7, r1, 0x0, 0x0) [ 2929.541465][T11715] ? __rcu_read_unlock+0x51/0x250 [ 2929.546509][T11715] ? ns_capable+0x79/0xa0 [ 2929.550926][T11715] ? rtnl_setlink+0x270/0x270 [ 2929.556602][T11715] rtnetlink_rcv_msg+0x723/0x7c0 [ 2929.561755][T11715] ? ___cache_free+0x3c/0x2f0 [ 2929.566533][T11715] ? __kfree_skb+0xfe/0x150 [ 2929.571660][T11715] ? __kfree_skb+0xfe/0x150 [ 2929.576271][T11715] ? consume_skb+0x4b/0x160 [ 2929.581217][T11715] ? nlmon_xmit+0x47/0x50 [ 2929.586004][T11715] ? xmit_one+0x173/0x2e0 [ 2929.590451][T11715] ? local_bh_enable+0x1b/0x20 [ 2929.595289][T11715] ? __dev_queue_xmit+0xbf2/0x1500 [ 2929.600391][T11715] ? __skb_clone+0x2a9/0x2c0 [ 2929.604976][T11715] ? __rcu_read_unlock+0x51/0x250 [ 2929.609996][T11715] netlink_rcv_skb+0x13e/0x240 [ 2929.614784][T11715] ? rtnetlink_bind+0x60/0x60 [ 2929.619451][T11715] rtnetlink_rcv+0x18/0x20 [ 2929.623933][T11715] netlink_unicast+0x5df/0x6b0 [ 2929.629200][T11715] netlink_sendmsg+0x6f8/0x7c0 [ 2929.633956][T11715] ? netlink_getsockopt+0x720/0x720 [ 2929.639142][T11715] ____sys_sendmsg+0x352/0x4c0 [ 2929.643890][T11715] ? import_iovec+0xb8/0xd0 [ 2929.648486][T11715] __sys_sendmsg+0x1ed/0x270 [ 2929.653163][T11715] ? __fsnotify_parent+0x32f/0x430 [ 2929.658266][T11715] ? get_pid_task+0x90/0xc0 [ 2929.662821][T11715] ? vfs_write+0x54d/0x7c0 [ 2929.667462][T11715] ? __fget_light+0x219/0x260 [ 2929.673694][T11715] ? fput+0x2d/0x130 [ 2929.677581][T11715] ? ksys_write+0x157/0x180 [ 2929.682097][T11715] __x64_sys_sendmsg+0x42/0x50 [ 2929.686903][T11715] do_syscall_64+0x39/0x80 [ 2929.691318][T11715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2929.697270][T11715] RIP: 0033:0x45e219 [ 2929.701141][T11715] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2929.721064][T11715] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2929.729636][T11715] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2929.737731][T11715] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2929.746000][T11715] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2929.754460][T11715] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 2929.762434][T11715] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2929.773479][ T17] usb 6-1: new high-speed USB device number 97 using dummy_hcd [ 2929.774368][T11715] kobject_add_internal failed for ipvlan20 (error: -12 parent: net) 17:15:16 executing program 0 (fault-call:14 fault-nth:16): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2929.869189][T11729] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2929.881465][T11729] FAULT_INJECTION: forcing a failure. [ 2929.881465][T11729] name failslab, interval 1, probability 0, space 0, times 0 [ 2929.899658][T11729] CPU: 0 PID: 11729 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2929.910530][T11729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2929.920958][T11729] Call Trace: [ 2929.924453][T11729] dump_stack+0x116/0x15d [ 2929.929424][T11729] should_fail+0x231/0x240 [ 2929.936592][T11729] ? __kernfs_new_node+0x71/0x350 [ 2929.943411][T11729] __should_failslab+0x81/0x90 [ 2929.949993][T11729] should_failslab+0x5/0x20 [ 2929.957076][T11729] kmem_cache_alloc+0x36/0x2e0 [ 2929.964823][T11729] __kernfs_new_node+0x71/0x350 [ 2929.970297][T11729] ? make_kgid+0x10e/0x300 [ 2929.977020][T11729] ? net_ns_get_ownership+0xaa/0xc0 [ 2929.985269][T11729] ? net_namespace+0x20/0x20 [ 2929.990760][T11729] kernfs_create_dir_ns+0x5e/0x140 [ 2929.996563][T11729] sysfs_create_dir_ns+0x94/0x190 [ 2930.003488][T11729] kobject_add_internal+0x456/0x820 [ 2930.010392][T11729] kobject_add+0xbe/0x130 [ 2930.015672][T11729] ? get_device_parent+0x1f8/0x310 [ 2930.024291][T11729] device_add+0x338/0xe50 [ 2930.029395][T11729] ? dev_set_name+0x6c/0x90 [ 2930.035937][T11729] netdev_register_kobject+0xfd/0x230 [ 2930.043757][T11729] register_netdevice+0xbcf/0x1060 [ 2930.049293][T11729] ipvlan_link_new+0x2a2/0x5d0 [ 2930.056037][T11729] rtnl_newlink+0xda6/0x13b0 [ 2930.062983][T11729] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2930.071350][T11729] ? __perf_event_task_sched_in+0x565/0x590 [ 2930.078552][T11729] ? kvm_sched_clock_read+0x15/0x40 [ 2930.084620][T11729] ? sched_clock+0xf/0x20 [ 2930.090017][T11729] ? aa_get_newest_label+0x74/0x250 [ 2930.097449][T11729] ? apparmor_capable+0xfe/0x160 [ 2930.103967][T11729] ? bpf_lsm_capable+0x5/0x10 [ 2930.110475][T11729] ? security_capable+0x91/0xa0 [ 2930.117255][T11729] ? __rcu_read_unlock+0x51/0x250 [ 2930.124052][T11729] ? ns_capable+0x79/0xa0 [ 2930.129644][T11729] ? rtnl_setlink+0x270/0x270 [ 2930.135079][T11729] rtnetlink_rcv_msg+0x723/0x7c0 [ 2930.141806][T11729] ? ___cache_free+0x3c/0x2f0 [ 2930.148522][T11729] ? preempt_schedule_irq+0x43/0x80 [ 2930.155427][T11729] ? __kfree_skb+0xfe/0x150 [ 2930.162871][T11729] ? __kfree_skb+0xfe/0x150 [ 2930.169531][T11729] ? consume_skb+0x4b/0x160 [ 2930.176510][T11729] ? nlmon_xmit+0x47/0x50 [ 2930.183291][T11729] ? rcu_preempt_deferred_qs_irqrestore+0x396/0x570 [ 2930.191483][T11729] ? __rcu_read_unlock+0xba/0x250 [ 2930.197055][T11729] netlink_rcv_skb+0x13e/0x240 [ 2930.203551][T11729] ? rtnetlink_bind+0x60/0x60 [ 2930.208640][T11729] rtnetlink_rcv+0x18/0x20 [ 2930.213841][T11729] netlink_unicast+0x5df/0x6b0 [ 2930.219427][T11729] netlink_sendmsg+0x6f8/0x7c0 [ 2930.224887][T11729] ? netlink_getsockopt+0x720/0x720 [ 2930.231532][T11729] ____sys_sendmsg+0x352/0x4c0 [ 2930.236288][T11729] ? import_iovec+0xb8/0xd0 [ 2930.240966][T11729] __sys_sendmsg+0x1ed/0x270 [ 2930.245538][T11729] ? __fsnotify_parent+0x32f/0x430 [ 2930.251492][T11729] ? get_pid_task+0x90/0xc0 [ 2930.255993][T11729] ? vfs_write+0x54d/0x7c0 [ 2930.260457][T11729] ? __fget_light+0x219/0x260 [ 2930.265311][T11729] ? fput+0x2d/0x130 [ 2930.269228][T11729] ? ksys_write+0x157/0x180 [ 2930.274156][T11729] __x64_sys_sendmsg+0x42/0x50 [ 2930.278960][T11729] do_syscall_64+0x39/0x80 [ 2930.283883][T11729] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2930.289867][T11729] RIP: 0033:0x45e219 [ 2930.293884][T11729] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2930.314009][T11729] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2930.322613][T11729] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2930.332653][T11729] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2930.343656][T11729] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2930.352132][T11729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 2930.360221][T11729] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:17 executing program 0 (fault-call:14 fault-nth:17): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2930.376944][T11729] kobject_add_internal failed for ipvlan20 (error: -12 parent: net) [ 2930.429768][T11731] FAULT_INJECTION: forcing a failure. [ 2930.429768][T11731] name failslab, interval 1, probability 0, space 0, times 0 [ 2930.444772][T11731] CPU: 0 PID: 11731 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2930.456457][T11731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.466516][T11731] Call Trace: [ 2930.469780][T11731] dump_stack+0x116/0x15d [ 2930.474093][T11731] should_fail+0x231/0x240 [ 2930.478503][T11731] ? __kernfs_new_node+0x71/0x350 [ 2930.483633][T11731] __should_failslab+0x81/0x90 [ 2930.488397][T11731] should_failslab+0x5/0x20 [ 2930.493415][T11731] kmem_cache_alloc+0x36/0x2e0 [ 2930.498922][T11731] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 2930.504819][T11731] __kernfs_new_node+0x71/0x350 [ 2930.509668][T11731] ? kernfs_activate+0x2c5/0x2e0 [ 2930.515133][T11731] ? kernfs_add_one+0x356/0x3c0 [ 2930.520076][T11731] kernfs_new_node+0x5b/0xd0 [ 2930.524829][T11731] __kernfs_create_file+0x45/0x180 [ 2930.530018][T11731] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2930.535409][T11731] sysfs_create_file_ns+0x8b/0xd0 [ 2930.540467][T11731] device_create_file+0xa7/0x110 [ 2930.545390][T11731] device_add+0x3da/0xe50 [ 2930.549781][T11731] ? dev_set_name+0x6c/0x90 [ 2930.554342][T11731] netdev_register_kobject+0xfd/0x230 [ 2930.559714][T11731] register_netdevice+0xbcf/0x1060 [ 2930.565024][T11731] ipvlan_link_new+0x2a2/0x5d0 [ 2930.571427][T11731] rtnl_newlink+0xda6/0x13b0 [ 2930.576247][T11731] ? __schedule+0x3c1/0x580 [ 2930.580751][T11731] ? __perf_event_task_sched_in+0x565/0x590 [ 2930.586888][T11731] ? kvm_sched_clock_read+0x15/0x40 [ 2930.592288][T11731] ? sched_clock+0xf/0x20 [ 2930.596618][T11731] ? widen_string+0x3a/0x280 [ 2930.601310][T11731] ? aa_get_newest_label+0x74/0x250 [ 2930.607628][T11731] ? apparmor_capable+0xfe/0x160 [ 2930.612693][T11731] ? bpf_lsm_capable+0x5/0x10 [ 2930.617863][T11731] ? security_capable+0x91/0xa0 [ 2930.622737][T11731] ? __rcu_read_unlock+0x51/0x250 [ 2930.627850][T11731] ? ns_capable+0x79/0xa0 [ 2930.632187][T11731] ? rtnl_setlink+0x270/0x270 [ 2930.636893][T11731] rtnetlink_rcv_msg+0x723/0x7c0 [ 2930.641829][T11731] ? ___cache_free+0x3c/0x2f0 [ 2930.646512][T11731] ? ima_match_policy+0xa80/0xab0 [ 2930.651559][T11731] ? __kfree_skb+0xfe/0x150 [ 2930.656071][T11731] ? __kfree_skb+0xfe/0x150 [ 2930.660637][T11731] ? consume_skb+0x4b/0x160 [ 2930.665260][T11731] ? nlmon_xmit+0x47/0x50 [ 2930.669672][T11731] ? xmit_one+0x173/0x2e0 [ 2930.674005][T11731] ? local_bh_enable+0x1b/0x20 [ 2930.678756][T11731] ? __dev_queue_xmit+0xbf2/0x1500 [ 2930.683919][T11731] ? __skb_clone+0x2a9/0x2c0 [ 2930.688820][T11731] ? __rcu_read_unlock+0x51/0x250 [ 2930.693973][T11731] netlink_rcv_skb+0x13e/0x240 [ 2930.698926][T11731] ? rtnetlink_bind+0x60/0x60 [ 2930.703863][T11731] rtnetlink_rcv+0x18/0x20 [ 2930.708902][T11731] netlink_unicast+0x5df/0x6b0 [ 2930.714529][T11731] netlink_sendmsg+0x6f8/0x7c0 [ 2930.720089][T11731] ? netlink_getsockopt+0x720/0x720 [ 2930.725351][T11731] ____sys_sendmsg+0x352/0x4c0 [ 2930.730314][T11731] ? import_iovec+0xb8/0xd0 [ 2930.734893][T11731] __sys_sendmsg+0x1ed/0x270 [ 2930.739545][T11731] ? __fsnotify_parent+0x32f/0x430 [ 2930.744670][T11731] ? get_pid_task+0x90/0xc0 [ 2930.749327][T11731] ? vfs_write+0x54d/0x7c0 [ 2930.755488][T11731] ? __fget_light+0x219/0x260 [ 2930.760280][T11731] ? fput+0x2d/0x130 [ 2930.764163][T11731] ? ksys_write+0x157/0x180 [ 2930.768732][T11731] __x64_sys_sendmsg+0x42/0x50 [ 2930.774278][T11731] do_syscall_64+0x39/0x80 [ 2930.778865][T11731] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2930.784855][T11731] RIP: 0033:0x45e219 [ 2930.788800][T11731] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2930.808702][T11731] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2930.817606][T11731] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:17 executing program 0 (fault-call:14 fault-nth:18): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2930.826441][T11731] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2930.835890][T11731] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2930.843894][T11731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 2930.852307][T11731] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2930.902666][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 2930.936807][T11733] __nla_validate_parse: 1 callbacks suppressed [ 2930.936818][T11733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2930.957792][T11733] FAULT_INJECTION: forcing a failure. [ 2930.957792][T11733] name failslab, interval 1, probability 0, space 0, times 0 [ 2930.973689][T11733] CPU: 1 PID: 11733 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2930.985181][T11733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2930.997353][T11733] Call Trace: [ 2931.000901][T11733] dump_stack+0x116/0x15d [ 2931.008406][T11733] should_fail+0x231/0x240 [ 2931.013927][T11733] ? __kernfs_new_node+0x71/0x350 [ 2931.020259][T11733] __should_failslab+0x81/0x90 [ 2931.025689][T11733] should_failslab+0x5/0x20 [ 2931.030963][T11733] kmem_cache_alloc+0x36/0x2e0 [ 2931.036311][T11733] __kernfs_new_node+0x71/0x350 [ 2931.043173][T11733] ? kernfs_add_one+0x356/0x3c0 [ 2931.048180][T11733] ? __kernfs_create_file+0x165/0x180 [ 2931.053697][T11733] kernfs_new_node+0x5b/0xd0 [ 2931.060834][T11733] kernfs_create_link+0x68/0x120 [ 2931.066441][T11733] sysfs_do_create_link_sd+0x6b/0xf0 [ 2931.073266][T11733] sysfs_create_link+0x4d/0x60 [ 2931.078569][T11733] device_add+0x47f/0xe50 [ 2931.083828][T11733] ? dev_set_name+0x6c/0x90 [ 2931.089295][T11733] netdev_register_kobject+0xfd/0x230 [ 2931.096632][T11733] register_netdevice+0xbcf/0x1060 [ 2931.103573][T11733] ipvlan_link_new+0x2a2/0x5d0 [ 2931.109039][T11733] rtnl_newlink+0xda6/0x13b0 [ 2931.113849][T11733] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2931.123616][T11733] ? __perf_event_task_sched_in+0x565/0x590 [ 2931.130885][T11733] ? kvm_sched_clock_read+0x15/0x40 [ 2931.136620][T11733] ? sched_clock+0xf/0x20 [ 2931.143414][T11733] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2931.148946][T11733] ? __perf_event_task_sched_in+0x565/0x590 [ 2931.156309][T11733] ? kvm_sched_clock_read+0x15/0x40 [ 2931.161601][T11733] ? sched_clock+0xf/0x20 [ 2931.168437][T11733] ? widen_string+0x3a/0x280 [ 2931.175525][T11733] ? aa_get_newest_label+0x74/0x250 [ 2931.182520][T11733] ? apparmor_capable+0xfe/0x160 [ 2931.190145][T11733] ? bpf_lsm_capable+0x5/0x10 [ 2931.195514][T11733] ? security_capable+0x91/0xa0 [ 2931.201065][T11733] ? __rcu_read_unlock+0x51/0x250 [ 2931.206558][T11733] ? ns_capable+0x79/0xa0 [ 2931.211697][T11733] ? rtnl_setlink+0x270/0x270 [ 2931.216962][T11733] rtnetlink_rcv_msg+0x723/0x7c0 [ 2931.222983][T11733] ? ___cache_free+0x3c/0x2f0 [ 2931.228193][T11733] ? ima_match_policy+0xa80/0xab0 [ 2931.233830][T11733] ? __kfree_skb+0xfe/0x150 [ 2931.239189][T11733] ? __kfree_skb+0xfe/0x150 [ 2931.246391][T11733] ? consume_skb+0x4b/0x160 [ 2931.251778][T11733] ? nlmon_xmit+0x47/0x50 [ 2931.258830][T11733] ? xmit_one+0x173/0x2e0 [ 2931.265034][T11733] ? local_bh_enable+0x1b/0x20 [ 2931.272746][T11733] ? __dev_queue_xmit+0xbf2/0x1500 [ 2931.278174][T11733] ? __skb_clone+0x2a9/0x2c0 [ 2931.286300][T11733] ? __rcu_read_unlock+0x51/0x250 [ 2931.291418][T11733] netlink_rcv_skb+0x13e/0x240 [ 2931.298251][T11733] ? rtnetlink_bind+0x60/0x60 [ 2931.303470][T11733] rtnetlink_rcv+0x18/0x20 [ 2931.307915][T11733] netlink_unicast+0x5df/0x6b0 [ 2931.314419][T11733] netlink_sendmsg+0x6f8/0x7c0 [ 2931.319571][T11733] ? netlink_getsockopt+0x720/0x720 [ 2931.326982][T11733] ____sys_sendmsg+0x352/0x4c0 [ 2931.333663][T11733] ? import_iovec+0xb8/0xd0 [ 2931.339696][T11733] __sys_sendmsg+0x1ed/0x270 [ 2931.346395][T11733] ? __fsnotify_parent+0x32f/0x430 [ 2931.353013][T11733] ? get_pid_task+0x90/0xc0 [ 2931.358044][T11733] ? vfs_write+0x54d/0x7c0 [ 2931.362623][T11733] ? __fget_light+0x219/0x260 [ 2931.368043][T11733] ? fput+0x2d/0x130 [ 2931.372002][T11733] ? ksys_write+0x157/0x180 [ 2931.376587][T11733] __x64_sys_sendmsg+0x42/0x50 [ 2931.381377][T11733] do_syscall_64+0x39/0x80 [ 2931.385989][T11733] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2931.391964][T11733] RIP: 0033:0x45e219 [ 2931.396045][T11733] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2931.416447][T11733] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2931.424948][T11733] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2931.433088][T11733] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2931.441326][T11733] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2931.449445][T11733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 17:15:18 executing program 0 (fault-call:14 fault-nth:19): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2931.457405][T11733] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2931.526000][T11735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2931.540170][T11735] FAULT_INJECTION: forcing a failure. [ 2931.540170][T11735] name failslab, interval 1, probability 0, space 0, times 0 [ 2931.540257][ T17] usb 6-1: config index 0 descriptor too short (expected 283, got 27) [ 2931.568022][T11735] CPU: 0 PID: 11735 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2931.569428][ T17] usb 6-1: config 0 contains an unexpected descriptor of type 0x1, skipping [ 