, 0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000018c0)={0x0, 0x8001, 0x3f, 0x8, 0x81, 0x4}, &(0x7f0000001900)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001940)={r1, 0x5}, &(0x7f0000001980)=0xc) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) bind$packet(r0, &(0x7f0000000240)={0x11, 0x19, r2, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, r1, 0x404, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8, 0xb, r2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040810}, 0xc040) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x3f, 0x1, 0x3, "21727da7cf04560b4259ffd5520a938b", "1778ca547824f24ffb7cb89274daef231c43f24f9595f132fc5d5966033d25b1c6a4a04a0c4ae1c164bd"}, 0x3f, 0x3) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ftruncate(r0, 0xff) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x46, "e5108f9085d442bae1db10d33c70df09d3b101216133411d838c81c9b5e5020ebfb4d78f3edca594917a84fe5f44955ca22bf4f686dce4a68c4aab43ca7cb656b0987324216f"}, &(0x7f0000000200)=0x4e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={r3, 0x3f}, &(0x7f0000000300)=0x8) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000100)=0x80) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40800, 0x0) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000200)={0x3, 0x80000001, 0xfffffffffffeffff, 0xfffffffffffffffb, 0x3}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netstat\x00') write$selinux_access(r3, &(0x7f0000000180)={'system_u:object_r:ssh_keygen_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x5}, 0x5a) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$TCXONC(r1, 0x540a, 0xffffffffffffffa3) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1000) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/create\x00', 0x2, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='\'cpuset') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x1}, 0x14) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) creat(&(0x7f0000000180)='./file0\x00', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:53 executing program 3: mlockall(0x3) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = gettid() fcntl$setown(r0, 0x8, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000180)=""/144) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x1d4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}, 0x8000000000}], 0x1, 0xfffffffffffffffd, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="040b18706f8c8ed059a25100"/22], 0x16, 0x2) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000340)={0x0, 0x4, 0x7, 0x7}) 02:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x2002, 0x0) epoll_pwait(r1, &(0x7f0000000300)=[{}], 0x1, 0x8000, &(0x7f0000000340)={0x2}, 0x8) setsockopt$inet_tcp_int(r1, 0x6, 0x2e, &(0x7f0000000280)=0xa6a7, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x2, 0xc0000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0xffff, 0x1, 0x5, 0x6, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000001c0)={r4, 0x5}, &(0x7f0000000200)=0x8) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}, 0x5}], 0x1, 0x0, 0x0) 02:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = dup(r1) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f00000000c0)) pipe(&(0x7f0000000100)) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002740)={0x0, 0x5}, &(0x7f0000002780)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000027c0)={r3, @in6={{0xa, 0x4e23, 0x7, @remote}}, 0x2, 0x1000}, &(0x7f0000002880)=0x90) 02:05:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x200000c, 0x20010, r1, 0x0) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x0, 0x0, 0x43, 0x0, 0x8, 0xc4ed, 0xfffffffffffffffe}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 5: syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="3de4d1ff265736a5f5bbe924107c3266e8033d090f055d75695d090ec145cbf8d463f70df8afd3d2628cd4fe", 0x2c, 