2931.579464][T11735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2931.579477][T11735] Call Trace: [ 2931.579485][T11735] dump_stack+0x116/0x15d [ 2931.579508][T11735] should_fail+0x231/0x240 [ 2931.588928][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2931.598563][T11735] __should_failslab+0x81/0x90 [ 2931.598588][T11735] ? __kernfs_new_node+0x44/0x350 [ 2931.602501][ T17] usb 6-1: config 0 has no interfaces? [ 2931.606277][T11735] should_failslab+0x5/0x20 [ 2931.606298][T11735] __kmalloc_track_caller+0x57/0x360 [ 2931.606318][T11735] kstrdup_const+0x51/0x90 [ 2931.611408][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2931.620768][T11735] __kernfs_new_node+0x44/0x350 [ 2931.626176][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2931.630662][T11735] ? rb_insert_color+0x7e/0x2e0 [ 2931.630684][T11735] ? kernfs_link_sibling+0x21c/0x230 [ 2931.630760][T11735] ? kernfs_activate+0x2c5/0x2e0 [ 2931.630777][T11735] kernfs_new_node+0x5b/0xd0 [ 2931.637360][ T17] usb 6-1: config 0 descriptor?? [ 2931.640712][T11735] kernfs_create_link+0x68/0x120 [ 2931.640733][T11735] sysfs_do_create_link_sd+0x6b/0xf0 [ 2931.708132][T11735] sysfs_create_link+0x4d/0x60 [ 2931.712896][T11735] device_add+0x602/0xe50 [ 2931.717305][T11735] netdev_register_kobject+0xfd/0x230 [ 2931.722781][T11735] register_netdevice+0xbcf/0x1060 [ 2931.727888][T11735] ipvlan_link_new+0x2a2/0x5d0 [ 2931.732872][T11735] rtnl_newlink+0xda6/0x13b0 [ 2931.737638][T11735] ? __schedule+0x3c1/0x580 [ 2931.742392][T11735] ? preempt_schedule_irq+0x43/0x80 [ 2931.747818][T11735] ? irqentry_exit_cond_resched+0x30/0x40 [ 2931.753555][T11735] ? irqentry_exit+0x2a/0x40 [ 2931.758143][T11735] ? widen_string+0x3a/0x280 [ 2931.762831][T11735] ? aa_get_newest_label+0x74/0x250 [ 2931.769762][T11735] ? apparmor_capable+0xfe/0x160 [ 2931.774694][T11735] ? bpf_lsm_capable+0x5/0x10 [ 2931.779362][T11735] ? security_capable+0x91/0xa0 [ 2931.784228][T11735] ? __rcu_read_unlock+0x51/0x250 [ 2931.789255][T11735] ? ns_capable+0x79/0xa0 [ 2931.793653][T11735] ? rtnl_setlink+0x270/0x270 [ 2931.798318][T11735] rtnetlink_rcv_msg+0x723/0x7c0 [ 2931.803298][T11735] ? ___cache_free+0x3c/0x2f0 [ 2931.808110][T11735] ? ima_match_policy+0xa80/0xab0 [ 2931.813192][T11735] ? __kfree_skb+0xfe/0x150 [ 2931.822114][T11735] ? __kfree_skb+0xfe/0x150 [ 2931.826621][T11735] ? consume_skb+0x4b/0x160 [ 2931.831137][T11735] ? nlmon_xmit+0x47/0x50 [ 2931.835943][T11735] ? xmit_one+0x173/0x2e0 [ 2931.840385][T11735] ? local_bh_enable+0x1b/0x20 [ 2931.845161][T11735] ? __dev_queue_xmit+0xbf2/0x1500 [ 2931.850275][T11735] ? __skb_clone+0x2a9/0x2c0 [ 2931.854942][T11735] ? __rcu_read_unlock+0x51/0x250 [ 2931.860005][T11735] netlink_rcv_skb+0x13e/0x240 [ 2931.864887][T11735] ? rtnetlink_bind+0x60/0x60 [ 2931.870827][T11735] rtnetlink_rcv+0x18/0x20 [ 2931.875250][T11735] netlink_unicast+0x5df/0x6b0 [ 2931.880218][T11735] netlink_sendmsg+0x6f8/0x7c0 [ 2931.885001][T11735] ? netlink_getsockopt+0x720/0x720 [ 2931.890960][T11735] ____sys_sendmsg+0x352/0x4c0 [ 2931.896432][T11735] ? import_iovec+0xb8/0xd0 [ 2931.902395][T11735] __sys_sendmsg+0x1ed/0x270 [ 2931.907004][T11735] ? __fsnotify_parent+0x32f/0x430 [ 2931.913134][T11735] ? get_pid_task+0x90/0xc0 [ 2931.918613][T11735] ? vfs_write+0x54d/0x7c0 [ 2931.923699][T11735] ? __fget_light+0x219/0x260 [ 2931.929708][T11735] ? fput+0x2d/0x130 [ 2931.933741][T11735] ? ksys_write+0x157/0x180 [ 2931.939251][T11735] __x64_sys_sendmsg+0x42/0x50 [ 2931.945416][T11735] do_syscall_64+0x39/0x80 [ 2931.950623][T11735] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2931.957656][T11735] RIP: 0033:0x45e219 [ 2931.961608][T11735] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2931.981586][T11735] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2931.991273][T11735] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2932.000538][T11735] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2932.009832][T11735] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.018650][T11735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 17:15:18 executing program 5: syz_usb_connect(0x1, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="df43921487c8b656aa7bf928f440fcad2d07ad156392f8f833cdff11"], 0x0) syz_io_uring_setup(0x512c, &(0x7f0000000080)={0x0, 0x6cfe, 0x20, 0x0, 0x16b}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) write$cgroup_devices(r1, &(0x7f0000000140)={'c', ' *:* ', 'w\x00'}, 0x8) [ 2932.026736][T11735] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:18 executing program 0 (fault-call:14 fault-nth:20): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2932.072933][ T17] usb 6-1: can't set config #0, error -71 [ 2932.081461][ T17] usb 6-1: USB disconnect, device number 97 [ 2932.140389][T11749] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2932.150604][T11749] FAULT_INJECTION: forcing a failure. [ 2932.150604][T11749] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.166341][T11749] CPU: 0 PID: 11749 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2932.177168][T11749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2932.188356][T11749] Call Trace: [ 2932.192219][T11749] dump_stack+0x116/0x15d [ 2932.198131][T11749] should_fail+0x231/0x240 [ 2932.203299][T11749] ? __kernfs_new_node+0x71/0x350 [ 2932.210133][T11749] __should_failslab+0x81/0x90 [ 2932.216116][T11749] should_failslab+0x5/0x20 [ 2932.222066][T11749] kmem_cache_alloc+0x36/0x2e0 [ 2932.227873][T11749] __kernfs_new_node+0x71/0x350 [ 2932.233204][T11749] ? rb_insert_color+0x7e/0x2e0 [ 2932.239096][T11749] ? kernfs_link_sibling+0x21c/0x230 [ 2932.244527][T11749] ? kernfs_activate+0x2c5/0x2e0 [ 2932.250418][T11749] kernfs_new_node+0x5b/0xd0 [ 2932.255946][T11749] kernfs_create_link+0x68/0x120 [ 2932.261740][T11749] sysfs_do_create_link_sd+0x6b/0xf0 [ 2932.267125][T11749] sysfs_create_link+0x4d/0x60 [ 2932.273908][T11749] device_add+0x602/0xe50 [ 2932.278294][T11749] netdev_register_kobject+0xfd/0x230 [ 2932.284065][T11749] register_netdevice+0xbcf/0x1060 [ 2932.291575][T11749] ipvlan_link_new+0x2a2/0x5d0 [ 2932.297387][T11749] rtnl_newlink+0xda6/0x13b0 [ 2932.302551][T11749] ? irqentry_exit+0x2a/0x40 [ 2932.307344][T11749] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2932.314405][T11749] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2932.321532][T11749] ? widen_string+0x3a/0x280 [ 2932.328909][T11749] ? aa_get_newest_label+0x74/0x250 [ 2932.334777][T11749] ? apparmor_capable+0xfe/0x160 [ 2932.340557][T11749] ? bpf_lsm_capable+0x5/0x10 [ 2932.346020][T11749] ? security_capable+0x91/0xa0 [ 2932.351235][T11749] ? __rcu_read_unlock+0x51/0x250 [ 2932.356931][T11749] ? ns_capable+0x79/0xa0 [ 2932.362422][T11749] ? rtnl_setlink+0x270/0x270 [ 2932.368171][T11749] rtnetlink_rcv_msg+0x723/0x7c0 [ 2932.373823][T11749] ? ___cache_free+0x3c/0x2f0 [ 2932.378958][T11749] ? ima_match_policy+0xa80/0xab0 [ 2932.384522][T11749] ? __kfree_skb+0xfe/0x150 [ 2932.390308][T11749] ? __kfree_skb+0xfe/0x150 [ 2932.396083][T11749] ? consume_skb+0x4b/0x160 [ 2932.400948][T11749] ? nlmon_xmit+0x47/0x50 [ 2932.405539][T11749] ? xmit_one+0x173/0x2e0 [ 2932.409893][T11749] ? local_bh_enable+0x1b/0x20 [ 2932.414772][T11749] ? __dev_queue_xmit+0xbf2/0x1500 [ 2932.419912][T11749] ? __skb_clone+0x2a9/0x2c0 [ 2932.424613][T11749] ? __rcu_read_unlock+0x51/0x250 [ 2932.429634][T11749] netlink_rcv_skb+0x13e/0x240 [ 2932.434392][T11749] ? rtnetlink_bind+0x60/0x60 [ 2932.439071][T11749] rtnetlink_rcv+0x18/0x20 [ 2932.443497][T11749] netlink_unicast+0x5df/0x6b0 [ 2932.448266][T11749] netlink_sendmsg+0x6f8/0x7c0 [ 2932.453023][T11749] ? netlink_getsockopt+0x720/0x720 [ 2932.459525][T11749] ____sys_sendmsg+0x352/0x4c0 [ 2932.464299][T11749] ? import_iovec+0xb8/0xd0 [ 2932.468846][T11749] __sys_sendmsg+0x1ed/0x270 [ 2932.473473][T11749] ? __fsnotify_parent+0x32f/0x430 [ 2932.478673][T11749] ? get_pid_task+0x90/0xc0 [ 2932.483199][T11749] ? vfs_write+0x54d/0x7c0 [ 2932.487783][T11749] ? __fget_light+0x219/0x260 [ 2932.492533][T11749] ? fput+0x2d/0x130 [ 2932.496574][T11749] ? ksys_write+0x157/0x180 [ 2932.501337][T11749] __x64_sys_sendmsg+0x42/0x50 [ 2932.506159][T11749] do_syscall_64+0x39/0x80 [ 2932.510594][T11749] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2932.516517][T11749] RIP: 0033:0x45e219 [ 2932.520429][T11749] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:19 executing program 0 (fault-call:14 fault-nth:21): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2932.540204][T11749] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2932.548624][T11749] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2932.556645][T11749] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2932.564624][T11749] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2932.572592][T11749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 2932.580589][T11749] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2932.625470][T11751] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2932.637240][T11751] FAULT_INJECTION: forcing a failure. [ 2932.637240][T11751] name failslab, interval 1, probability 0, space 0, times 0 [ 2932.652733][T11751] CPU: 0 PID: 11751 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2932.662578][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2932.673903][T11751] Call Trace: [ 2932.677576][T11751] dump_stack+0x116/0x15d [ 2932.683095][T11751] should_fail+0x231/0x240 [ 2932.688870][T11751] ? __kernfs_new_node+0x71/0x350 [ 2932.694271][T11751] __should_failslab+0x81/0x90 [ 2932.699859][T11751] should_failslab+0x5/0x20 [ 2932.705180][T11751] kmem_cache_alloc+0x36/0x2e0 [ 2932.710217][T11751] __kernfs_new_node+0x71/0x350 [ 2932.715534][T11751] ? idr_alloc_cyclic+0x249/0x2c0 [ 2932.721313][T11751] kernfs_new_node+0x5b/0xd0 [ 2932.726705][T11751] __kernfs_create_file+0x45/0x180 [ 2932.732115][T11751] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2932.740228][T11751] internal_create_group+0x2e4/0x850 [ 2932.745700][T11751] sysfs_create_groups+0x3d/0xf0 [ 2932.750871][T11751] device_add+0x693/0xe50 [ 2932.756334][T11751] netdev_register_kobject+0xfd/0x230 [ 2932.761896][T11751] register_netdevice+0xbcf/0x1060 [ 2932.767408][T11751] ipvlan_link_new+0x2a2/0x5d0 [ 2932.772860][T11751] rtnl_newlink+0xda6/0x13b0 [ 2932.778295][T11751] ? _raw_spin_unlock_irq+0x22/0x40 [ 2932.783605][T11751] ? finish_task_switch+0xc0/0x2a0 [ 2932.790231][T11751] ? __schedule+0x3c1/0x580 [ 2932.795586][T11751] ? widen_string+0x3a/0x280 [ 2932.800332][T11751] ? widen_string+0x3a/0x280 [ 2932.805417][T11751] ? aa_get_newest_label+0x74/0x250 [ 2932.811857][T11751] ? apparmor_capable+0xfe/0x160 [ 2932.818466][T11751] ? bpf_lsm_capable+0x5/0x10 [ 2932.823270][T11751] ? security_capable+0x91/0xa0 [ 2932.828468][T11751] ? __rcu_read_unlock+0x51/0x250 [ 2932.835048][T11751] ? ns_capable+0x79/0xa0 [ 2932.840353][T11751] ? rtnl_setlink+0x270/0x270 [ 2932.845599][T11751] rtnetlink_rcv_msg+0x723/0x7c0 [ 2932.851169][T11751] ? ___cache_free+0x3c/0x2f0 [ 2932.856823][T11751] ? ima_match_policy+0xa80/0xab0 [ 2932.862527][T11751] ? __kfree_skb+0xfe/0x150 [ 2932.867683][T11751] ? __kfree_skb+0xfe/0x150 17:15:19 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @ptr]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2932.874861][T11751] ? consume_skb+0x4b/0x160 [ 2932.881849][T11751] ? nlmon_xmit+0x47/0x50 [ 2932.886570][T11751] ? xmit_one+0x173/0x2e0 [ 2932.890915][T11751] ? local_bh_enable+0x1b/0x20 [ 2932.895871][T11751] ? __dev_queue_xmit+0xbf2/0x1500 [ 2932.901170][T11751] ? __skb_clone+0x2a9/0x2c0 [ 2932.906118][T11751] ? __rcu_read_unlock+0x51/0x250 [ 2932.911558][T11751] netlink_rcv_skb+0x13e/0x240 [ 2932.916480][T11751] ? rtnetlink_bind+0x60/0x60 [ 2932.921370][T11751] rtnetlink_rcv+0x18/0x20 [ 2932.925827][T11751] netlink_unicast+0x5df/0x6b0 [ 2932.930667][T11751] netlink_sendmsg+0x6f8/0x7c0 [ 2932.935412][T11751] ? netlink_getsockopt+0x720/0x720 [ 2932.941509][T11751] ____sys_sendmsg+0x352/0x4c0 [ 2932.946447][T11751] ? import_iovec+0xb8/0xd0 [ 2932.951040][T11751] __sys_sendmsg+0x1ed/0x270 [ 2932.955705][T11751] ? __fsnotify_parent+0x32f/0x430 [ 2932.961095][T11751] ? get_pid_task+0x90/0xc0 [ 2932.965682][T11751] ? vfs_write+0x54d/0x7c0 [ 2932.970541][T11751] ? __fget_light+0x219/0x260 [ 2932.975289][T11751] ? fput+0x2d/0x130 [ 2932.979181][T11751] ? ksys_write+0x157/0x180 [ 2932.983881][T11751] __x64_sys_sendmsg+0x42/0x50 [ 2932.988748][T11751] do_syscall_64+0x39/0x80 [ 2932.993169][T11751] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2932.999409][T11751] RIP: 0033:0x45e219 [ 2933.003329][T11751] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:19 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:19 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @ptr]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2933.022916][T11751] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2933.031520][T11751] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2933.039587][T11751] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2933.047541][T11751] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2933.055618][T11751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 2933.063727][T11751] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:19 executing program 0 (fault-call:14 fault-nth:22): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2933.149525][T11761] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2933.163146][T11761] FAULT_INJECTION: forcing a failure. [ 2933.163146][T11761] name failslab, interval 1, probability 0, space 0, times 0 [ 2933.178057][T11761] CPU: 1 PID: 11761 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2933.188812][T11761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.199879][T11761] Call Trace: [ 2933.203562][T11761] dump_stack+0x116/0x15d [ 2933.209032][T11761] should_fail+0x231/0x240 [ 2933.214734][T11761] ? __kernfs_new_node+0x71/0x350 [ 2933.220319][T11761] __should_failslab+0x81/0x90 [ 2933.225464][T11761] should_failslab+0x5/0x20 [ 2933.231007][T11761] kmem_cache_alloc+0x36/0x2e0 [ 2933.236393][T11761] __kernfs_new_node+0x71/0x350 [ 2933.241971][T11761] ? rb_insert_color+0x29f/0x2e0 [ 2933.247672][T11761] ? kernfs_link_sibling+0x21c/0x230 [ 2933.253097][T11761] ? kernfs_activate+0x2c5/0x2e0 [ 2933.258720][T11761] kernfs_new_node+0x5b/0xd0 [ 2933.265004][T11761] __kernfs_create_file+0x45/0x180 [ 2933.270287][T11761] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2933.275848][T11761] internal_create_group+0x2e4/0x850 [ 2933.281187][T11761] sysfs_create_groups+0x3d/0xf0 [ 2933.286801][T11761] device_add+0x693/0xe50 [ 2933.292223][T11761] netdev_register_kobject+0xfd/0x230 [ 2933.297735][T11761] register_netdevice+0xbcf/0x1060 [ 2933.303370][T11761] ipvlan_link_new+0x2a2/0x5d0 [ 2933.309059][T11761] rtnl_newlink+0xda6/0x13b0 [ 2933.313992][T11761] ? __schedule+0x3c1/0x580 [ 2933.319736][T11761] ? preempt_schedule_irq+0x43/0x80 [ 2933.325331][T11761] ? irqentry_exit_cond_resched+0x30/0x40 [ 2933.332626][T11761] ? aa_get_newest_label+0x74/0x250 [ 2933.339962][T11761] ? apparmor_capable+0xfe/0x160 [ 2933.345313][T11761] ? bpf_lsm_capable+0x5/0x10 [ 2933.350838][T11761] ? security_capable+0x91/0xa0 [ 2933.356793][T11761] ? __rcu_read_unlock+0x51/0x250 [ 2933.362782][T11761] ? ns_capable+0x79/0xa0 [ 2933.368319][T11761] ? rtnl_setlink+0x270/0x270 [ 2933.374240][T11761] rtnetlink_rcv_msg+0x723/0x7c0 [ 2933.379408][T11761] ? ___cache_free+0x3c/0x2f0 [ 2933.384230][T11761] ? ima_match_policy+0xa80/0xab0 [ 2933.389366][T11761] ? __kfree_skb+0xfe/0x150 [ 2933.393906][T11761] ? __kfree_skb+0xfe/0x150 [ 2933.398476][T11761] ? consume_skb+0x4b/0x160 [ 2933.402960][T11761] ? nlmon_xmit+0x47/0x50 [ 2933.407328][T11761] ? xmit_one+0x173/0x2e0 [ 2933.411650][T11761] ? local_bh_enable+0x1b/0x20 [ 2933.416428][T11761] ? __dev_queue_xmit+0xbf2/0x1500 [ 2933.421534][T11761] ? __skb_clone+0x2a9/0x2c0 [ 2933.426102][T11761] ? __rcu_read_unlock+0x51/0x250 [ 2933.431341][T11761] netlink_rcv_skb+0x13e/0x240 [ 2933.436129][T11761] ? rtnetlink_bind+0x60/0x60 [ 2933.440868][T11761] rtnetlink_rcv+0x18/0x20 [ 2933.445361][T11761] netlink_unicast+0x5df/0x6b0 [ 2933.450280][T11761] netlink_sendmsg+0x6f8/0x7c0 [ 2933.455043][T11761] ? netlink_getsockopt+0x720/0x720 [ 2933.461350][T11761] ____sys_sendmsg+0x352/0x4c0 [ 2933.466094][T11761] ? import_iovec+0xb8/0xd0 [ 2933.470587][T11761] __sys_sendmsg+0x1ed/0x270 [ 2933.478296][T11761] ? __fsnotify_parent+0x32f/0x430 [ 2933.483546][T11761] ? get_pid_task+0x90/0xc0 [ 2933.488157][T11761] ? vfs_write+0x54d/0x7c0 [ 2933.493002][T11761] ? __fget_light+0x219/0x260 [ 2933.497730][T11761] ? fput+0x2d/0x130 [ 2933.501639][T11761] ? ksys_write+0x157/0x180 [ 2933.506182][T11761] __x64_sys_sendmsg+0x42/0x50 [ 2933.510994][T11761] do_syscall_64+0x39/0x80 [ 2933.515413][T11761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2933.521460][T11761] RIP: 0033:0x45e219 [ 2933.525427][T11761] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2933.545274][T11761] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2933.553943][T11761] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2933.561984][T11761] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2933.570101][T11761] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2933.578270][T11761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 2933.586621][T11761] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:20 executing program 0 (fault-call:14 fault-nth:23): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2933.607078][ T17] usb 6-1: new low-speed USB device number 98 using dummy_hcd [ 2933.671138][T11771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2933.684460][T11771] FAULT_INJECTION: forcing a failure. [ 2933.684460][T11771] name failslab, interval 1, probability 0, space 0, times 0 [ 2933.699702][T11771] CPU: 0 PID: 11771 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2933.708574][T11771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2933.719846][T11771] Call Trace: [ 2933.723143][T11771] dump_stack+0x116/0x15d [ 2933.728569][T11771] should_fail+0x231/0x240 [ 2933.736097][T11771] ? __kernfs_new_node+0x71/0x350 [ 2933.743205][T11771] __should_failslab+0x81/0x90 [ 2933.748477][T11771] should_failslab+0x5/0x20 [ 2933.753963][T11771] kmem_cache_alloc+0x36/0x2e0 [ 2933.758771][T11771] __kernfs_new_node+0x71/0x350 [ 2933.764503][T11771] ? rb_insert_color+0x2c9/0x2e0 [ 2933.769551][T11771] ? kernfs_link_sibling+0x21c/0x230 [ 2933.776219][T11771] ? kernfs_activate+0x2c5/0x2e0 [ 2933.781670][T11771] kernfs_new_node+0x5b/0xd0 [ 2933.788299][T11771] __kernfs_create_file+0x45/0x180 [ 2933.793528][T11771] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2933.800250][T11771] internal_create_group+0x2e4/0x850 [ 2933.806187][T11771] sysfs_create_groups+0x3d/0xf0 [ 2933.811359][T11771] device_add+0x693/0xe50 [ 2933.816918][T11771] netdev_register_kobject+0xfd/0x230 [ 2933.822300][T11771] register_netdevice+0xbcf/0x1060 [ 2933.827730][T11771] ipvlan_link_new+0x2a2/0x5d0 [ 2933.833106][T11771] rtnl_newlink+0xda6/0x13b0 [ 2933.837805][T11771] ? __schedule+0x3c1/0x580 [ 2933.842296][T11771] ? prandom_u32_state+0x9/0x80 [ 2933.847193][T11771] ? widen_string+0x3a/0x280 [ 2933.851882][T11771] ? aa_get_newest_label+0x74/0x250 [ 2933.858099][T11771] ? apparmor_capable+0xfe/0x160 [ 2933.863040][T11771] ? bpf_lsm_capable+0x5/0x10 [ 2933.867796][T11771] ? security_capable+0x91/0xa0 [ 2933.873842][T11771] ? __rcu_read_unlock+0x51/0x250 [ 2933.878925][T11771] ? ns_capable+0x79/0xa0 [ 2933.883251][T11771] ? rtnl_setlink+0x270/0x270 [ 2933.888051][T11771] rtnetlink_rcv_msg+0x723/0x7c0 [ 2933.892979][T11771] ? ___cache_free+0x3c/0x2f0 [ 2933.897689][T11771] ? ima_match_policy+0xa80/0xab0 [ 2933.902699][T11771] ? __kfree_skb+0xfe/0x150 [ 2933.907212][T11771] ? __kfree_skb+0xfe/0x150 [ 2933.911778][T11771] ? consume_skb+0x4b/0x160 [ 2933.916304][T11771] ? nlmon_xmit+0x47/0x50 [ 2933.920619][T11771] ? xmit_one+0x173/0x2e0 [ 2933.926844][T11771] ? local_bh_enable+0x1b/0x20 [ 2933.931731][T11771] ? __dev_queue_xmit+0xbf2/0x1500 [ 2933.936841][T11771] ? __skb_clone+0x2a9/0x2c0 [ 2933.941532][T11771] ? __rcu_read_unlock+0x51/0x250 [ 2933.946637][T11771] netlink_rcv_skb+0x13e/0x240 [ 2933.951518][T11771] ? rtnetlink_bind+0x60/0x60 [ 2933.956543][T11771] rtnetlink_rcv+0x18/0x20 [ 2933.961121][T11771] netlink_unicast+0x5df/0x6b0 [ 2933.966306][T11771] netlink_sendmsg+0x6f8/0x7c0 [ 2933.972094][T11771] ? netlink_getsockopt+0x720/0x720 [ 2933.977504][T11771] ____sys_sendmsg+0x352/0x4c0 [ 2933.982350][T11771] ? import_iovec+0xb8/0xd0 [ 2933.986846][T11771] __sys_sendmsg+0x1ed/0x270 [ 2933.991430][T11771] ? __fsnotify_parent+0x32f/0x430 [ 2933.996599][T11771] ? get_pid_task+0x90/0xc0 [ 2934.001097][T11771] ? vfs_write+0x54d/0x7c0 [ 2934.005513][T11771] ? __fget_light+0x219/0x260 [ 2934.014286][T11771] ? fput+0x2d/0x130 [ 2934.018215][T11771] ? ksys_write+0x157/0x180 [ 2934.022754][T11771] __x64_sys_sendmsg+0x42/0x50 [ 2934.027573][T11771] do_syscall_64+0x39/0x80 [ 2934.032013][T11771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2934.037936][T11771] RIP: 0033:0x45e219 [ 2934.041806][T11771] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2934.061752][T11771] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:20 executing program 0 (fault-call:14 fault-nth:24): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2934.070167][T11771] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2934.078245][T11771] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2934.086214][T11771] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2934.094498][T11771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 2934.102584][T11771] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2934.157505][T11773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2934.168694][T11773] FAULT_INJECTION: forcing a failure. [ 2934.168694][T11773] name failslab, interval 1, probability 0, space 0, times 0 [ 2934.184097][T11773] CPU: 0 PID: 11773 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2934.193501][T11773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2934.194965][ T17] usb 6-1: device descriptor read/64, error 18 [ 2934.203746][T11773] Call Trace: [ 2934.203757][T11773] dump_stack+0x116/0x15d [ 2934.218795][T11773] should_fail+0x231/0x240 [ 2934.225005][T11773] ? __kernfs_new_node+0x71/0x350 [ 2934.231715][T11773] __should_failslab+0x81/0x90 [ 2934.238655][T11773] should_failslab+0x5/0x20 [ 2934.245462][T11773] kmem_cache_alloc+0x36/0x2e0 [ 2934.252368][T11773] __kernfs_new_node+0x71/0x350 [ 2934.259486][T11773] ? rb_insert_color+0x2c9/0x2e0 [ 2934.265742][T11773] ? kernfs_link_sibling+0x21c/0x230 [ 2934.273839][T11773] ? kernfs_activate+0x2c5/0x2e0 [ 2934.279171][T11773] kernfs_new_node+0x5b/0xd0 [ 2934.285456][T11773] __kernfs_create_file+0x45/0x180 [ 2934.293413][T11773] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2934.303604][T11773] internal_create_group+0x2e4/0x850 [ 2934.310593][T11773] sysfs_create_groups+0x3d/0xf0 [ 2934.317434][T11773] device_add+0x693/0xe50 [ 2934.322407][T11773] netdev_register_kobject+0xfd/0x230 [ 2934.332925][T11773] register_netdevice+0xbcf/0x1060 [ 2934.341250][T11773] ipvlan_link_new+0x2a2/0x5d0 [ 2934.347656][T11773] rtnl_newlink+0xda6/0x13b0 [ 2934.354151][T11773] ? __schedule+0x3c1/0x580 [ 2934.360771][T11773] ? __perf_event_task_sched_in+0x565/0x590 [ 2934.367736][T11773] ? kvm_sched_clock_read+0x15/0x40 [ 2934.374522][T11773] ? prandom_u32_state+0x9/0x80 [ 2934.382496][T11773] ? aa_get_newest_label+0x74/0x250 [ 2934.389279][T11773] ? apparmor_capable+0xfe/0x160 [ 2934.396868][T11773] ? bpf_lsm_capable+0x5/0x10 [ 2934.403427][T11773] ? security_capable+0x91/0xa0 [ 2934.408419][T11773] ? __rcu_read_unlock+0x51/0x250 [ 2934.414929][T11773] ? ns_capable+0x79/0xa0 [ 2934.421037][T11773] ? rtnl_setlink+0x270/0x270 [ 2934.426838][T11773] rtnetlink_rcv_msg+0x723/0x7c0 [ 2934.431934][T11773] ? _raw_spin_unlock_irq+0x22/0x40 [ 2934.437125][T11773] ? finish_task_switch+0xc0/0x2a0 [ 2934.442630][T11773] ? __schedule+0x3c1/0x580 [ 2934.447124][T11773] ? preempt_schedule+0x54/0x80 [ 2934.452042][T11773] ? preempt_schedule_thunk+0x16/0x18 [ 2934.457455][T11773] ? __dev_queue_xmit+0x107a/0x1500 [ 2934.462681][T11773] ? rcu_preempt_deferred_qs_irqrestore+0x396/0x570 [ 2934.469270][T11773] ? __rcu_read_unlock+0xba/0x250 [ 2934.474570][T11773] netlink_rcv_skb+0x13e/0x240 [ 2934.479677][T11773] ? rtnetlink_bind+0x60/0x60 [ 2934.484436][T11773] rtnetlink_rcv+0x18/0x20 [ 2934.488865][T11773] netlink_unicast+0x5df/0x6b0 [ 2934.494053][T11773] netlink_sendmsg+0x6f8/0x7c0 [ 2934.498814][T11773] ? netlink_getsockopt+0x720/0x720 [ 2934.507036][T11773] ____sys_sendmsg+0x352/0x4c0 [ 2934.511879][T11773] ? import_iovec+0xb8/0xd0 [ 2934.516363][T11773] __sys_sendmsg+0x1ed/0x270 [ 2934.520947][T11773] ? __fsnotify_parent+0x32f/0x430 [ 2934.526033][T11773] ? get_pid_task+0x90/0xc0 [ 2934.530902][T11773] ? vfs_write+0x54d/0x7c0 [ 2934.535331][T11773] ? __fget_light+0x219/0x260 [ 2934.540100][T11773] ? fput+0x2d/0x130 [ 2934.544061][T11773] ? ksys_write+0x157/0x180 [ 2934.548557][T11773] __x64_sys_sendmsg+0x42/0x50 [ 2934.554074][T11773] do_syscall_64+0x39/0x80 [ 2934.558653][T11773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2934.564576][T11773] RIP: 0033:0x45e219 [ 2934.568449][T11773] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2934.588059][T11773] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2934.596487][T11773] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:21 executing program 0 (fault-call:14 fault-nth:25): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2934.604476][T11773] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2934.612636][T11773] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2934.620681][T11773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 2934.628636][T11773] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2934.675797][T11775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2934.686354][T11775] FAULT_INJECTION: forcing a failure. [ 2934.686354][T11775] name failslab, interval 1, probability 0, space 0, times 0 [ 2934.703048][T11775] CPU: 0 PID: 11775 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2934.712494][T11775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2934.723559][T11775] Call Trace: [ 2934.727092][T11775] dump_stack+0x116/0x15d [ 2934.731942][T11775] should_fail+0x231/0x240 [ 2934.737788][T11775] ? __kernfs_new_node+0x71/0x350 [ 2934.742848][T11775] __should_failslab+0x81/0x90 [ 2934.747620][T11775] should_failslab+0x5/0x20 [ 2934.752215][T11775] kmem_cache_alloc+0x36/0x2e0 [ 2934.757610][T11775] __kernfs_new_node+0x71/0x350 [ 2934.763897][T11775] ? rb_insert_color+0x7e/0x2e0 [ 2934.768755][T11775] ? kernfs_link_sibling+0x21c/0x230 [ 2934.774075][T11775] ? kernfs_activate+0x2c5/0x2e0 [ 2934.779025][T11775] kernfs_new_node+0x5b/0xd0 [ 2934.785977][T11775] __kernfs_create_file+0x45/0x180 [ 2934.791211][T11775] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2934.797731][T11775] internal_create_group+0x2e4/0x850 [ 2934.803020][T11775] sysfs_create_groups+0x3d/0xf0 [ 2934.809462][T11775] device_add+0x693/0xe50 [ 2934.813802][T11775] netdev_register_kobject+0xfd/0x230 [ 2934.819960][T11775] register_netdevice+0xbcf/0x1060 [ 2934.826453][T11775] ipvlan_link_new+0x2a2/0x5d0 [ 2934.831236][T11775] rtnl_newlink+0xda6/0x13b0 [ 2934.836035][T11775] ? irqentry_exit+0x2a/0x40 [ 2934.842406][T11775] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2934.848328][T11775] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2934.854610][T11775] ? aa_get_newest_label+0x74/0x250 [ 2934.859812][T11775] ? apparmor_capable+0xfe/0x160 [ 2934.866491][T11775] ? bpf_lsm_capable+0x5/0x10 [ 2934.872630][T11775] ? security_capable+0x91/0xa0 [ 2934.877509][T11775] ? __rcu_read_unlock+0x51/0x250 [ 2934.882543][T11775] ? ns_capable+0x79/0xa0 [ 2934.887486][T11775] ? rtnl_setlink+0x270/0x270 [ 2934.893621][T11775] rtnetlink_rcv_msg+0x723/0x7c0 [ 2934.900318][T11775] ? ___cache_free+0x3c/0x2f0 [ 2934.906298][T11775] ? ima_match_policy+0xa80/0xab0 [ 2934.911360][T11775] ? __kfree_skb+0xfe/0x150 [ 2934.915967][T11775] ? __kfree_skb+0xfe/0x150 [ 2934.920476][T11775] ? consume_skb+0x4b/0x160 [ 2934.924989][T11775] ? nlmon_xmit+0x47/0x50 [ 2934.929327][T11775] ? xmit_one+0x173/0x2e0 [ 2934.933712][T11775] ? local_bh_enable+0x1b/0x20 [ 2934.938565][T11775] ? __dev_queue_xmit+0xbf2/0x1500 [ 2934.943879][T11775] ? __skb_clone+0x2a9/0x2c0 [ 2934.948598][T11775] ? __rcu_read_unlock+0x51/0x250 [ 2934.953682][T11775] netlink_rcv_skb+0x13e/0x240 [ 2934.958442][T11775] ? rtnetlink_bind+0x60/0x60 [ 2934.963211][T11775] rtnetlink_rcv+0x18/0x20 [ 2934.967633][T11775] netlink_unicast+0x5df/0x6b0 [ 2934.973877][T11775] netlink_sendmsg+0x6f8/0x7c0 [ 2934.979312][T11775] ? netlink_getsockopt+0x720/0x720 [ 2934.985852][T11775] ____sys_sendmsg+0x352/0x4c0 [ 2934.990675][T11775] ? import_iovec+0xb8/0xd0 [ 2934.995183][T11775] __sys_sendmsg+0x1ed/0x270 [ 2935.001110][T11775] ? __fsnotify_parent+0x32f/0x430 [ 2935.006229][T11775] ? get_pid_task+0x90/0xc0 [ 2935.010763][T11775] ? vfs_write+0x54d/0x7c0 [ 2935.015336][T11775] ? __fget_light+0x219/0x260 [ 2935.021709][T11775] ? fput+0x2d/0x130 [ 2935.025743][T11775] ? ksys_write+0x157/0x180 [ 2935.031931][T11775] __x64_sys_sendmsg+0x42/0x50 [ 2935.037985][T11775] do_syscall_64+0x39/0x80 [ 2935.043033][T11775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2935.048986][T11775] RIP: 0033:0x45e219 [ 2935.052896][T11775] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2935.072604][T11775] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2935.082046][T11775] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2935.090112][T11775] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2935.099043][T11775] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.107026][T11775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 2935.115099][T11775] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:21 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000001040)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000040)=""/4096) 17:15:21 executing program 0 (fault-call:14 fault-nth:26): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2935.203804][ T17] usb 6-1: new low-speed USB device number 99 using dummy_hcd [ 2935.238793][T11782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2935.258861][T11782] FAULT_INJECTION: forcing a failure. [ 2935.258861][T11782] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.286837][T11782] CPU: 0 PID: 11782 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2935.295718][T11782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2935.305774][T11782] Call Trace: [ 2935.309208][T11782] dump_stack+0x116/0x15d [ 2935.314067][T11782] should_fail+0x231/0x240 [ 2935.319518][T11782] ? __kernfs_new_node+0x71/0x350 [ 2935.324763][T11782] __should_failslab+0x81/0x90 [ 2935.330941][T11782] should_failslab+0x5/0x20 [ 2935.336902][T11782] kmem_cache_alloc+0x36/0x2e0 [ 2935.341689][T11782] __kernfs_new_node+0x71/0x350 [ 2935.347366][T11782] ? rb_insert_color+0x28d/0x2e0 [ 2935.352343][T11782] ? kernfs_link_sibling+0x21c/0x230 [ 2935.357777][T11782] ? kernfs_activate+0x2c5/0x2e0 [ 2935.363833][T11782] kernfs_new_node+0x5b/0xd0 [ 2935.368436][T11782] __kernfs_create_file+0x45/0x180 [ 2935.374340][T11782] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2935.379895][T11782] internal_create_group+0x2e4/0x850 [ 2935.385587][T11782] sysfs_create_groups+0x3d/0xf0 [ 2935.390533][T11782] device_add+0x693/0xe50 [ 2935.396202][T11782] netdev_register_kobject+0xfd/0x230 [ 2935.401620][T11782] register_netdevice+0xbcf/0x1060 [ 2935.407142][T11782] ipvlan_link_new+0x2a2/0x5d0 [ 2935.411940][T11782] rtnl_newlink+0xda6/0x13b0 [ 2935.417490][T11782] ? _raw_spin_unlock_irq+0x22/0x40 [ 2935.424049][T11782] ? finish_task_switch+0xc0/0x2a0 [ 2935.429167][T11782] ? __schedule+0x3c1/0x580 [ 2935.434875][T11782] ? widen_string+0x3a/0x280 [ 2935.439556][T11782] ? widen_string+0x3a/0x280 [ 2935.445476][T11782] ? aa_get_newest_label+0x74/0x250 [ 2935.452480][T11782] ? apparmor_capable+0xfe/0x160 [ 2935.457469][T11782] ? bpf_lsm_capable+0x5/0x10 [ 2935.462181][T11782] ? security_capable+0x91/0xa0 [ 2935.467804][T11782] ? __rcu_read_unlock+0x51/0x250 [ 2935.474163][T11782] ? ns_capable+0x79/0xa0 [ 2935.478505][T11782] ? rtnl_setlink+0x270/0x270 [ 2935.483193][T11782] rtnetlink_rcv_msg+0x723/0x7c0 [ 2935.488477][T11782] ? ___cache_free+0x3c/0x2f0 [ 2935.493247][T11782] ? ima_match_policy+0xa80/0xab0 [ 2935.498365][T11782] ? __kfree_skb+0xfe/0x150 [ 2935.503236][T11782] ? __kfree_skb+0xfe/0x150 [ 2935.507926][T11782] ? consume_skb+0x4b/0x160 [ 2935.513388][T11782] ? nlmon_xmit+0x47/0x50 [ 2935.517970][T11782] ? xmit_one+0x173/0x2e0 [ 2935.522329][T11782] ? local_bh_enable+0x1b/0x20 [ 2935.527125][T11782] ? __dev_queue_xmit+0xbf2/0x1500 [ 2935.532758][T11782] ? __skb_clone+0x2a9/0x2c0 [ 2935.539601][T11782] ? __rcu_read_unlock+0x51/0x250 [ 2935.544665][T11782] netlink_rcv_skb+0x13e/0x240 [ 2935.550235][T11782] ? rtnetlink_bind+0x60/0x60 [ 2935.554959][T11782] rtnetlink_rcv+0x18/0x20 [ 2935.560863][T11782] netlink_unicast+0x5df/0x6b0 [ 2935.565736][T11782] netlink_sendmsg+0x6f8/0x7c0 [ 2935.570946][T11782] ? netlink_getsockopt+0x720/0x720 [ 2935.576748][T11782] ____sys_sendmsg+0x352/0x4c0 [ 2935.581524][T11782] ? import_iovec+0xb8/0xd0 [ 2935.586120][T11782] __sys_sendmsg+0x1ed/0x270 [ 2935.591187][T11782] ? __fsnotify_parent+0x32f/0x430 [ 2935.598259][T11782] ? get_pid_task+0x90/0xc0 [ 2935.602955][T11782] ? vfs_write+0x54d/0x7c0 [ 2935.609419][T11782] ? __fget_light+0x219/0x260 [ 2935.614168][T11782] ? fput+0x2d/0x130 [ 2935.618118][T11782] ? ksys_write+0x157/0x180 [ 2935.623103][T11782] __x64_sys_sendmsg+0x42/0x50 [ 2935.628242][T11782] do_syscall_64+0x39/0x80 [ 2935.633816][T11782] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2935.640613][T11782] RIP: 0033:0x45e219 [ 2935.644865][T11782] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2935.665133][T11782] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2935.674766][T11782] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2935.684482][T11782] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2935.692732][T11782] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.700849][T11782] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 2935.708829][T11782] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:22 executing program 0 (fault-call:14 fault-nth:27): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2936.013575][ T17] usb usb6-port1: attempt power cycle [ 2936.025402][T11784] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2936.062542][T11784] FAULT_INJECTION: forcing a failure. [ 2936.062542][T11784] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.094088][T11784] CPU: 1 PID: 11784 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2936.103737][T11784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2936.115087][T11784] Call Trace: [ 2936.118370][T11784] dump_stack+0x116/0x15d [ 2936.122706][T11784] should_fail+0x231/0x240 [ 2936.127145][T11784] ? __kernfs_new_node+0x71/0x350 [ 2936.132306][T11784] __should_failslab+0x81/0x90 [ 2936.137075][T11784] should_failslab+0x5/0x20 [ 2936.141603][T11784] kmem_cache_alloc+0x36/0x2e0 [ 2936.146371][T11784] __kernfs_new_node+0x71/0x350 [ 2936.151578][T11784] ? rb_insert_color+0x7e/0x2e0 [ 2936.156605][T11784] ? kernfs_link_sibling+0x21c/0x230 [ 2936.162133][T11784] ? kernfs_activate+0x2c5/0x2e0 [ 2936.167084][T11784] kernfs_new_node+0x5b/0xd0 [ 2936.171849][T11784] __kernfs_create_file+0x45/0x180 [ 2936.176963][T11784] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2936.182426][T11784] internal_create_group+0x2e4/0x850 [ 2936.187862][T11784] sysfs_create_groups+0x3d/0xf0 [ 2936.192897][T11784] device_add+0x693/0xe50 [ 2936.197335][T11784] netdev_register_kobject+0xfd/0x230 [ 2936.202824][T11784] register_netdevice+0xbcf/0x1060 [ 2936.207950][T11784] ipvlan_link_new+0x2a2/0x5d0 [ 2936.212792][T11784] rtnl_newlink+0xda6/0x13b0 [ 2936.217400][T11784] ? number+0xa03/0xb50 [ 2936.221618][T11784] ? format_decode+0x1d3/0x840 [ 2936.226621][T11784] ? widen_string+0x3a/0x280 [ 2936.231251][T11784] ? widen_string+0x3a/0x280 [ 2936.235880][T11784] ? aa_get_newest_label+0x74/0x250 [ 2936.241088][T11784] ? apparmor_capable+0xfe/0x160 [ 2936.246121][T11784] ? bpf_lsm_capable+0x5/0x10 [ 2936.250847][T11784] ? security_capable+0x91/0xa0 [ 2936.255715][T11784] ? __rcu_read_unlock+0x51/0x250 [ 2936.260849][T11784] ? ns_capable+0x79/0xa0 [ 2936.265198][T11784] ? rtnl_setlink+0x270/0x270 [ 2936.270005][T11784] rtnetlink_rcv_msg+0x723/0x7c0 [ 2936.275309][T11784] ? ___cache_free+0x3c/0x2f0 [ 2936.280008][T11784] ? ima_match_policy+0xa80/0xab0 [ 2936.285040][T11784] ? __kfree_skb+0xfe/0x150 [ 2936.289859][T11784] ? __kfree_skb+0xfe/0x150 [ 2936.294411][T11784] ? consume_skb+0x4b/0x160 [ 2936.299054][T11784] ? nlmon_xmit+0x47/0x50 [ 2936.303936][T11784] ? xmit_one+0x173/0x2e0 [ 2936.308333][T11784] ? local_bh_enable+0x1b/0x20 [ 2936.313211][T11784] ? __dev_queue_xmit+0xbf2/0x1500 [ 2936.318342][T11784] ? __skb_clone+0x2a9/0x2c0 [ 2936.323466][T11784] ? __rcu_read_unlock+0x51/0x250 [ 2936.328604][T11784] netlink_rcv_skb+0x13e/0x240 [ 2936.333387][T11784] ? rtnetlink_bind+0x60/0x60 [ 2936.338077][T11784] rtnetlink_rcv+0x18/0x20 [ 2936.342504][T11784] netlink_unicast+0x5df/0x6b0 [ 2936.347279][T11784] netlink_sendmsg+0x6f8/0x7c0 [ 2936.352072][T11784] ? netlink_getsockopt+0x720/0x720 [ 2936.357282][T11784] ____sys_sendmsg+0x352/0x4c0 [ 2936.362206][T11784] ? import_iovec+0xb8/0xd0 [ 2936.367371][T11784] __sys_sendmsg+0x1ed/0x270 [ 2936.372001][T11784] ? __fsnotify_parent+0x32f/0x430 [ 2936.377129][T11784] ? get_pid_task+0x90/0xc0 [ 2936.381678][T11784] ? vfs_write+0x54d/0x7c0 [ 2936.386195][T11784] ? __fget_light+0x219/0x260 [ 2936.390899][T11784] ? fput+0x2d/0x130 [ 2936.394837][T11784] ? ksys_write+0x157/0x180 [ 2936.399364][T11784] __x64_sys_sendmsg+0x42/0x50 [ 2936.404143][T11784] do_syscall_64+0x39/0x80 [ 2936.408566][T11784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2936.414622][T11784] RIP: 0033:0x45e219 [ 2936.418546][T11784] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2936.438598][T11784] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2936.447271][T11784] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2936.455373][T11784] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:22 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @ptr]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:22 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @ptr]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:22 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2936.463943][T11784] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2936.472490][T11784] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 2936.480978][T11784] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:23 executing program 0 (fault-call:14 fault-nth:28): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2936.697218][T11797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2936.712727][T11797] FAULT_INJECTION: forcing a failure. [ 2936.712727][T11797] name failslab, interval 1, probability 0, space 0, times 0 [ 2936.731443][T11797] CPU: 0 PID: 11797 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2936.741894][T11797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2936.752324][T11797] Call Trace: [ 2936.757225][T11797] dump_stack+0x116/0x15d [ 2936.763987][T11797] should_fail+0x231/0x240 [ 2936.770591][T11797] ? __kernfs_new_node+0x71/0x350 [ 2936.778633][T11797] __should_failslab+0x81/0x90 [ 2936.783887][T11797] should_failslab+0x5/0x20 [ 2936.790813][T11797] kmem_cache_alloc+0x36/0x2e0 [ 2936.797167][T11797] __kernfs_new_node+0x71/0x350 [ 2936.805384][T11797] ? rb_insert_color+0x7e/0x2e0 [ 2936.811855][T11797] ? kernfs_link_sibling+0x21c/0x230 [ 2936.818353][T11797] ? kernfs_activate+0x2c5/0x2e0 [ 2936.824575][T11797] kernfs_new_node+0x5b/0xd0 [ 2936.829600][T11797] __kernfs_create_file+0x45/0x180 [ 2936.837346][T11797] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2936.843689][T11797] internal_create_group+0x2e4/0x850 [ 2936.850286][T11797] sysfs_create_groups+0x3d/0xf0 [ 2936.856856][T11797] device_add+0x693/0xe50 [ 2936.861638][T11797] netdev_register_kobject+0xfd/0x230 [ 2936.869674][T11797] register_netdevice+0xbcf/0x1060 [ 2936.875735][T11797] ipvlan_link_new+0x2a2/0x5d0 [ 2936.881889][T11797] rtnl_newlink+0xda6/0x13b0 [ 2936.887341][T11797] ? widen_string+0x3a/0x280 [ 2936.893821][T11797] ? widen_string+0x3a/0x280 [ 2936.900378][T11797] ? aa_get_newest_label+0x74/0x250 [ 2936.908592][T11797] ? apparmor_capable+0xfe/0x160 [ 2936.914723][T11797] ? bpf_lsm_capable+0x5/0x10 [ 2936.919943][T11797] ? security_capable+0x91/0xa0 [ 2936.926420][T11797] ? __rcu_read_unlock+0x51/0x250 [ 2936.934315][T11797] ? ns_capable+0x79/0xa0 [ 2936.939271][T11797] ? rtnl_setlink+0x270/0x270 [ 2936.945529][T11797] rtnetlink_rcv_msg+0x723/0x7c0 [ 2936.950468][T11797] ? ___cache_free+0x3c/0x2f0 [ 2936.955364][T11797] ? ima_match_policy+0xa80/0xab0 [ 2936.960368][T11797] ? __kfree_skb+0xfe/0x150 [ 2936.964869][T11797] ? __kfree_skb+0xfe/0x150 [ 2936.969610][T11797] ? consume_skb+0x4b/0x160 [ 2936.974220][T11797] ? nlmon_xmit+0x47/0x50 [ 2936.978888][T11797] ? xmit_one+0x173/0x2e0 [ 2936.984154][T11797] ? local_bh_enable+0x1b/0x20 [ 2936.990029][T11797] ? __dev_queue_xmit+0xbf2/0x1500 [ 2936.997094][T11797] ? __skb_clone+0x2a9/0x2c0 [ 2937.003060][T11797] ? __rcu_read_unlock+0x51/0x250 [ 2937.008081][T11797] netlink_rcv_skb+0x13e/0x240 [ 2937.012986][T11797] ? rtnetlink_bind+0x60/0x60 [ 2937.018370][T11797] rtnetlink_rcv+0x18/0x20 [ 2937.023153][T11797] netlink_unicast+0x5df/0x6b0 [ 2937.028346][T11797] netlink_sendmsg+0x6f8/0x7c0 [ 2937.033278][T11797] ? netlink_getsockopt+0x720/0x720 [ 2937.038811][T11797] ____sys_sendmsg+0x352/0x4c0 [ 2937.043837][T11797] ? import_iovec+0xb8/0xd0 [ 2937.048635][T11797] __sys_sendmsg+0x1ed/0x270 [ 2937.053521][T11797] ? __fsnotify_parent+0x32f/0x430 [ 2937.058706][T11797] ? get_pid_task+0x90/0xc0 [ 2937.063230][T11797] ? vfs_write+0x54d/0x7c0 [ 2937.068174][T11797] ? __fget_light+0x219/0x260 [ 2937.072848][T11797] ? fput+0x2d/0x130 [ 2937.076797][T11797] ? ksys_write+0x157/0x180 [ 2937.081593][T11797] __x64_sys_sendmsg+0x42/0x50 [ 2937.088012][T11797] do_syscall_64+0x39/0x80 [ 2937.092505][T11797] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2937.098387][T11797] RIP: 0033:0x45e219 [ 2937.102614][T11797] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2937.122960][T11797] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2937.131616][T11797] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2937.139568][T11797] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:23 executing program 0 (fault-call:14 fault-nth:29): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2937.147614][T11797] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2937.155579][T11797] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 2937.163672][T11797] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2937.218587][T11802] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2937.230424][T11802] FAULT_INJECTION: forcing a failure. [ 2937.230424][T11802] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.246780][T11802] CPU: 0 PID: 11802 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2937.254008][ T17] usb 6-1: new high-speed USB device number 100 using dummy_hcd [ 2937.257974][T11802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2937.276984][T11802] Call Trace: [ 2937.280410][T11802] dump_stack+0x116/0x15d [ 2937.286557][T11802] should_fail+0x231/0x240 [ 2937.291376][T11802] ? __kernfs_new_node+0x71/0x350 [ 2937.298155][T11802] __should_failslab+0x81/0x90 [ 2937.304384][T11802] should_failslab+0x5/0x20 [ 2937.310765][T11802] kmem_cache_alloc+0x36/0x2e0 [ 2937.318124][T11802] __kernfs_new_node+0x71/0x350 [ 2937.324436][T11802] ? rb_insert_color+0x7e/0x2e0 [ 2937.329499][T11802] ? kernfs_link_sibling+0x21c/0x230 [ 2937.337576][T11802] ? kernfs_activate+0x2c5/0x2e0 [ 2937.342881][T11802] kernfs_new_node+0x5b/0xd0 [ 2937.350222][T11802] __kernfs_create_file+0x45/0x180 [ 2937.356478][T11802] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2937.362938][T11802] internal_create_group+0x2e4/0x850 [ 2937.369490][T11802] sysfs_create_groups+0x3d/0xf0 [ 2937.375306][T11802] device_add+0x693/0xe50 [ 2937.380248][T11802] netdev_register_kobject+0xfd/0x230 [ 2937.388571][T11802] register_netdevice+0xbcf/0x1060 [ 2937.395066][T11802] ipvlan_link_new+0x2a2/0x5d0 [ 2937.401253][T11802] rtnl_newlink+0xda6/0x13b0 [ 2937.405931][T11802] ? preempt_schedule_irq+0x43/0x80 [ 2937.412611][T11802] ? irqentry_exit_cond_resched+0x30/0x40 [ 2937.418372][T11802] ? irqentry_exit+0x2a/0x40 [ 2937.422966][T11802] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2937.429371][T11802] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2937.435533][T11802] ? aa_get_newest_label+0x74/0x250 [ 2937.440737][T11802] ? apparmor_capable+0xfe/0x160 [ 2937.445737][T11802] ? bpf_lsm_capable+0x5/0x10 [ 2937.450533][T11802] ? security_capable+0x91/0xa0 [ 2937.455371][T11802] ? __rcu_read_unlock+0x51/0x250 [ 2937.460566][T11802] ? ns_capable+0x79/0xa0 [ 2937.465007][T11802] ? rtnl_setlink+0x270/0x270 [ 2937.469726][T11802] rtnetlink_rcv_msg+0x723/0x7c0 [ 2937.474652][T11802] ? ___cache_free+0x3c/0x2f0 [ 2937.479404][T11802] ? ima_match_policy+0xa80/0xab0 [ 2937.484478][T11802] ? __kfree_skb+0xfe/0x150 [ 2937.489080][T11802] ? __kfree_skb+0xfe/0x150 [ 2937.493656][T11802] ? consume_skb+0x4b/0x160 [ 2937.498146][T11802] ? nlmon_xmit+0x47/0x50 [ 2937.502468][T11802] ? xmit_one+0x173/0x2e0 [ 2937.506793][T11802] ? local_bh_enable+0x1b/0x20 [ 2937.511659][T11802] ? __dev_queue_xmit+0xbf2/0x1500 [ 2937.516749][T11802] ? __skb_clone+0x2a9/0x2c0 [ 2937.521357][T11802] ? __rcu_read_unlock+0x51/0x250 [ 2937.526459][T11802] netlink_rcv_skb+0x13e/0x240 [ 2937.531219][T11802] ? rtnetlink_bind+0x60/0x60 [ 2937.536017][T11802] rtnetlink_rcv+0x18/0x20 [ 2937.540867][T11802] netlink_unicast+0x5df/0x6b0 [ 2937.545614][T11802] netlink_sendmsg+0x6f8/0x7c0 [ 2937.550380][T11802] ? netlink_getsockopt+0x720/0x720 [ 2937.555570][T11802] ____sys_sendmsg+0x352/0x4c0 [ 2937.560321][T11802] ? import_iovec+0xb8/0xd0 [ 2937.564815][T11802] __sys_sendmsg+0x1ed/0x270 [ 2937.569495][T11802] ? __fsnotify_parent+0x32f/0x430 [ 2937.574585][T11802] ? get_pid_task+0x90/0xc0 [ 2937.579224][T11802] ? vfs_write+0x54d/0x7c0 [ 2937.583624][T11802] ? __fget_light+0x219/0x260 [ 2937.588542][T11802] ? fput+0x2d/0x130 [ 2937.592513][T11802] ? __fpregs_load_activate+0x103/0x1f0 [ 2937.598217][T11802] __x64_sys_sendmsg+0x42/0x50 [ 2937.603389][T11802] do_syscall_64+0x39/0x80 [ 2937.608047][T11802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2937.614514][T11802] RIP: 0033:0x45e219 [ 2937.619922][T11802] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2937.640024][T11802] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2937.648635][T11802] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2937.656596][T11802] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:24 executing program 0 (fault-call:14 fault-nth:30): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2937.665020][T11802] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2937.673246][T11802] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 2937.681300][T11802] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2937.727471][T11804] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2937.738423][T11804] FAULT_INJECTION: forcing a failure. [ 2937.738423][T11804] name failslab, interval 1, probability 0, space 0, times 0 [ 2937.754127][T11804] CPU: 0 PID: 11804 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2937.764786][T11804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2937.775928][T11804] Call Trace: [ 2937.780364][T11804] dump_stack+0x116/0x15d [ 2937.785350][T11804] should_fail+0x231/0x240 [ 2937.791900][T11804] ? __kernfs_new_node+0x71/0x350 [ 2937.798372][T11804] __should_failslab+0x81/0x90 [ 2937.805001][T11804] should_failslab+0x5/0x20 [ 2937.811964][T11804] kmem_cache_alloc+0x36/0x2e0 [ 2937.817390][T11804] __kernfs_new_node+0x71/0x350 [ 2937.822900][T11804] ? rb_insert_color+0x29f/0x2e0 [ 2937.829831][T11804] ? kernfs_link_sibling+0x21c/0x230 [ 2937.837792][T11804] ? kernfs_activate+0x2c5/0x2e0 [ 2937.845442][T11804] kernfs_new_node+0x5b/0xd0 [ 2937.852192][T11804] __kernfs_create_file+0x45/0x180 [ 2937.858222][T11804] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2937.866186][T11804] internal_create_group+0x2e4/0x850 [ 2937.872499][T11804] sysfs_create_groups+0x3d/0xf0 [ 2937.879412][T11804] device_add+0x693/0xe50 [ 2937.886658][T11804] netdev_register_kobject+0xfd/0x230 [ 2937.893711][T11804] register_netdevice+0xbcf/0x1060 [ 2937.899179][T11804] ipvlan_link_new+0x2a2/0x5d0 [ 2937.905550][T11804] rtnl_newlink+0xda6/0x13b0 [ 2937.912601][T11804] ? __schedule+0x3c1/0x580 [ 2937.919675][T11804] ? __perf_event_task_sched_in+0x565/0x590 [ 2937.927869][T11804] ? widen_string+0x3a/0x280 [ 2937.932651][T11804] ? aa_get_newest_label+0x74/0x250 [ 2937.940417][T11804] ? apparmor_capable+0xfe/0x160 [ 2937.947899][T11804] ? bpf_lsm_capable+0x5/0x10 [ 2937.954530][T11804] ? security_capable+0x91/0xa0 [ 2937.961801][T11804] ? __rcu_read_unlock+0x51/0x250 [ 2937.968239][T11804] ? ns_capable+0x79/0xa0 [ 2937.972596][T11804] ? rtnl_setlink+0x270/0x270 [ 2937.977293][T11804] rtnetlink_rcv_msg+0x723/0x7c0 [ 2937.982386][T11804] ? ___cache_free+0x3c/0x2f0 [ 2937.987097][T11804] ? ima_match_policy+0xa80/0xab0 [ 2937.992300][T11804] ? __kfree_skb+0xfe/0x150 [ 2937.996793][T11804] ? __kfree_skb+0xfe/0x150 [ 2938.001401][T11804] ? consume_skb+0x4b/0x160 [ 2938.005935][T11804] ? nlmon_xmit+0x47/0x50 [ 2938.010243][T11804] ? xmit_one+0x173/0x2e0 [ 2938.014562][T11804] ? local_bh_enable+0x1b/0x20 [ 2938.019404][T11804] ? __dev_queue_xmit+0xbf2/0x1500 [ 2938.024539][T11804] ? __skb_clone+0x2a9/0x2c0 [ 2938.029218][T11804] ? __rcu_read_unlock+0x51/0x250 [ 2938.034339][T11804] netlink_rcv_skb+0x13e/0x240 [ 2938.039244][T11804] ? rtnetlink_bind+0x60/0x60 [ 2938.044223][T11804] rtnetlink_rcv+0x18/0x20 [ 2938.048620][T11804] netlink_unicast+0x5df/0x6b0 [ 2938.053539][T11804] netlink_sendmsg+0x6f8/0x7c0 [ 2938.058354][T11804] ? netlink_getsockopt+0x720/0x720 [ 2938.063540][T11804] ____sys_sendmsg+0x352/0x4c0 [ 2938.068309][T11804] ? import_iovec+0xb8/0xd0 [ 2938.073279][T11804] __sys_sendmsg+0x1ed/0x270 [ 2938.077906][T11804] ? __fsnotify_parent+0x32f/0x430 [ 2938.083185][T11804] ? get_pid_task+0x90/0xc0 [ 2938.087681][T11804] ? vfs_write+0x54d/0x7c0 [ 2938.092367][T11804] ? __fget_light+0x219/0x260 [ 2938.097050][T11804] ? fput+0x2d/0x130 [ 2938.100997][T11804] ? ksys_write+0x157/0x180 [ 2938.105499][T11804] __x64_sys_sendmsg+0x42/0x50 [ 2938.110302][T11804] do_syscall_64+0x39/0x80 [ 2938.114852][T11804] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2938.120724][T11804] RIP: 0033:0x45e219 [ 2938.124597][T11804] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2938.144633][T11804] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2938.153158][T11804] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2938.161658][T11804] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2938.169711][T11804] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:24 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:15:24 executing program 0 (fault-call:14 fault-nth:31): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2938.177953][T11804] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 2938.185917][T11804] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2938.252360][T11811] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2938.263072][T11811] FAULT_INJECTION: forcing a failure. [ 2938.263072][T11811] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.276782][T11811] CPU: 0 PID: 11811 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2938.285304][ T17] usb 6-1: device descriptor read/8, error -71 [ 2938.289369][T11811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.305755][T11811] Call Trace: [ 2938.309391][T11811] dump_stack+0x116/0x15d [ 2938.314260][T11811] should_fail+0x231/0x240 [ 2938.320446][T11811] ? __kernfs_new_node+0x71/0x350 [ 2938.327015][T11811] __should_failslab+0x81/0x90 [ 2938.332267][T11811] should_failslab+0x5/0x20 [ 2938.337577][T11811] kmem_cache_alloc+0x36/0x2e0 [ 2938.342566][T11811] __kernfs_new_node+0x71/0x350 [ 2938.347930][T11811] ? rb_insert_color+0x29f/0x2e0 [ 2938.353176][T11811] ? kernfs_link_sibling+0x21c/0x230 [ 2938.359811][T11811] ? kernfs_activate+0x2c5/0x2e0 [ 2938.364776][T11811] kernfs_new_node+0x5b/0xd0 [ 2938.371066][T11811] __kernfs_create_file+0x45/0x180 [ 2938.379061][T11811] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2938.387196][T11811] internal_create_group+0x2e4/0x850 [ 2938.393868][T11811] sysfs_create_groups+0x3d/0xf0 [ 2938.400562][T11811] device_add+0x693/0xe50 [ 2938.407036][T11811] netdev_register_kobject+0xfd/0x230 [ 2938.415046][T11811] register_netdevice+0xbcf/0x1060 [ 2938.421508][T11811] ipvlan_link_new+0x2a2/0x5d0 [ 2938.426617][T11811] rtnl_newlink+0xda6/0x13b0 [ 2938.431813][T11811] ? irqentry_exit+0x2a/0x40 [ 2938.436666][T11811] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2938.444592][T11811] ? prandom_u32_state+0x9/0x80 [ 2938.450669][T11811] ? widen_string+0x3a/0x280 [ 2938.455822][T11811] ? aa_get_newest_label+0x74/0x250 [ 2938.462562][T11811] ? apparmor_capable+0xfe/0x160 [ 2938.468008][T11811] ? bpf_lsm_capable+0x5/0x10 [ 2938.473310][T11811] ? security_capable+0x91/0xa0 [ 2938.478275][T11811] ? __rcu_read_unlock+0x51/0x250 [ 2938.484470][T11811] ? ns_capable+0x79/0xa0 [ 2938.491618][T11811] ? rtnl_setlink+0x270/0x270 [ 2938.496740][T11811] rtnetlink_rcv_msg+0x723/0x7c0 [ 2938.501707][T11811] ? ___cache_free+0x3c/0x2f0 [ 2938.506756][T11811] ? ima_match_policy+0xa80/0xab0 [ 2938.511783][T11811] ? __kfree_skb+0xfe/0x150 [ 2938.518228][T11811] ? __kfree_skb+0xfe/0x150 [ 2938.523010][T11811] ? consume_skb+0x4b/0x160 [ 2938.528280][T11811] ? nlmon_xmit+0x47/0x50 [ 2938.532809][T11811] ? xmit_one+0x173/0x2e0 [ 2938.537122][T11811] ? local_bh_enable+0x1b/0x20 [ 2938.542060][T11811] ? __dev_queue_xmit+0xbf2/0x1500 [ 2938.547240][T11811] ? __skb_clone+0x2a9/0x2c0 [ 2938.552010][T11811] ? __rcu_read_unlock+0x51/0x250 [ 2938.557122][T11811] netlink_rcv_skb+0x13e/0x240 [ 2938.562017][T11811] ? rtnetlink_bind+0x60/0x60 [ 2938.566833][T11811] rtnetlink_rcv+0x18/0x20 [ 2938.571229][T11811] netlink_unicast+0x5df/0x6b0 [ 2938.576095][T11811] netlink_sendmsg+0x6f8/0x7c0 [ 2938.580853][T11811] ? netlink_getsockopt+0x720/0x720 [ 2938.586165][T11811] ____sys_sendmsg+0x352/0x4c0 [ 2938.590919][T11811] ? import_iovec+0xb8/0xd0 [ 2938.595475][T11811] __sys_sendmsg+0x1ed/0x270 [ 2938.600222][T11811] ? __fsnotify_parent+0x32f/0x430 [ 2938.605324][T11811] ? get_pid_task+0x90/0xc0 [ 2938.610254][T11811] ? vfs_write+0x54d/0x7c0 [ 2938.614658][T11811] ? __fget_light+0x219/0x260 [ 2938.619524][T11811] ? fput+0x2d/0x130 [ 2938.623415][T11811] ? __fpregs_load_activate+0x103/0x1f0 [ 2938.630170][T11811] __x64_sys_sendmsg+0x42/0x50 [ 2938.634934][T11811] do_syscall_64+0x39/0x80 [ 2938.639510][T11811] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2938.645484][T11811] RIP: 0033:0x45e219 [ 2938.649460][T11811] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2938.669841][T11811] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2938.678411][T11811] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2938.686398][T11811] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2938.694431][T11811] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:25 executing program 0 (fault-call:14 fault-nth:32): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2938.702403][T11811] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 2938.710664][T11811] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2938.749939][T11813] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2938.764986][T11813] FAULT_INJECTION: forcing a failure. [ 2938.764986][T11813] name failslab, interval 1, probability 0, space 0, times 0 [ 2938.783540][T11813] CPU: 1 PID: 11813 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2938.794571][T11813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2938.805304][T11813] Call Trace: [ 2938.808587][T11813] dump_stack+0x116/0x15d [ 2938.815379][T11813] should_fail+0x231/0x240 [ 2938.820242][T11813] ? __kernfs_new_node+0x71/0x350 [ 2938.825308][T11813] __should_failslab+0x81/0x90 [ 2938.831881][T11813] should_failslab+0x5/0x20 [ 2938.837512][T11813] kmem_cache_alloc+0x36/0x2e0 [ 2938.842565][T11813] __kernfs_new_node+0x71/0x350 [ 2938.848107][T11813] ? rb_insert_color+0x2ac/0x2e0 [ 2938.854887][T11813] ? kernfs_link_sibling+0x21c/0x230 [ 2938.861996][T11813] ? kernfs_activate+0x2c5/0x2e0 [ 2938.866940][T11813] kernfs_new_node+0x5b/0xd0 [ 2938.872063][T11813] __kernfs_create_file+0x45/0x180 [ 2938.877309][T11813] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2938.883765][T11813] internal_create_group+0x2e4/0x850 [ 2938.890480][T11813] sysfs_create_groups+0x3d/0xf0 [ 2938.896668][T11813] device_add+0x693/0xe50 [ 2938.902489][T11813] netdev_register_kobject+0xfd/0x230 [ 2938.908907][T11813] register_netdevice+0xbcf/0x1060 [ 2938.914112][T11813] ipvlan_link_new+0x2a2/0x5d0 [ 2938.918855][T11813] rtnl_newlink+0xda6/0x13b0 [ 2938.923523][T11813] ? _raw_spin_unlock_irq+0x22/0x40 [ 2938.928815][T11813] ? finish_task_switch+0xc0/0x2a0 [ 2938.934558][T11813] ? __perf_event_task_sched_in+0x565/0x590 [ 2938.940449][T11813] ? kvm_sched_clock_read+0x15/0x40 [ 2938.945959][T11813] ? sched_clock+0xf/0x20 [ 2938.950333][T11813] ? widen_string+0x3a/0x280 [ 2938.954978][T11813] ? aa_get_newest_label+0x74/0x250 [ 2938.960202][T11813] ? apparmor_capable+0xfe/0x160 [ 2938.965243][T11813] ? bpf_lsm_capable+0x5/0x10 [ 2938.969943][T11813] ? security_capable+0x91/0xa0 [ 2938.974803][T11813] ? __rcu_read_unlock+0x51/0x250 [ 2938.979811][T11813] ? ns_capable+0x79/0xa0 [ 2938.984121][T11813] ? rtnl_setlink+0x270/0x270 [ 2938.988790][T11813] rtnetlink_rcv_msg+0x723/0x7c0 [ 2938.993739][T11813] ? ___cache_free+0x3c/0x2f0 [ 2938.998421][T11813] ? ima_match_policy+0xa80/0xab0 [ 2939.003489][T11813] ? __kfree_skb+0xfe/0x150 [ 2939.009007][T11813] ? __kfree_skb+0xfe/0x150 [ 2939.013555][T11813] ? consume_skb+0x4b/0x160 [ 2939.018106][T11813] ? nlmon_xmit+0x47/0x50 [ 2939.022516][T11813] ? xmit_one+0x173/0x2e0 [ 2939.026899][T11813] ? local_bh_enable+0x1b/0x20 [ 2939.032210][T11813] ? __dev_queue_xmit+0xbf2/0x1500 [ 2939.037489][T11813] ? __skb_clone+0x2a9/0x2c0 [ 2939.042294][T11813] ? __rcu_read_unlock+0x51/0x250 [ 2939.047301][T11813] netlink_rcv_skb+0x13e/0x240 [ 2939.052089][T11813] ? rtnetlink_bind+0x60/0x60 [ 2939.056789][T11813] rtnetlink_rcv+0x18/0x20 [ 2939.061238][T11813] netlink_unicast+0x5df/0x6b0 [ 2939.066047][T11813] netlink_sendmsg+0x6f8/0x7c0 [ 2939.070822][T11813] ? netlink_getsockopt+0x720/0x720 [ 2939.076013][T11813] ____sys_sendmsg+0x352/0x4c0 [ 2939.080838][T11813] ? import_iovec+0xb8/0xd0 [ 2939.085345][T11813] __sys_sendmsg+0x1ed/0x270 [ 2939.090149][T11813] ? __fsnotify_parent+0x32f/0x430 [ 2939.095255][T11813] ? get_pid_task+0x90/0xc0 [ 2939.099744][T11813] ? vfs_write+0x54d/0x7c0 [ 2939.104199][T11813] ? __fget_light+0x219/0x260 [ 2939.108881][T11813] ? fput+0x2d/0x130 [ 2939.112761][T11813] ? ksys_write+0x157/0x180 [ 2939.117300][T11813] __x64_sys_sendmsg+0x42/0x50 [ 2939.122237][T11813] do_syscall_64+0x39/0x80 [ 2939.126634][T11813] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2939.132787][T11813] RIP: 0033:0x45e219 [ 2939.136669][T11813] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2939.156518][T11813] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2939.165009][T11813] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2939.173389][T11813] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2939.181363][T11813] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.189319][T11813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 17:15:25 executing program 0 (fault-call:14 fault-nth:33): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2939.197355][T11813] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2939.248459][T11815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2939.260493][T11815] FAULT_INJECTION: forcing a failure. [ 2939.260493][T11815] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.278700][T11815] CPU: 1 PID: 11815 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2939.289831][T11815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.300058][T11815] Call Trace: [ 2939.304725][T11815] dump_stack+0x116/0x15d [ 2939.310320][T11815] should_fail+0x231/0x240 [ 2939.315254][T11815] ? __kernfs_new_node+0x71/0x350 [ 2939.320491][T11815] __should_failslab+0x81/0x90 [ 2939.326042][T11815] should_failslab+0x5/0x20 [ 2939.331033][T11815] kmem_cache_alloc+0x36/0x2e0 [ 2939.336082][T11815] __kernfs_new_node+0x71/0x350 [ 2939.341365][T11815] ? rb_insert_color+0x2c9/0x2e0 [ 2939.346312][T11815] ? kernfs_link_sibling+0x21c/0x230 [ 2939.352657][T11815] ? kernfs_activate+0x2c5/0x2e0 [ 2939.357862][T11815] kernfs_new_node+0x5b/0xd0 [ 2939.363266][T11815] __kernfs_create_file+0x45/0x180 [ 2939.369748][T11815] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2939.375131][T11815] internal_create_group+0x2e4/0x850 [ 2939.383135][T11815] sysfs_create_groups+0x3d/0xf0 [ 2939.388250][T11815] device_add+0x693/0xe50 [ 2939.393178][T11815] netdev_register_kobject+0xfd/0x230 [ 2939.398645][T11815] register_netdevice+0xbcf/0x1060 [ 2939.403918][T11815] ipvlan_link_new+0x2a2/0x5d0 [ 2939.408900][T11815] rtnl_newlink+0xda6/0x13b0 [ 2939.414543][T11815] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2939.421161][T11815] ? __perf_event_task_sched_in+0x565/0x590 [ 2939.427767][T11815] ? kvm_sched_clock_read+0x15/0x40 [ 2939.432986][T11815] ? sched_clock+0xf/0x20 [ 2939.437657][T11815] ? __perf_event_task_sched_in+0x565/0x590 [ 2939.444355][T11815] ? kvm_sched_clock_read+0x15/0x40 [ 2939.449627][T11815] ? sched_clock+0xf/0x20 [ 2939.454468][T11815] ? widen_string+0x3a/0x280 [ 2939.459658][T11815] ? aa_get_newest_label+0x74/0x250 [ 2939.466232][T11815] ? apparmor_capable+0xfe/0x160 [ 2939.471278][T11815] ? bpf_lsm_capable+0x5/0x10 [ 2939.477360][T11815] ? security_capable+0x91/0xa0 [ 2939.482440][T11815] ? __rcu_read_unlock+0x51/0x250 [ 2939.487743][T11815] ? ns_capable+0x79/0xa0 [ 2939.492987][T11815] ? rtnl_setlink+0x270/0x270 [ 2939.498338][T11815] rtnetlink_rcv_msg+0x723/0x7c0 [ 2939.503746][T11815] ? ___cache_free+0x3c/0x2f0 [ 2939.508751][T11815] ? ima_match_policy+0xa80/0xab0 [ 2939.514705][T11815] ? __kfree_skb+0xfe/0x150 [ 2939.519762][T11815] ? __kfree_skb+0xfe/0x150 [ 2939.524952][T11815] ? consume_skb+0x4b/0x160 [ 2939.530022][T11815] ? nlmon_xmit+0x47/0x50 [ 2939.535204][T11815] ? xmit_one+0x173/0x2e0 [ 2939.540107][T11815] ? local_bh_enable+0x1b/0x20 [ 2939.545144][T11815] ? __dev_queue_xmit+0xbf2/0x1500 17:15:26 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2939.550265][T11815] ? __skb_clone+0x2a9/0x2c0 [ 2939.557283][T11815] ? __rcu_read_unlock+0x51/0x250 [ 2939.563285][T11815] netlink_rcv_skb+0x13e/0x240 [ 2939.568803][T11815] ? rtnetlink_bind+0x60/0x60 [ 2939.573764][T11815] rtnetlink_rcv+0x18/0x20 [ 2939.578185][T11815] netlink_unicast+0x5df/0x6b0 [ 2939.583103][T11815] netlink_sendmsg+0x6f8/0x7c0 [ 2939.587872][T11815] ? netlink_getsockopt+0x720/0x720 [ 2939.593069][T11815] ____sys_sendmsg+0x352/0x4c0 [ 2939.598920][T11815] ? import_iovec+0xb8/0xd0 [ 2939.606068][T11815] __sys_sendmsg+0x1ed/0x270 [ 2939.611076][T11815] ? __fsnotify_parent+0x32f/0x430 [ 2939.616276][T11815] ? get_pid_task+0x90/0xc0 [ 2939.620902][T11815] ? vfs_write+0x54d/0x7c0 [ 2939.625439][T11815] ? __fget_light+0x219/0x260 [ 2939.630111][T11815] ? fput+0x2d/0x130 [ 2939.634033][T11815] ? ksys_write+0x157/0x180 [ 2939.638515][T11815] __x64_sys_sendmsg+0x42/0x50 [ 2939.643320][T11815] do_syscall_64+0x39/0x80 [ 2939.647720][T11815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2939.653642][T11815] RIP: 0033:0x45e219 [ 2939.657515][T11815] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2939.677199][T11815] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2939.685598][T11815] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2939.693573][T11815] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2939.701641][T11815] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2939.709824][T11815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 2939.717896][T11815] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:26 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:26 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:26 executing program 0 (fault-call:14 fault-nth:34): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2939.812894][ T17] usb 6-1: new high-speed USB device number 101 using dummy_hcd [ 2939.822269][T11829] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2939.834541][T11829] FAULT_INJECTION: forcing a failure. [ 2939.834541][T11829] name failslab, interval 1, probability 0, space 0, times 0 [ 2939.848904][T11829] CPU: 0 PID: 11829 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2939.859052][T11829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2939.869194][T11829] Call Trace: [ 2939.872626][T11829] dump_stack+0x116/0x15d [ 2939.877127][T11829] should_fail+0x231/0x240 [ 2939.881639][T11829] ? __kernfs_new_node+0x71/0x350 [ 2939.886663][T11829] __should_failslab+0x81/0x90 [ 2939.891862][T11829] should_failslab+0x5/0x20 [ 2939.896349][T11829] kmem_cache_alloc+0x36/0x2e0 [ 2939.901227][T11829] __kernfs_new_node+0x71/0x350 [ 2939.906280][T11829] ? rb_insert_color+0x28d/0x2e0 [ 2939.911218][T11829] ? kernfs_link_sibling+0x21c/0x230 [ 2939.916754][T11829] ? kernfs_activate+0x2c5/0x2e0 [ 2939.921679][T11829] kernfs_new_node+0x5b/0xd0 [ 2939.926254][T11829] __kernfs_create_file+0x45/0x180 [ 2939.931370][T11829] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2939.936746][T11829] internal_create_group+0x2e4/0x850 [ 2939.942193][T11829] sysfs_create_groups+0x3d/0xf0 [ 2939.947184][T11829] device_add+0x693/0xe50 [ 2939.951624][T11829] netdev_register_kobject+0xfd/0x230 [ 2939.957305][T11829] register_netdevice+0xbcf/0x1060 [ 2939.962419][T11829] ipvlan_link_new+0x2a2/0x5d0 [ 2939.967342][T11829] rtnl_newlink+0xda6/0x13b0 [ 2939.972178][T11829] ? prandom_u32_state+0x9/0x80 [ 2939.977147][T11829] ? widen_string+0x3a/0x280 [ 2939.981902][T11829] ? aa_get_newest_label+0x74/0x250 [ 2939.987239][T11829] ? apparmor_capable+0xfe/0x160 [ 2939.992180][T11829] ? bpf_lsm_capable+0x5/0x10 [ 2939.996913][T11829] ? security_capable+0x91/0xa0 [ 2940.001803][T11829] ? __rcu_read_unlock+0x51/0x250 [ 2940.007613][T11829] ? ns_capable+0x79/0xa0 [ 2940.011953][T11829] ? rtnl_setlink+0x270/0x270 [ 2940.016721][T11829] rtnetlink_rcv_msg+0x723/0x7c0 [ 2940.021854][T11829] ? ___cache_free+0x3c/0x2f0 [ 2940.026597][T11829] ? ima_match_policy+0xa80/0xab0 [ 2940.031669][T11829] ? __kfree_skb+0xfe/0x150 [ 2940.036177][T11829] ? __kfree_skb+0xfe/0x150 [ 2940.040693][T11829] ? consume_skb+0x4b/0x160 [ 2940.045177][T11829] ? nlmon_xmit+0x47/0x50 [ 2940.049490][T11829] ? xmit_one+0x173/0x2e0 [ 2940.053806][T11829] ? local_bh_enable+0x1b/0x20 [ 2940.058556][T11829] ? __dev_queue_xmit+0xbf2/0x1500 [ 2940.063904][T11829] ? __skb_clone+0x2a9/0x2c0 [ 2940.068488][T11829] ? __rcu_read_unlock+0x51/0x250 [ 2940.073502][T11829] netlink_rcv_skb+0x13e/0x240 [ 2940.078266][T11829] ? rtnetlink_bind+0x60/0x60 [ 2940.083618][T11829] rtnetlink_rcv+0x18/0x20 [ 2940.088078][T11829] netlink_unicast+0x5df/0x6b0 [ 2940.092938][T11829] netlink_sendmsg+0x6f8/0x7c0 [ 2940.097737][T11829] ? netlink_getsockopt+0x720/0x720 [ 2940.103137][T11829] ____sys_sendmsg+0x352/0x4c0 [ 2940.108636][T11829] ? import_iovec+0xb8/0xd0 [ 2940.113213][T11829] __sys_sendmsg+0x1ed/0x270 [ 2940.117795][T11829] ? __fsnotify_parent+0x32f/0x430 [ 2940.122939][T11829] ? get_pid_task+0x90/0xc0 [ 2940.127602][T11829] ? vfs_write+0x54d/0x7c0 [ 2940.132008][T11829] ? __fget_light+0x219/0x260 [ 2940.136673][T11829] ? fput+0x2d/0x130 [ 2940.140628][T11829] ? ksys_write+0x157/0x180 [ 2940.145197][T11829] __x64_sys_sendmsg+0x42/0x50 [ 2940.150057][T11829] do_syscall_64+0x39/0x80 [ 2940.154559][T11829] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2940.160465][T11829] RIP: 0033:0x45e219 [ 2940.164448][T11829] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2940.184051][T11829] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2940.193063][T11829] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2940.201993][T11829] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:26 executing program 0 (fault-call:14 fault-nth:35): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2940.210109][T11829] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2940.218388][T11829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 2940.226357][T11829] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2940.293509][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 2940.314229][T11831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2940.332747][T11831] FAULT_INJECTION: forcing a failure. [ 2940.332747][T11831] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.361772][T11831] CPU: 1 PID: 11831 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2940.371359][T11831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.382104][T11831] Call Trace: [ 2940.386730][T11831] dump_stack+0x116/0x15d [ 2940.392929][T11831] should_fail+0x231/0x240 [ 2940.397622][T11831] ? __kernfs_new_node+0x71/0x350 [ 2940.402679][T11831] __should_failslab+0x81/0x90 [ 2940.409441][T11831] should_failslab+0x5/0x20 [ 2940.415345][T11831] kmem_cache_alloc+0x36/0x2e0 [ 2940.421757][T11831] __kernfs_new_node+0x71/0x350 [ 2940.428703][T11831] ? rb_insert_color+0x28d/0x2e0 [ 2940.433838][T11831] ? kernfs_link_sibling+0x21c/0x230 [ 2940.440476][T11831] ? kernfs_activate+0x2c5/0x2e0 [ 2940.447269][T11831] kernfs_new_node+0x5b/0xd0 [ 2940.451911][T11831] __kernfs_create_file+0x45/0x180 [ 2940.458321][T11831] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2940.465981][T11831] internal_create_group+0x2e4/0x850 [ 2940.473433][T11831] sysfs_create_groups+0x3d/0xf0 [ 2940.480023][T11831] device_add+0x693/0xe50 [ 2940.484915][T11831] netdev_register_kobject+0xfd/0x230 [ 2940.493221][T11831] register_netdevice+0xbcf/0x1060 [ 2940.499475][T11831] ipvlan_link_new+0x2a2/0x5d0 [ 2940.504730][T11831] rtnl_newlink+0xda6/0x13b0 [ 2940.512181][T11831] ? kvm_sched_clock_read+0x15/0x40 [ 2940.518153][T11831] ? sched_clock+0xf/0x20 [ 2940.522988][T11831] ? sched_clock_cpu+0x11/0x1a0 [ 2940.527997][T11831] ? irqtime_account_irq+0x2d/0xa0 [ 2940.534504][T11831] ? irqentry_exit_cond_resched+0x22/0x40 [ 2940.541359][T11831] ? widen_string+0x3a/0x280 [ 2940.546224][T11831] ? widen_string+0x3a/0x280 [ 2940.553411][T11831] ? aa_get_newest_label+0x74/0x250 [ 2940.559408][T11831] ? apparmor_capable+0xfe/0x160 [ 2940.564561][T11831] ? bpf_lsm_capable+0x5/0x10 [ 2940.571966][T11831] ? security_capable+0x91/0xa0 [ 2940.577802][T11831] ? __rcu_read_unlock+0x51/0x250 [ 2940.583901][T11831] ? ns_capable+0x79/0xa0 [ 2940.588818][T11831] ? rtnl_setlink+0x270/0x270 [ 2940.595096][T11831] rtnetlink_rcv_msg+0x723/0x7c0 [ 2940.602868][T11831] ? ___cache_free+0x3c/0x2f0 [ 2940.607711][T11831] ? ima_match_policy+0xa80/0xab0 [ 2940.615326][T11831] ? __kfree_skb+0xfe/0x150 [ 2940.620220][T11831] ? __kfree_skb+0xfe/0x150 [ 2940.626725][T11831] ? consume_skb+0x4b/0x160 [ 2940.632199][T11831] ? nlmon_xmit+0x47/0x50 [ 2940.636722][T11831] ? xmit_one+0x173/0x2e0 [ 2940.641181][T11831] ? local_bh_enable+0x1b/0x20 [ 2940.645947][T11831] ? __dev_queue_xmit+0xbf2/0x1500 [ 2940.651060][T11831] ? __skb_clone+0x2a9/0x2c0 [ 2940.655631][T11831] ? __rcu_read_unlock+0x51/0x250 [ 2940.660650][T11831] netlink_rcv_skb+0x13e/0x240 [ 2940.665452][T11831] ? rtnetlink_bind+0x60/0x60 [ 2940.670203][T11831] rtnetlink_rcv+0x18/0x20 [ 2940.674677][T11831] netlink_unicast+0x5df/0x6b0 [ 2940.679487][T11831] netlink_sendmsg+0x6f8/0x7c0 [ 2940.684444][T11831] ? netlink_getsockopt+0x720/0x720 [ 2940.689637][T11831] ____sys_sendmsg+0x352/0x4c0 [ 2940.694504][T11831] ? import_iovec+0xb8/0xd0 [ 2940.699069][T11831] __sys_sendmsg+0x1ed/0x270 [ 2940.703889][T11831] ? __fsnotify_parent+0x32f/0x430 [ 2940.709198][T11831] ? get_pid_task+0x90/0xc0 [ 2940.713762][T11831] ? vfs_write+0x54d/0x7c0 [ 2940.718249][T11831] ? __fget_light+0x219/0x260 [ 2940.723059][T11831] ? fput+0x2d/0x130 [ 2940.727346][T11831] ? ksys_write+0x157/0x180 [ 2940.731929][T11831] __x64_sys_sendmsg+0x42/0x50 [ 2940.736749][T11831] do_syscall_64+0x39/0x80 [ 2940.741164][T11831] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2940.747200][T11831] RIP: 0033:0x45e219 [ 2940.751071][T11831] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2940.771505][T11831] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2940.780998][T11831] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2940.789700][T11831] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2940.797970][T11831] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:27 executing program 0 (fault-call:14 fault-nth:36): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2940.808897][T11831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 2940.820162][T11831] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2940.872142][ T17] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2940.882843][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2940.885658][T11833] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2940.893392][ T17] usb 6-1: config 0 has no interface number 0 [ 2940.910870][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2940.916418][T11833] FAULT_INJECTION: forcing a failure. [ 2940.916418][T11833] name failslab, interval 1, probability 0, space 0, times 0 [ 2940.922881][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2940.947593][ T17] usb 6-1: config 0 descriptor?? [ 2940.959665][T11833] CPU: 0 PID: 11833 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2940.968475][T11833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2940.978752][T11833] Call Trace: [ 2940.982058][T11833] dump_stack+0x116/0x15d [ 2940.987000][T11833] should_fail+0x231/0x240 [ 2940.991610][T11833] ? __kernfs_new_node+0x71/0x350 [ 2940.997146][T11833] __should_failslab+0x81/0x90 [ 2941.002058][T11833] should_failslab+0x5/0x20 [ 2941.006565][T11833] kmem_cache_alloc+0x36/0x2e0 [ 2941.011790][T11833] __kernfs_new_node+0x71/0x350 [ 2941.016648][T11833] ? rb_insert_color+0x7e/0x2e0 [ 2941.022021][T11833] ? kernfs_link_sibling+0x21c/0x230 [ 2941.028445][T11833] ? kernfs_activate+0x2c5/0x2e0 [ 2941.034045][T11833] kernfs_new_node+0x5b/0xd0 [ 2941.039392][T11833] __kernfs_create_file+0x45/0x180 [ 2941.045808][T11833] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2941.051190][T11833] internal_create_group+0x2e4/0x850 [ 2941.056475][T11833] sysfs_create_groups+0x3d/0xf0 [ 2941.061478][T11833] device_add+0x693/0xe50 [ 2941.066733][T11833] netdev_register_kobject+0xfd/0x230 [ 2941.072135][T11833] register_netdevice+0xbcf/0x1060 [ 2941.077297][T11833] ipvlan_link_new+0x2a2/0x5d0 [ 2941.082679][T11833] rtnl_newlink+0xda6/0x13b0 [ 2941.087273][T11833] ? number+0xa03/0xb50 [ 2941.091461][T11833] ? format_decode+0x1d3/0x840 [ 2941.096604][T11833] ? widen_string+0x3a/0x280 [ 2941.101196][T11833] ? widen_string+0x3a/0x280 [ 2941.107423][T11833] ? aa_get_newest_label+0x74/0x250 [ 2941.113777][T11833] ? apparmor_capable+0xfe/0x160 [ 2941.118718][T11833] ? bpf_lsm_capable+0x5/0x10 [ 2941.124985][T11833] ? security_capable+0x91/0xa0 [ 2941.131198][T11833] ? __rcu_read_unlock+0x51/0x250 [ 2941.137333][T11833] ? ns_capable+0x79/0xa0 [ 2941.142428][T11833] ? rtnl_setlink+0x270/0x270 [ 2941.147822][T11833] rtnetlink_rcv_msg+0x723/0x7c0 [ 2941.152859][T11833] ? ___cache_free+0x3c/0x2f0 [ 2941.158337][T11833] ? ima_match_policy+0xa80/0xab0 [ 2941.164135][T11833] ? __kfree_skb+0xfe/0x150 [ 2941.168964][T11833] ? __kfree_skb+0xfe/0x150 [ 2941.174192][T11833] ? consume_skb+0x4b/0x160 [ 2941.179178][T11833] ? nlmon_xmit+0x47/0x50 [ 2941.184382][T11833] ? xmit_one+0x173/0x2e0 [ 2941.189313][T11833] ? local_bh_enable+0x1b/0x20 [ 2941.194397][T11833] ? __dev_queue_xmit+0xbf2/0x1500 [ 2941.199565][T11833] ? __skb_clone+0x2a9/0x2c0 [ 2941.204698][T11833] ? __rcu_read_unlock+0x51/0x250 [ 2941.211196][T11833] netlink_rcv_skb+0x13e/0x240 [ 2941.216075][T11833] ? rtnetlink_bind+0x60/0x60 [ 2941.220869][T11833] rtnetlink_rcv+0x18/0x20 [ 2941.226035][T11833] netlink_unicast+0x5df/0x6b0 [ 2941.231082][T11833] netlink_sendmsg+0x6f8/0x7c0 [ 2941.236116][T11833] ? netlink_getsockopt+0x720/0x720 [ 2941.242161][T11833] ____sys_sendmsg+0x352/0x4c0 [ 2941.247277][T11833] ? import_iovec+0xb8/0xd0 [ 2941.252066][T11833] __sys_sendmsg+0x1ed/0x270 [ 2941.257018][T11833] ? __fsnotify_parent+0x32f/0x430 [ 2941.262267][T11833] ? get_pid_task+0x90/0xc0 [ 2941.267349][T11833] ? vfs_write+0x54d/0x7c0 [ 2941.272312][T11833] ? __fget_light+0x219/0x260 [ 2941.277692][T11833] ? fput+0x2d/0x130 [ 2941.282598][T11833] ? ksys_write+0x157/0x180 [ 2941.287697][T11833] __x64_sys_sendmsg+0x42/0x50 [ 2941.293091][T11833] do_syscall_64+0x39/0x80 [ 2941.297965][T11833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2941.303998][T11833] RIP: 0033:0x45e219 17:15:28 executing program 5: syz_usb_connect(0x1, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e4650e8d500000000000000000100000000090401"], 0x0) [ 2941.308859][T11833] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2941.328874][T11833] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2941.337717][T11833] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2941.346375][T11833] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2941.354340][T11833] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.362321][T11833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 17:15:28 executing program 0 (fault-call:14 fault-nth:37): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2941.371682][T11833] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2941.385917][ T17] usb 6-1: can't set config #0, error -71 [ 2941.395141][ T17] usb 6-1: USB disconnect, device number 101 [ 2941.443652][T11847] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2941.453435][T11847] FAULT_INJECTION: forcing a failure. [ 2941.453435][T11847] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.471771][T11847] CPU: 1 PID: 11847 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2941.481114][T11847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.491250][T11847] Call Trace: [ 2941.494517][T11847] dump_stack+0x116/0x15d [ 2941.499123][T11847] should_fail+0x231/0x240 [ 2941.503525][T11847] ? __kernfs_new_node+0x71/0x350 [ 2941.508538][T11847] __should_failslab+0x81/0x90 [ 2941.513406][T11847] should_failslab+0x5/0x20 [ 2941.517904][T11847] kmem_cache_alloc+0x36/0x2e0 [ 2941.522746][T11847] __kernfs_new_node+0x71/0x350 [ 2941.527678][T11847] ? rb_insert_color+0x2ac/0x2e0 [ 2941.532597][T11847] ? kernfs_link_sibling+0x21c/0x230 [ 2941.537899][T11847] ? kernfs_activate+0x2c5/0x2e0 [ 2941.542826][T11847] kernfs_new_node+0x5b/0xd0 [ 2941.547693][T11847] __kernfs_create_file+0x45/0x180 [ 2941.552782][T11847] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2941.558132][T11847] internal_create_group+0x2e4/0x850 [ 2941.564095][T11847] sysfs_create_groups+0x3d/0xf0 [ 2941.569036][T11847] device_add+0x693/0xe50 [ 2941.573360][T11847] netdev_register_kobject+0xfd/0x230 [ 2941.578761][T11847] register_netdevice+0xbcf/0x1060 [ 2941.583854][T11847] ipvlan_link_new+0x2a2/0x5d0 [ 2941.588699][T11847] rtnl_newlink+0xda6/0x13b0 [ 2941.593300][T11847] ? __perf_event_task_sched_in+0x565/0x590 [ 2941.599182][T11847] ? kvm_sched_clock_read+0x15/0x40 [ 2941.604446][T11847] ? sched_clock+0xf/0x20 [ 