0x2}, {&(0x7f00000001c0)="8657c72aa4d175749d2739ae72c97f05fed1d511844c106c28029872f46d6bd8604dbd94ade8534ce1122788237714e9a27e9fbb2b72c616bbf0a11b0b1405e0da080ee96d87245f1ff7", 0x4a, 0x55bd}, {&(0x7f0000000240)="f50eb2809e25bc86e10b854281401d75c6b8ba6e779e557122f1cb52b7f7b30f278d8a79958a44edfb220afdbe4c7070e4c078059e11d97d02", 0x39, 0x7f}], 0x2018880, &(0x7f0000000380)='lrw(serpent)\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002740)={0x0, 0x5}, &(0x7f0000002780)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000027c0)={r3, @in6={{0xa, 0x4e23, 0x7, @remote}}, 0x2, 0x1000}, &(0x7f0000002880)=0x90) [ 482.070246] IPVS: ftp: loaded support on port[0] = 21 02:05:55 executing program 3: mlockall(0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) 02:05:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002740)={0x0, 0x5}, &(0x7f0000002780)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000027c0)={r3, @in6={{0xa, 0x4e23, 0x7, @remote}}, 0x2, 0x1000}, &(0x7f0000002880)=0x90) 02:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) keyctl$session_to_parent(0x12) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x440080, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)}}], 0x1, 0x0, 0x0) 02:05:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) 02:05:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002740)={0x0, 0x5}, &(0x7f0000002780)=0x8) 02:05:55 executing program 3: mlockall(0x4) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x41, &(0x7f0000ff2000/0xc000)=nil, 0x80000001}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000300)={0x0, @reserved}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in={0x2, 0x4e20, @empty}}}, 0xce) splice(r1, &(0x7f0000000240), r2, &(0x7f0000000480), 0x100000000, 0x6) recvmmsg(r2, &(0x7f0000000200)=[{{0x0, 0xfffffffffffffc7f, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) prctl$PR_GET_FPEMU(0x9, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x54) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x7fffffff, {0x3dd2, 0x9, 0x4, 0x374, 0x7fffffff}, 0x5, 0x4}, 0xe) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 3: mlockall(0x3) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x204, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1d70) keyctl$session_to_parent(0x12) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, [], [{0x0, 0x0, 0x519, 0xf6ea, 0x3, 0x3}, {0x1, 0x6, 0x8, 0x6, 0x0, 0x1}], [[], [], [], []]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1f, 0x4) clone(0x20020210000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x8, 0x90402) write$P9_ROPEN(r1, &(0x7f0000000240)={0x18, 0x71, 0x1, {{0x8, 0x4, 0x5}}}, 0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffff80, 0x40000) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @remote}, 0x126, 0x0, 0x0, 0x0, 0x60, &(0x7f0000000100)='ipddp0\x00', 0x1ff, 0x2, 0x100000001}) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) 02:05:55 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xf8, "0d26e0be60a8ba3ef3a514bfa4e03b91dd6afdd41d0fde3096cf01318f7b5701fbb7519cd486bb3e01089616c85d94deb2960fdafbea18d073647ff7eea709420718efe4182bbbca4d944b6fd6f35fb72182ecc079ef512309dc647fd399006cf39fa4676ef386da2da9efb83619a1daed093fa85e943e2d4db8160b23a8773b1728292fdca8db364d550836fc477157be4bea2356ee1b93b7bcca208f864b8f74917021c7c21d5e313f93271f54b0619b23e6d17adc68e9ac6889782a154c4699a33b80a2c352633bb1e7b5306e34ce787322a6ccc2a0082b1ce6c996e4ddf7da12508b8956115ec5fe9436684aea289233c896abf7731c"}, &(0x7f0000000300)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000340)={r4, 0x2, 0x30}, 0xc) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000180)='skcipher\x00', 0x9) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x800, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000180)=""/162) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) accept$alg(r1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 3: mlockall(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000000)='selinux%\x17}\x00'}, 0x30) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200101, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x100, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000140)={r3, r4, 0x9}) clone(0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000100)={0x2}) 02:05:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 02:05:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x800) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x5) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:05:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000000000006000000c02dcc000004000000ffffff7f1d582041bf644f5997000000ffffffff01040000020d00007afaffff00000000f5ff00c008000000040000002000000043cc000000000000"]) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000003200)=[{{&(0x7f00000001c0)=@pppol2tpv3, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000300)=""/176, 0xb0}], 0x2, &(0x7f00000005c0)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000480)}, 0x10000}, {{&(0x7f00000004c0)=@tipc=@name, 0x80, &(0x7f0000002740)=[{&(0x7f00000015c0)=""/184, 0xb8}, {&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000000540)=""/24, 0x18}, {&(0x7f0000002680)=""/121, 0x79}, {&(0x7f0000002700)=""/9, 0x9}], 0x5, &(0x7f00000027c0)=""/154, 0x9a}, 0xfff}, {{&(0x7f0000002880)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002900)=""/145, 0x91}, {&(0x7f00000029c0)=""/147, 0x93}, {&(0x7f00000030c0)=""/186, 0xba}, {&(0x7f0000002b40)=""/157, 0x9d}, {&(0x7f0000002c00)=""/206, 0xce}], 0x5}}, {{&(0x7f0000002d80)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002e00)=""/149, 0x95}, {&(0x7f0000002ec0)=""/123, 0x7b}, {&(0x7f0000002f40)=""/96, 0x60}], 0x3, &(0x7f0000003000)=""/166, 0xa6}, 0x2}], 0x5, 0x1000000000000000, 0x0) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000180)={0x5, 0x24, [0x36af, 0x1ff, 0x0, 0x6, 0xffff, 0x2, 0x4, 0xf32, 0x100]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:56 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4), 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x1c, 0x15, 0xa, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x1}]}, 0x1c}}, 0x0) 02:05:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 3: mlockall(0x3) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000007280)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000072c0)={0x0, r1, 0x8, 0xfffffffffffffff7, 0x9, 0xcf}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x10000) ioctl$RTC_AIE_OFF(r2, 0x7002) 02:05:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/12, 0xc, 0x100, 0x0, 0x0) 02:05:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@mcast2, 0x0, r2}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) r4 = accept4(r0, &(0x7f0000000200)=@ax25={{0x3, @rose}, [@remote, @remote, @rose, @null, @rose, @netrom, @netrom, @null]}, &(0x7f0000000100)=0x80, 0x80000) r5 = shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x3000) shmdt(r5) getsockopt$inet6_tcp_buf(r4, 0x6, 0x3f, &(0x7f0000000300)=""/233, &(0x7f0000000400)=0xe9) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 02:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000100)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x4800}, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0xffffffffffffff8b, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1, 0x0, 0x3c6}}], 0x0, 0x0, 0x0) 02:05:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="74e30f349a90b88060a7c416792d3b44346d36b860effe0adeeb83d1866f7563ffb8ccebc595a069c2a0e5ab103afcd92909b0273819ed81b1bb8e6409f41fb77f10ebd06c61a8", 0x47) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 3: mlockall(0x7) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 02:05:57 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000a8d000)={&(0x7f0000c78ff4), 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)={0x1c, 0x15, 0xa, 0xfffffffffffffffd, 0x0, 0x0, {}, [@typed={0x8, 0x1}]}, 0x1c}}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 02:05:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000300)={r3, 0x2, 0x4, 0xfffffffffffffff7, 0xfffffffffffffff9, 0x6, 0x80}) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/sequencer\x00', 0xfffffffffffffffb) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) 02:05:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r1, &(0x7f0000002640)=[{{&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/4096, 0x102e}, {&(0x7f0000000180)}], 0x2, &(0x7f0000000200)=""/38, 0x26}, 0xfff}, {{&(0x7f0000000300)=@pppol2tpin6, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f00000025c0)=""/96, 0x60}], 0x4}, 0x5}], 0x2, 0x40002003, &(0x7f0000000540)) 02:05:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32", 0x8) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:58 executing program 0: socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="636f6d6d697402"]) 02:05:58 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x7e74}, 0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 02:05:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0xe8, @local, 0x8000000000}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0x3f}, &(0x7f0000000300)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x262) recvmmsg(r3, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}], 0x1}}], 0x1, 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000340)={0x2}) 02:05:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ab553fec94248c32e27d0400", 0xc) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) [ 485.643698] ================================================================== [ 485.651511] BUG: KASAN: global-out-of-bounds in strscpy+0x20e/0x2c0 [ 485.657964] Read of size 8 at addr ffffffff8677be40 by task syz-executor.0/23876 [ 485.665503] [ 485.667151] CPU: 1 PID: 23876 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 485.674425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.674430] Call Trace: [ 485.674451] dump_stack+0x138/0x19c [ 485.674463] ? strscpy+0x20e/0x2c0 [ 485.674476] print_address_description.cold+0x5/0x1dc [ 485.674485] ? strscpy+0x20e/0x2c0 [ 485.674493] kasan_report.cold+0xa9/0x2af [ 485.674505] __asan_report_load8_noabort+0x14/0x20 [ 485.674513] strscpy+0x20e/0x2c0 [ 485.674618] prepare_error_buf+0x94/0x1aa0 [ 485.674633] ? lock_downgrade+0x6e0/0x6e0 [ 485.723770] ? scnprintf_le_key+0x600/0x600 [ 485.728116] ? __lock_acquire+0x5f9/0x45e0 [ 485.732378] __reiserfs_warning+0x9f/0xb0 [ 485.736803] ? reiserfs_printk+0xd0/0xd0 [ 485.740885] ? trace_hardirqs_on+0x10/0x10 [ 485.745141] reiserfs_parse_options+0xafa/0x1820 [ 485.749921] ? find_held_lock+0x35/0x130 [ 485.753988] ? reiserfs_sync_fs+0xe0/0xe0 [ 485.754002] ? trace_hardirqs_on+0x10/0x10 [ 485.754158] ? workqueue_sysfs_register+0x3c0/0x3c0 [ 485.767429] ? lockdep_init_map+0x9/0x10 [ 485.767440] ? debug_mutex_init+0x2d/0x5a [ 485.767457] reiserfs_fill_super+0x461/0x2b20 [ 485.780158] ? finish_unfinished+0x1010/0x1010 [ 485.784772] ? snprintf+0xa5/0xd0 [ 485.788355] ? set_blocksize+0x270/0x300 [ 485.792440] ? ns_test_super+0x50/0x50 [ 485.796347] mount_bdev+0x2be/0x370 [ 485.796360] ? finish_unfinished+0x1010/0x1010 [ 485.796372] get_super_block+0x35/0x40 [ 485.808483] mount_fs+0x97/0x2a1 [ 485.808500] vfs_kern_mount.part.0+0x5e/0x3d0 [ 485.808514] do_mount+0x417/0x27d0 [ 485.820032] ? copy_mount_options+0x5c/0x2f0 [ 485.824538] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.829666] ? copy_mount_string+0x40/0x40 [ 485.833940] ? copy_mount_options+0x1fe/0x2f0 [ 485.838563] SyS_mount+0xab/0x120 [ 485.842064] ? copy_mnt_ns+0x8c0/0x8c0 [ 485.846038] do_syscall_64+0x1e8/0x640 [ 485.850049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.854992] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.860282] RIP: 0033:0x45c27a [ 