2941.608754][T11847] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2941.614258][T11847] ? __switch_to+0x14e/0x4c0 [ 2941.618870][T11847] ? widen_string+0x3a/0x280 [ 2941.623524][T11847] ? aa_get_newest_label+0x74/0x250 [ 2941.628768][T11847] ? apparmor_capable+0xfe/0x160 [ 2941.634730][T11847] ? bpf_lsm_capable+0x5/0x10 [ 2941.639543][T11847] ? security_capable+0x91/0xa0 [ 2941.644375][T11847] ? __rcu_read_unlock+0x51/0x250 [ 2941.649400][T11847] ? ns_capable+0x79/0xa0 [ 2941.653756][T11847] ? rtnl_setlink+0x270/0x270 [ 2941.658415][T11847] rtnetlink_rcv_msg+0x723/0x7c0 [ 2941.663342][T11847] ? ___cache_free+0x3c/0x2f0 [ 2941.668017][T11847] ? ima_match_policy+0xa80/0xab0 [ 2941.673035][T11847] ? __kfree_skb+0xfe/0x150 [ 2941.677576][T11847] ? __kfree_skb+0xfe/0x150 [ 2941.682058][T11847] ? consume_skb+0x4b/0x160 [ 2941.686539][T11847] ? nlmon_xmit+0x47/0x50 [ 2941.690891][T11847] ? xmit_one+0x173/0x2e0 [ 2941.695269][T11847] ? local_bh_enable+0x1b/0x20 [ 2941.700093][T11847] ? __dev_queue_xmit+0xbf2/0x1500 [ 2941.705245][T11847] ? __skb_clone+0x2a9/0x2c0 [ 2941.709826][T11847] ? __rcu_read_unlock+0x51/0x250 [ 2941.714884][T11847] netlink_rcv_skb+0x13e/0x240 [ 2941.719638][T11847] ? rtnetlink_bind+0x60/0x60 [ 2941.724294][T11847] rtnetlink_rcv+0x18/0x20 [ 2941.728768][T11847] netlink_unicast+0x5df/0x6b0 [ 2941.734037][T11847] netlink_sendmsg+0x6f8/0x7c0 [ 2941.738782][T11847] ? netlink_getsockopt+0x720/0x720 [ 2941.743961][T11847] ____sys_sendmsg+0x352/0x4c0 [ 2941.749241][T11847] ? import_iovec+0xb8/0xd0 [ 2941.753722][T11847] __sys_sendmsg+0x1ed/0x270 [ 2941.758515][T11847] ? __fsnotify_parent+0x32f/0x430 [ 2941.763713][T11847] ? get_pid_task+0x90/0xc0 [ 2941.768201][T11847] ? vfs_write+0x54d/0x7c0 [ 2941.772693][T11847] ? __fget_light+0x219/0x260 [ 2941.777352][T11847] ? fput+0x2d/0x130 [ 2941.781260][T11847] ? ksys_write+0x157/0x180 [ 2941.785906][T11847] __x64_sys_sendmsg+0x42/0x50 [ 2941.790665][T11847] do_syscall_64+0x39/0x80 [ 2941.795061][T11847] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2941.800981][T11847] RIP: 0033:0x45e219 [ 2941.804864][T11847] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2941.825011][T11847] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2941.833494][T11847] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:28 executing program 0 (fault-call:14 fault-nth:38): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2941.841710][T11847] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2941.849678][T11847] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2941.857759][T11847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 2941.868202][T11847] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2941.925465][T11849] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2941.938899][T11849] FAULT_INJECTION: forcing a failure. [ 2941.938899][T11849] name failslab, interval 1, probability 0, space 0, times 0 [ 2941.954224][T11849] CPU: 1 PID: 11849 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2941.963162][T11849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2941.976309][T11849] Call Trace: [ 2941.980427][T11849] dump_stack+0x116/0x15d [ 2941.986307][T11849] should_fail+0x231/0x240 [ 2941.990834][T11849] ? __kernfs_new_node+0x71/0x350 [ 2941.998128][T11849] __should_failslab+0x81/0x90 [ 2942.005467][T11849] should_failslab+0x5/0x20 [ 2942.010042][T11849] kmem_cache_alloc+0x36/0x2e0 [ 2942.015884][T11849] __kernfs_new_node+0x71/0x350 [ 2942.021675][T11849] ? rb_insert_color+0x2ac/0x2e0 [ 2942.027675][T11849] ? kernfs_link_sibling+0x21c/0x230 [ 2942.032999][T11849] ? kernfs_activate+0x2c5/0x2e0 [ 2942.038451][T11849] kernfs_new_node+0x5b/0xd0 [ 2942.043364][T11849] __kernfs_create_file+0x45/0x180 [ 2942.050781][T11849] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2942.056640][T11849] internal_create_group+0x2e4/0x850 [ 2942.064545][T11849] sysfs_create_groups+0x3d/0xf0 [ 2942.070652][T11849] device_add+0x693/0xe50 [ 2942.075681][T11849] netdev_register_kobject+0xfd/0x230 [ 2942.082005][T11849] register_netdevice+0xbcf/0x1060 [ 2942.087831][T11849] ipvlan_link_new+0x2a2/0x5d0 [ 2942.092719][T11849] rtnl_newlink+0xda6/0x13b0 [ 2942.098893][T11849] ? __perf_event_task_sched_in+0x565/0x590 [ 2942.105169][T11849] ? kvm_sched_clock_read+0x15/0x40 [ 2942.111283][T11849] ? sched_clock+0xf/0x20 [ 2942.115682][T11849] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2942.122006][T11849] ? widen_string+0x3a/0x280 [ 2942.127910][T11849] ? aa_get_newest_label+0x74/0x250 [ 2942.133186][T11849] ? apparmor_capable+0xfe/0x160 [ 2942.140473][T11849] ? bpf_lsm_capable+0x5/0x10 [ 2942.147461][T11849] ? security_capable+0x91/0xa0 [ 2942.154622][T11849] ? __rcu_read_unlock+0x51/0x250 [ 2942.161826][T11849] ? ns_capable+0x79/0xa0 [ 2942.166615][T11849] ? rtnl_setlink+0x270/0x270 [ 2942.172536][T11849] rtnetlink_rcv_msg+0x723/0x7c0 [ 2942.177797][T11849] ? ___cache_free+0x3c/0x2f0 [ 2942.184089][T11849] ? ima_match_policy+0xa80/0xab0 [ 2942.191951][T11849] ? __kfree_skb+0xfe/0x150 [ 2942.197077][T11849] ? __kfree_skb+0xfe/0x150 [ 2942.201981][T11849] ? consume_skb+0x4b/0x160 [ 2942.206895][T11849] ? nlmon_xmit+0x47/0x50 [ 2942.211522][T11849] ? xmit_one+0x173/0x2e0 [ 2942.217600][T11849] ? local_bh_enable+0x1b/0x20 [ 2942.223272][T11849] ? __dev_queue_xmit+0xbf2/0x1500 [ 2942.229364][T11849] ? __skb_clone+0x2a9/0x2c0 [ 2942.235261][T11849] ? __rcu_read_unlock+0x51/0x250 [ 2942.243034][T11849] netlink_rcv_skb+0x13e/0x240 [ 2942.248911][T11849] ? rtnetlink_bind+0x60/0x60 [ 2942.253584][T11849] rtnetlink_rcv+0x18/0x20 [ 2942.259647][T11849] netlink_unicast+0x5df/0x6b0 [ 2942.265416][T11849] netlink_sendmsg+0x6f8/0x7c0 [ 2942.271381][T11849] ? netlink_getsockopt+0x720/0x720 [ 2942.276587][T11849] ____sys_sendmsg+0x352/0x4c0 [ 2942.282652][T11849] ? import_iovec+0xb8/0xd0 [ 2942.287394][T11849] __sys_sendmsg+0x1ed/0x270 [ 2942.293385][T11849] ? __fsnotify_parent+0x32f/0x430 [ 2942.299906][T11849] ? get_pid_task+0x90/0xc0 [ 2942.305429][T11849] ? vfs_write+0x54d/0x7c0 [ 2942.310091][T11849] ? __fget_light+0x219/0x260 [ 2942.317499][T11849] ? fput+0x2d/0x130 [ 2942.323018][T11849] ? ksys_write+0x157/0x180 [ 2942.329662][T11849] __x64_sys_sendmsg+0x42/0x50 [ 2942.337035][T11849] do_syscall_64+0x39/0x80 [ 2942.343344][T11849] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2942.350758][T11849] RIP: 0033:0x45e219 [ 2942.356824][T11849] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:29 executing program 0 (fault-call:14 fault-nth:39): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2942.379928][T11849] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2942.388610][T11849] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2942.396694][T11849] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2942.404663][T11849] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2942.412625][T11849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 2942.420596][T11849] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2942.471984][T11851] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2942.482121][T11851] FAULT_INJECTION: forcing a failure. [ 2942.482121][T11851] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.497708][T11851] CPU: 1 PID: 11851 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2942.507753][T11851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.519132][T11851] Call Trace: [ 2942.525224][T11851] dump_stack+0x116/0x15d [ 2942.529578][T11851] should_fail+0x231/0x240 [ 2942.534853][T11851] ? __kernfs_new_node+0x71/0x350 [ 2942.540317][T11851] __should_failslab+0x81/0x90 [ 2942.545183][T11851] should_failslab+0x5/0x20 [ 2942.551071][T11851] kmem_cache_alloc+0x36/0x2e0 [ 2942.557126][T11851] __kernfs_new_node+0x71/0x350 [ 2942.562533][T11851] ? rb_insert_color+0x7e/0x2e0 [ 2942.567561][T11851] ? kernfs_link_sibling+0x21c/0x230 [ 2942.572971][T11851] ? kernfs_activate+0x2c5/0x2e0 [ 2942.578607][T11851] kernfs_new_node+0x5b/0xd0 [ 2942.583432][T11851] __kernfs_create_file+0x45/0x180 [ 2942.589418][T11851] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2942.594881][T11851] internal_create_group+0x2e4/0x850 [ 2942.601257][T11851] sysfs_create_groups+0x3d/0xf0 [ 2942.606575][T11851] device_add+0x693/0xe50 [ 2942.612695][T11851] netdev_register_kobject+0xfd/0x230 [ 2942.618329][T11851] register_netdevice+0xbcf/0x1060 [ 2942.623487][T11851] ipvlan_link_new+0x2a2/0x5d0 [ 2942.628674][T11851] rtnl_newlink+0xda6/0x13b0 [ 2942.634260][T11851] ? _raw_spin_unlock_irq+0x22/0x40 [ 2942.639447][T11851] ? finish_task_switch+0xc0/0x2a0 [ 2942.644746][T11851] ? __schedule+0x3c1/0x580 [ 2942.649251][T11851] ? widen_string+0x3a/0x280 [ 2942.653952][T11851] ? aa_get_newest_label+0x74/0x250 [ 2942.659152][T11851] ? apparmor_capable+0xfe/0x160 [ 2942.664192][T11851] ? bpf_lsm_capable+0x5/0x10 [ 2942.669997][T11851] ? security_capable+0x91/0xa0 [ 2942.675169][T11851] ? __rcu_read_unlock+0x51/0x250 [ 2942.681215][T11851] ? ns_capable+0x79/0xa0 [ 2942.687043][T11851] ? rtnl_setlink+0x270/0x270 [ 2942.692078][T11851] rtnetlink_rcv_msg+0x723/0x7c0 [ 2942.697252][T11851] ? ___cache_free+0x3c/0x2f0 [ 2942.702140][T11851] ? ima_match_policy+0xa80/0xab0 [ 2942.707272][T11851] ? __kfree_skb+0xfe/0x150 [ 2942.711786][T11851] ? __kfree_skb+0xfe/0x150 [ 2942.716667][T11851] ? consume_skb+0x4b/0x160 [ 2942.721788][T11851] ? nlmon_xmit+0x47/0x50 [ 2942.727047][T11851] ? xmit_one+0x173/0x2e0 [ 2942.732621][T11851] ? local_bh_enable+0x1b/0x20 [ 2942.739966][T11851] ? __dev_queue_xmit+0xbf2/0x1500 [ 2942.753139][T11851] ? __skb_clone+0x2a9/0x2c0 [ 2942.758180][T11851] ? __rcu_read_unlock+0x51/0x250 [ 2942.764044][T11851] netlink_rcv_skb+0x13e/0x240 17:15:29 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:29 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2942.771983][T11851] ? rtnetlink_bind+0x60/0x60 [ 2942.778189][T11851] rtnetlink_rcv+0x18/0x20 [ 2942.782828][T11851] netlink_unicast+0x5df/0x6b0 [ 2942.788283][T11851] netlink_sendmsg+0x6f8/0x7c0 [ 2942.793819][T11851] ? netlink_getsockopt+0x720/0x720 [ 2942.799047][T11851] ____sys_sendmsg+0x352/0x4c0 [ 2942.804182][T11851] ? import_iovec+0xb8/0xd0 [ 2942.809280][T11851] __sys_sendmsg+0x1ed/0x270 [ 2942.814174][T11851] ? __fsnotify_parent+0x32f/0x430 [ 2942.820377][T11851] ? get_pid_task+0x90/0xc0 [ 2942.827354][T11851] ? vfs_write+0x54d/0x7c0 [ 2942.832195][T11851] ? __fget_light+0x219/0x260 [ 2942.837437][T11851] ? fput+0x2d/0x130 [ 2942.841602][T11851] ? ksys_write+0x157/0x180 [ 2942.846094][T11851] __x64_sys_sendmsg+0x42/0x50 [ 2942.851222][T11851] do_syscall_64+0x39/0x80 [ 2942.855711][T11851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2942.862738][T11851] RIP: 0033:0x45e219 [ 2942.866725][T11851] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2942.888397][T11851] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2942.898640][T11851] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2942.907731][T11851] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2942.915881][T11851] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:29 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2942.924844][T11851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 2942.933077][T11851] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:29 executing program 0 (fault-call:14 fault-nth:40): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2943.022284][ T17] usb 6-1: new low-speed USB device number 102 using dummy_hcd [ 2943.034269][T11865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2943.047097][T11865] FAULT_INJECTION: forcing a failure. [ 2943.047097][T11865] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.063342][T11865] CPU: 0 PID: 11865 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2943.074486][T11865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.085551][T11865] Call Trace: [ 2943.088835][T11865] dump_stack+0x116/0x15d [ 2943.094286][T11865] should_fail+0x231/0x240 [ 2943.100601][T11865] ? __kernfs_new_node+0x71/0x350 [ 2943.106592][T11865] __should_failslab+0x81/0x90 [ 2943.111732][T11865] should_failslab+0x5/0x20 [ 2943.117086][T11865] kmem_cache_alloc+0x36/0x2e0 [ 2943.121968][T11865] __kernfs_new_node+0x71/0x350 [ 2943.127147][T11865] ? rb_insert_color+0x2ac/0x2e0 [ 2943.132253][T11865] ? kernfs_link_sibling+0x21c/0x230 [ 2943.138927][T11865] ? kernfs_activate+0x2c5/0x2e0 [ 2943.143988][T11865] kernfs_new_node+0x5b/0xd0 [ 2943.148778][T11865] __kernfs_create_file+0x45/0x180 [ 2943.154949][T11865] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2943.161450][T11865] internal_create_group+0x2e4/0x850 [ 2943.167853][T11865] sysfs_create_groups+0x3d/0xf0 [ 2943.173164][T11865] device_add+0x693/0xe50 [ 2943.178156][T11865] netdev_register_kobject+0xfd/0x230 [ 2943.183600][T11865] register_netdevice+0xbcf/0x1060 [ 2943.191742][T11865] ipvlan_link_new+0x2a2/0x5d0 [ 2943.196512][T11865] rtnl_newlink+0xda6/0x13b0 [ 2943.203105][T11865] ? check_preempt_wakeup+0x1cb/0x370 [ 2943.208543][T11865] ? _raw_spin_unlock+0x22/0x40 [ 2943.213569][T11865] ? __perf_event_task_sched_in+0x565/0x590 [ 2943.220048][T11865] ? kvm_sched_clock_read+0x15/0x40 [ 2943.225267][T11865] ? sched_clock+0xf/0x20 [ 2943.230123][T11865] ? widen_string+0x3a/0x280 [ 2943.234844][T11865] ? aa_get_newest_label+0x74/0x250 [ 2943.241432][T11865] ? apparmor_capable+0xfe/0x160 [ 2943.246374][T11865] ? bpf_lsm_capable+0x5/0x10 [ 2943.251237][T11865] ? security_capable+0x91/0xa0 [ 2943.256132][T11865] ? __rcu_read_unlock+0x51/0x250 [ 2943.261400][T11865] ? ns_capable+0x79/0xa0 [ 2943.266610][T11865] ? rtnl_setlink+0x270/0x270 [ 2943.271459][T11865] rtnetlink_rcv_msg+0x723/0x7c0 [ 2943.276605][T11865] ? ___cache_free+0x3c/0x2f0 [ 2943.281438][T11865] ? ima_match_policy+0xa80/0xab0 [ 2943.287913][T11865] ? __kfree_skb+0xfe/0x150 [ 2943.292781][T11865] ? __kfree_skb+0xfe/0x150 [ 2943.297549][T11865] ? consume_skb+0x4b/0x160 [ 2943.302514][T11865] ? nlmon_xmit+0x47/0x50 [ 2943.307866][T11865] ? xmit_one+0x173/0x2e0 [ 2943.312493][T11865] ? local_bh_enable+0x1b/0x20 [ 2943.317652][T11865] ? __dev_queue_xmit+0xbf2/0x1500 [ 2943.324189][T11865] ? __skb_clone+0x2a9/0x2c0 [ 2943.331061][T11865] ? __rcu_read_unlock+0x51/0x250 [ 2943.336409][T11865] netlink_rcv_skb+0x13e/0x240 [ 2943.341589][T11865] ? rtnetlink_bind+0x60/0x60 [ 2943.346578][T11865] rtnetlink_rcv+0x18/0x20 [ 2943.351239][T11865] netlink_unicast+0x5df/0x6b0 [ 2943.356238][T11865] netlink_sendmsg+0x6f8/0x7c0 [ 2943.361053][T11865] ? netlink_getsockopt+0x720/0x720 [ 2943.366318][T11865] ____sys_sendmsg+0x352/0x4c0 [ 2943.372707][T11865] ? import_iovec+0xb8/0xd0 [ 2943.377755][T11865] __sys_sendmsg+0x1ed/0x270 [ 2943.383384][T11865] ? __fsnotify_parent+0x32f/0x430 [ 2943.388604][T11865] ? get_pid_task+0x90/0xc0 [ 2943.393675][T11865] ? vfs_write+0x54d/0x7c0 [ 2943.398646][T11865] ? __fget_light+0x219/0x260 [ 2943.404646][T11865] ? fput+0x2d/0x130 [ 2943.409154][T11865] ? ksys_write+0x157/0x180 [ 2943.414282][T11865] __x64_sys_sendmsg+0x42/0x50 [ 2943.419287][T11865] do_syscall_64+0x39/0x80 [ 2943.424537][T11865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2943.431035][T11865] RIP: 0033:0x45e219 [ 2943.436351][T11865] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2943.458890][T11865] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:30 executing program 0 (fault-call:14 fault-nth:41): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2943.468182][T11865] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2943.476370][T11865] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2943.485289][T11865] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.493835][T11865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 2943.502042][T11865] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2943.549163][T11867] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2943.560159][T11867] FAULT_INJECTION: forcing a failure. [ 2943.560159][T11867] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.580266][T11867] CPU: 0 PID: 11867 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2943.589806][T11867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.600226][T11867] Call