485.863522] RSP: 002b:00007f6630a1ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 485.871311] RAX: ffffffffffffffda RBX: 00007f6630a1bb40 RCX: 000000000045c27a [ 485.878722] RDX: 00007f6630a1bae0 RSI: 00000000200002c0 RDI: 00007f6630a1bb00 [ 485.886139] RBP: 0000000000000000 R08: 00007f6630a1bb40 R09: 00007f6630a1bae0 [ 485.893470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 485.900772] R13: 00000000004c8a4f R14: 00000000004df848 R15: 00000000ffffffff [ 485.908193] [ 485.909887] The buggy address belongs to the variable: [ 485.915403] __func__.31301+0xa20/0x3a60 [ 485.919567] [ 485.921247] Memory state around the buggy address: [ 485.926300] ffffffff8677bd00: 00 06 fa fa fa fa fa fa 00 03 fa fa fa fa fa fa [ 485.933771] ffffffff8677bd80: 00 00 00 00 06 fa fa fa fa fa fa fa 00 03 fa fa [ 485.941285] >ffffffff8677be00: fa fa fa fa 00 00 00 00 05 fa fa fa fa fa fa fa [ 485.948753] ^ [ 485.954258] ffffffff8677be80: 00 03 fa fa fa fa fa fa 00 00 00 01 fa fa fa fa [ 485.961677] ffffffff8677bf00: 00 03 fa fa fa fa fa fa 00 00 00 00 fa fa fa fa [ 485.969055] ================================================================== [ 485.976463] Disabling lock debugging due to kernel taint [ 485.982918] Kernel panic - not syncing: panic_on_warn set ... [ 485.982918] [ 485.990329] CPU: 1 PID: 23876 Comm: syz-executor.0 Tainted: G B 4.14.134 #30 [ 485.998678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.008095] Call Trace: [ 486.010799] dump_stack+0x138/0x19c [ 486.014555] ? strscpy+0x20e/0x2c0 [ 486.018183] panic+0x1f2/0x426 [ 486.021391] ? add_taint.cold+0x16/0x16 [ 486.025474] kasan_end_report+0x47/0x4f [ 486.029543] kasan_report.cold+0x130/0x2af [ 486.034134] __asan_report_load8_noabort+0x14/0x20 [ 486.039439] strscpy+0x20e/0x2c0 [ 486.042910] prepare_error_buf+0x94/0x1aa0 [ 486.047207] ? lock_downgrade+0x6e0/0x6e0 [ 486.051422] ? scnprintf_le_key+0x600/0x600 [ 486.056081] ? __lock_acquire+0x5f9/0x45e0 [ 486.060509] __reiserfs_warning+0x9f/0xb0 [ 486.064735] ? reiserfs_printk+0xd0/0xd0 [ 486.069530] ? trace_hardirqs_on+0x10/0x10 [ 486.073851] reiserfs_parse_options+0xafa/0x1820 [ 486.078806] ? find_held_lock+0x35/0x130 [ 486.083022] ? reiserfs_sync_fs+0xe0/0xe0 [ 486.087313] ? trace_hardirqs_on+0x10/0x10 [ 486.091813] ? workqueue_sysfs_register+0x3c0/0x3c0 [ 486.096968] ? lockdep_init_map+0x9/0x10 [ 486.101169] ? debug_mutex_init+0x2d/0x5a [ 486.105409] reiserfs_fill_super+0x461/0x2b20 [ 486.110096] ? finish_unfinished+0x1010/0x1010 [ 486.114738] ? snprintf+0xa5/0xd0 [ 486.118323] ? set_blocksize+0x270/0x300 [ 486.122454] ? ns_test_super+0x50/0x50 [ 486.126532] mount_bdev+0x2be/0x370 [ 486.130222] ? finish_unfinished+0x1010/0x1010 [ 486.134843] get_super_block+0x35/0x40 [ 486.138822] mount_fs+0x97/0x2a1 [ 486.142263] vfs_kern_mount.part.0+0x5e/0x3d0 [ 486.146814] do_mount+0x417/0x27d0 [ 486.150447] ? copy_mount_options+0x5c/0x2f0 [ 486.155135] ? rcu_read_lock_sched_held+0x110/0x130 [ 486.160231] ? copy_mount_string+0x40/0x40 [ 486.164527] ? copy_mount_options+0x1fe/0x2f0 [ 486.169118] SyS_mount+0xab/0x120 [ 486.172640] ? copy_mnt_ns+0x8c0/0x8c0 [ 486.176933] do_syscall_64+0x1e8/0x640 [ 486.180880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.185845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.191108] RIP: 0033:0x45c27a [ 486.194366] RSP: 002b:00007f6630a1ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 486.202171] RAX: ffffffffffffffda RBX: 00007f6630a1bb40 RCX: 000000000045c27a [ 486.209476] RDX: 00007f6630a1bae0 RSI: 00000000200002c0 RDI: 00007f6630a1bb00 [ 486.216809] RBP: 0000000000000000 R08: 00007f6630a1bb40 R09: 00007f6630a1bae0 [ 486.224169] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 486.226365] kobject: 'loop3' (ffff8880a4aff320): kobject_uevent_env [ 486.231491] R13: 00000000004c8a4f R14: 00000000004df848 R15: 00000000ffffffff [ 486.232884] Kernel Offset: disabled [ 486.250491] Rebooting in 86400 seconds..