Trace: [ 2943.603582][T11867] dump_stack+0x116/0x15d [ 2943.608095][T11867] should_fail+0x231/0x240 [ 2943.612566][T11867] ? __kernfs_new_node+0x71/0x350 [ 2943.617688][T11867] __should_failslab+0x81/0x90 [ 2943.622602][T11867] should_failslab+0x5/0x20 [ 2943.627114][T11867] kmem_cache_alloc+0x36/0x2e0 [ 2943.631873][T11867] __kernfs_new_node+0x71/0x350 [ 2943.636735][T11867] ? rb_insert_color+0x2ac/0x2e0 [ 2943.641868][T11867] ? kernfs_link_sibling+0x21c/0x230 [ 2943.647163][T11867] ? kernfs_activate+0x2c5/0x2e0 [ 2943.652086][T11867] kernfs_new_node+0x5b/0xd0 [ 2943.656857][T11867] __kernfs_create_file+0x45/0x180 [ 2943.661962][T11867] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2943.667399][T11867] internal_create_group+0x2e4/0x850 [ 2943.672762][T11867] sysfs_create_groups+0x3d/0xf0 [ 2943.677695][T11867] device_add+0x693/0xe50 [ 2943.685757][T11867] netdev_register_kobject+0xfd/0x230 [ 2943.691117][T11867] register_netdevice+0xbcf/0x1060 [ 2943.696300][T11867] ipvlan_link_new+0x2a2/0x5d0 [ 2943.701160][T11867] rtnl_newlink+0xda6/0x13b0 [ 2943.705785][T11867] ? finish_task_switch+0xc0/0x2a0 [ 2943.711061][T11867] ? __schedule+0x3c1/0x580 [ 2943.715564][T11867] ? widen_string+0x3a/0x280 [ 2943.720428][T11867] ? aa_get_newest_label+0x74/0x250 [ 2943.725616][T11867] ? apparmor_capable+0xfe/0x160 [ 2943.730564][T11867] ? bpf_lsm_capable+0x5/0x10 [ 2943.735684][T11867] ? security_capable+0x91/0xa0 [ 2943.742125][T11867] ? __rcu_read_unlock+0x51/0x250 [ 2943.747425][T11867] ? ns_capable+0x79/0xa0 [ 2943.753837][T11867] ? rtnl_setlink+0x270/0x270 [ 2943.758957][T11867] rtnetlink_rcv_msg+0x723/0x7c0 [ 2943.764065][T11867] ? ___cache_free+0x3c/0x2f0 [ 2943.768965][T11867] ? ima_match_policy+0xa80/0xab0 [ 2943.774340][T11867] ? __kfree_skb+0xfe/0x150 [ 2943.778858][T11867] ? __kfree_skb+0xfe/0x150 [ 2943.783967][T11867] ? consume_skb+0x4b/0x160 [ 2943.788643][T11867] ? nlmon_xmit+0x47/0x50 [ 2943.793699][T11867] ? xmit_one+0x173/0x2e0 [ 2943.798714][T11867] ? local_bh_enable+0x1b/0x20 [ 2943.803622][T11867] ? __dev_queue_xmit+0xbf2/0x1500 [ 2943.808969][T11867] ? __skb_clone+0x2a9/0x2c0 [ 2943.813912][T11867] ? __rcu_read_unlock+0x51/0x250 [ 2943.819980][T11867] netlink_rcv_skb+0x13e/0x240 [ 2943.825475][T11867] ? rtnetlink_bind+0x60/0x60 [ 2943.830752][T11867] rtnetlink_rcv+0x18/0x20 [ 2943.840431][T11867] netlink_unicast+0x5df/0x6b0 [ 2943.845740][T11867] netlink_sendmsg+0x6f8/0x7c0 [ 2943.851384][T11867] ? netlink_getsockopt+0x720/0x720 [ 2943.856670][T11867] ____sys_sendmsg+0x352/0x4c0 [ 2943.861688][T11867] ? import_iovec+0xb8/0xd0 [ 2943.867489][T11867] __sys_sendmsg+0x1ed/0x270 [ 2943.872429][T11867] ? __fsnotify_parent+0x32f/0x430 [ 2943.878258][T11867] ? get_pid_task+0x90/0xc0 [ 2943.883822][T11867] ? vfs_write+0x54d/0x7c0 [ 2943.888256][T11867] ? __fget_light+0x219/0x260 [ 2943.892949][T11867] ? fput+0x2d/0x130 [ 2943.896839][T11867] ? ksys_write+0x157/0x180 [ 2943.901452][T11867] __x64_sys_sendmsg+0x42/0x50 [ 2943.906479][T11867] do_syscall_64+0x39/0x80 [ 2943.910901][T11867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2943.917093][T11867] RIP: 0033:0x45e219 [ 2943.921244][T11867] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2943.940833][T11867] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:30 executing program 0 (fault-call:14 fault-nth:42): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2943.949244][T11867] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2943.957217][T11867] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2943.965276][T11867] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.973325][T11867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 2943.981284][T11867] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2944.063071][T11869] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2944.075137][T11869] FAULT_INJECTION: forcing a failure. [ 2944.075137][T11869] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.090601][T11869] CPU: 1 PID: 11869 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2944.100602][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.112068][T11869] Call Trace: [ 2944.115516][T11869] dump_stack+0x116/0x15d [ 2944.121588][T11869] should_fail+0x231/0x240 [ 2944.127259][T11869] ? __kernfs_new_node+0x71/0x350 [ 2944.133151][T11869] __should_failslab+0x81/0x90 [ 2944.139237][T11869] should_failslab+0x5/0x20 [ 2944.143882][T11869] kmem_cache_alloc+0x36/0x2e0 [ 2944.150612][T11869] __kernfs_new_node+0x71/0x350 [ 2944.156730][T11869] ? rb_insert_color+0x7e/0x2e0 [ 2944.161583][T11869] ? kernfs_link_sibling+0x21c/0x230 [ 2944.167579][T11869] ? kernfs_activate+0x2c5/0x2e0 [ 2944.174001][T11869] kernfs_new_node+0x5b/0xd0 [ 2944.180459][T11869] __kernfs_create_file+0x45/0x180 [ 2944.186604][T11869] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2944.192541][T11869] internal_create_group+0x2e4/0x850 [ 2944.198478][T11869] sysfs_create_groups+0x3d/0xf0 [ 2944.204548][T11869] device_add+0x693/0xe50 [ 2944.208959][T11869] netdev_register_kobject+0xfd/0x230 [ 2944.216607][T11869] register_netdevice+0xbcf/0x1060 [ 2944.222386][T11869] ipvlan_link_new+0x2a2/0x5d0 [ 2944.228076][T11869] rtnl_newlink+0xda6/0x13b0 [ 2944.234080][T11869] ? irqentry_exit+0x2a/0x40 [ 2944.241322][T11869] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2944.247644][T11869] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2944.255388][T11869] ? aa_get_newest_label+0x74/0x250 [ 2944.261864][T11869] ? apparmor_capable+0xfe/0x160 [ 2944.266797][T11869] ? bpf_lsm_capable+0x5/0x10 [ 2944.271463][T11869] ? security_capable+0x91/0xa0 [ 2944.276351][T11869] ? __rcu_read_unlock+0x51/0x250 [ 2944.281477][T11869] ? ns_capable+0x79/0xa0 [ 2944.285888][T11869] ? rtnl_setlink+0x270/0x270 [ 2944.290582][T11869] rtnetlink_rcv_msg+0x723/0x7c0 [ 2944.295593][T11869] ? ___cache_free+0x3c/0x2f0 [ 2944.300269][T11869] ? ima_match_policy+0xa80/0xab0 [ 2944.305276][T11869] ? __kfree_skb+0xfe/0x150 [ 2944.309786][T11869] ? __kfree_skb+0xfe/0x150 [ 2944.314372][T11869] ? consume_skb+0x4b/0x160 [ 2944.318866][T11869] ? nlmon_xmit+0x47/0x50 [ 2944.324045][T11869] ? xmit_one+0x173/0x2e0 [ 2944.329094][T11869] ? local_bh_enable+0x1b/0x20 [ 2944.334257][T11869] ? __dev_queue_xmit+0xbf2/0x1500 [ 2944.339481][T11869] ? __skb_clone+0x2a9/0x2c0 [ 2944.344155][T11869] ? __rcu_read_unlock+0x51/0x250 [ 2944.349165][T11869] netlink_rcv_skb+0x13e/0x240 [ 2944.353997][T11869] ? rtnetlink_bind+0x60/0x60 [ 2944.358741][T11869] rtnetlink_rcv+0x18/0x20 [ 2944.363148][T11869] netlink_unicast+0x5df/0x6b0 [ 2944.368655][T11869] netlink_sendmsg+0x6f8/0x7c0 [ 2944.373955][T11869] ? netlink_getsockopt+0x720/0x720 [ 2944.379315][T11869] ____sys_sendmsg+0x352/0x4c0 [ 2944.384224][T11869] ? import_iovec+0xb8/0xd0 [ 2944.389091][T11869] __sys_sendmsg+0x1ed/0x270 [ 2944.393844][T11869] ? __fsnotify_parent+0x32f/0x430 [ 2944.403400][T11869] ? get_pid_task+0x90/0xc0 [ 2944.407958][T11869] ? vfs_write+0x54d/0x7c0 [ 2944.412371][T11869] ? __fget_light+0x219/0x260 [ 2944.417299][T11869] ? fput+0x2d/0x130 [ 2944.421187][T11869] ? ksys_write+0x157/0x180 [ 2944.426053][T11869] __x64_sys_sendmsg+0x42/0x50 [ 2944.431353][T11869] do_syscall_64+0x39/0x80 [ 2944.436365][T11869] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2944.442249][T11869] RIP: 0033:0x45e219 [ 2944.446134][T11869] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2944.465900][T11869] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2944.474310][T11869] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2944.482328][T11869] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2944.490520][T11869] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2944.498608][T11869] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 2944.506626][T11869] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:31 executing program 0 (fault-call:14 fault-nth:43): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:31 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r1 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x1, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r3 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r4 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000240)) ioctl$vim2m_VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r5 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x81, 0x482) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f0000000200)={0x4, 0xa7, &(0x7f00000002c0)="38b0aa1ac37bb33b5f2008d60ea7a2e78ce9564f5d0d54b565ea948b234bbce18cadf6995d2b8f012a4eca61d9ae62d06c9843eb6c2d171c70d5b5d00601068b10e90b2ea439c6687db81226a2f39586b6f11478da9f381d919af3c93b6b48fe21b0f316879aa12527087f03be480c0eca9bfe121db4440784706b6d57239d09b30a40d74e5c7a0ee8987bb6d98f6bec15c792e404e8a03c83e1a0ed1e9ab2c34a0b6cd523b090"}) syz_usb_connect(0x1, 0x2d, &(0x7f0000000180)=ANY=[@ANYRES16=r0, @ANYRESOCT=r4, @ANYRESOCT], 0x0) [ 2944.542876][ T17] usb 6-1: Invalid ep0 maxpacket: 32 [ 2944.595413][T11874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2944.609379][T11874] FAULT_INJECTION: forcing a failure. [ 2944.609379][T11874] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.622442][T11874] CPU: 1 PID: 11874 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2944.631764][T11874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.641983][T11874] Call Trace: [ 2944.646179][T11874] dump_stack+0x116/0x15d [ 2944.651057][T11874] should_fail+0x231/0x240 [ 2944.655568][T11874] ? __kernfs_new_node+0x71/0x350 [ 2944.661075][T11874] __should_failslab+0x81/0x90 [ 2944.665920][T11874] should_failslab+0x5/0x20 [ 2944.670554][T11874] kmem_cache_alloc+0x36/0x2e0 [ 2944.676218][T11874] __kernfs_new_node+0x71/0x350 [ 2944.681247][T11874] ? rb_insert_color+0x7e/0x2e0 [ 2944.686287][T11874] ? kernfs_link_sibling+0x21c/0x230 [ 2944.692885][T11874] ? kernfs_activate+0x2c5/0x2e0 [ 2944.697853][T11874] kernfs_new_node+0x5b/0xd0 [ 2944.702695][T11874] __kernfs_create_file+0x45/0x180 [ 2944.708949][T11874] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2944.715282][T11874] internal_create_group+0x2e4/0x850 [ 2944.724502][T11874] sysfs_create_groups+0x3d/0xf0 [ 2944.730215][T11874] device_add+0x693/0xe50 [ 2944.734594][T11874] netdev_register_kobject+0xfd/0x230 [ 2944.740055][T11874] register_netdevice+0xbcf/0x1060 [ 2944.747886][T11874] ipvlan_link_new+0x2a2/0x5d0 [ 2944.753456][T11874] rtnl_newlink+0xda6/0x13b0 [ 2944.758420][T11874] ? _raw_spin_unlock_irq+0x22/0x40 [ 2944.764849][T11874] ? finish_task_switch+0xc0/0x2a0 [ 2944.770970][T11874] ? __schedule+0x3c1/0x580 [ 2944.776472][T11874] ? widen_string+0x3a/0x280 [ 2944.782393][T11874] ? widen_string+0x3a/0x280 [ 2944.786988][T11874] ? aa_get_newest_label+0x74/0x250 [ 2944.792925][T11874] ? apparmor_capable+0xfe/0x160 [ 2944.799263][T11874] ? bpf_lsm_capable+0x5/0x10 [ 2944.805304][T11874] ? security_capable+0x91/0xa0 [ 2944.811531][T11874] ? __rcu_read_unlock+0x51/0x250 [ 2944.816803][T11874] ? ns_capable+0x79/0xa0 [ 2944.821546][T11874] ? rtnl_setlink+0x270/0x270 [ 2944.826502][T11874] rtnetlink_rcv_msg+0x723/0x7c0 [ 2944.833002][T11874] ? ___cache_free+0x3c/0x2f0 [ 2944.838443][T11874] ? ima_match_policy+0xa80/0xab0 [ 2944.844443][T11874] ? __kfree_skb+0xfe/0x150 [ 2944.849369][T11874] ? __kfree_skb+0xfe/0x150 [ 2944.854337][T11874] ? consume_skb+0x4b/0x160 [ 2944.859283][T11874] ? nlmon_xmit+0x47/0x50 [ 2944.863925][T11874] ? xmit_one+0x173/0x2e0 [ 2944.868587][T11874] ? local_bh_enable+0x1b/0x20 [ 2944.874744][T11874] ? __dev_queue_xmit+0xbf2/0x1500 [ 2944.880889][T11874] ? __skb_clone+0x2a9/0x2c0 [ 2944.886972][T11874] ? __rcu_read_unlock+0x51/0x250 [ 2944.893400][T11874] netlink_rcv_skb+0x13e/0x240 [ 2944.898241][T11874] ? rtnetlink_bind+0x60/0x60 [ 2944.902921][T11874] rtnetlink_rcv+0x18/0x20 [ 2944.907445][T11874] netlink_unicast+0x5df/0x6b0 [ 2944.912255][T11874] netlink_sendmsg+0x6f8/0x7c0 [ 2944.919773][T11874] ? netlink_getsockopt+0x720/0x720 [ 2944.926015][T11874] ____sys_sendmsg+0x352/0x4c0 [ 2944.930944][T11874] ? import_iovec+0xb8/0xd0 [ 2944.935498][T11874] __sys_sendmsg+0x1ed/0x270 [ 2944.941095][T11874] ? __fsnotify_parent+0x32f/0x430 [ 2944.947501][T11874] ? get_pid_task+0x90/0xc0 [ 2944.951991][T11874] ? vfs_write+0x54d/0x7c0 [ 2944.956591][T11874] ? __fget_light+0x219/0x260 [ 2944.961419][T11874] ? fput+0x2d/0x130 [ 2944.965364][T11874] ? ksys_write+0x157/0x180 [ 2944.969866][T11874] __x64_sys_sendmsg+0x42/0x50 [ 2944.974632][T11874] do_syscall_64+0x39/0x80 [ 2944.979048][T11874] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2944.985022][T11874] RIP: 0033:0x45e219 [ 2944.989032][T11874] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.009027][T11874] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2945.018482][T11874] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2945.027004][T11874] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2945.039623][T11874] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:31 executing program 0 (fault-call:14 fault-nth:44): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2945.047770][T11874] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 2945.055992][T11874] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2945.116194][T11879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2945.126335][T11879] FAULT_INJECTION: forcing a failure. [ 2945.126335][T11879] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.139345][T11879] CPU: 1 PID: 11879 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2945.148606][T11879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.158654][T11879] Call Trace: [ 2945.161917][T11879] dump_stack+0x116/0x15d [ 2945.166242][T11879] should_fail+0x231/0x240 [ 2945.170796][T11879] ? __kernfs_new_node+0x71/0x350 [ 2945.175814][T11879] __should_failslab+0x81/0x90 [ 2945.180564][T11879] should_failslab+0x5/0x20 [ 2945.185048][T11879] kmem_cache_alloc+0x36/0x2e0 [ 2945.189934][T11879] __kernfs_new_node+0x71/0x350 [ 2945.194787][T11879] ? rb_insert_color+0x7e/0x2e0 [ 2945.199627][T11879] ? kernfs_link_sibling+0x21c/0x230 [ 2945.204909][T11879] ? kernfs_activate+0x2c5/0x2e0 [ 2945.209928][T11879] kernfs_new_node+0x5b/0xd0 [ 2945.214505][T11879] __kernfs_create_file+0x45/0x180 [ 2945.219603][T11879] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2945.224986][T11879] internal_create_group+0x2e4/0x850 [ 2945.230373][T11879] sysfs_create_groups+0x3d/0xf0 [ 2945.235345][T11879] device_add+0x693/0xe50 [ 2945.239842][T11879] netdev_register_kobject+0xfd/0x230 [ 2945.245211][T11879] register_netdevice+0xbcf/0x1060 [ 2945.250318][T11879] ipvlan_link_new+0x2a2/0x5d0 [ 2945.255066][T11879] rtnl_newlink+0xda6/0x13b0 [ 2945.259648][T11879] ? irqentry_exit+0x2a/0x40 [ 2945.264249][T11879] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2945.270051][T11879] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2945.276243][T11879] ? aa_get_newest_label+0x74/0x250 [ 2945.281595][T11879] ? apparmor_capable+0xfe/0x160 [ 2945.286537][T11879] ? bpf_lsm_capable+0x5/0x10 [ 2945.291211][T11879] ? security_capable+0x91/0xa0 [ 2945.296233][T11879] ? __rcu_read_unlock+0x51/0x250 [ 2945.301370][T11879] ? ns_capable+0x79/0xa0 [ 2945.305696][T11879] ? rtnl_setlink+0x270/0x270 [ 2945.310540][T11879] rtnetlink_rcv_msg+0x723/0x7c0 [ 2945.315557][T11879] ? ___cache_free+0x3c/0x2f0 [ 2945.320756][T11879] ? ima_match_policy+0xa80/0xab0 [ 2945.325989][T11879] ? __kfree_skb+0xfe/0x150 [ 2945.330587][T11879] ? __kfree_skb+0xfe/0x150 [ 2945.335162][T11879] ? consume_skb+0x4b/0x160 [ 2945.339852][T11879] ? nlmon_xmit+0x47/0x50 [ 2945.344778][T11879] ? xmit_one+0x173/0x2e0 [ 2945.349112][T11879] ? local_bh_enable+0x1b/0x20 [ 2945.353958][T11879] ? __dev_queue_xmit+0xbf2/0x1500 [ 2945.359633][T11879] ? __skb_clone+0x2a9/0x2c0 [ 2945.364218][T11879] ? __rcu_read_unlock+0x51/0x250 [ 2945.369452][T11879] netlink_rcv_skb+0x13e/0x240 [ 2945.374207][T11879] ? rtnetlink_bind+0x60/0x60 [ 2945.378889][T11879] rtnetlink_rcv+0x18/0x20 [ 2945.383376][T11879] netlink_unicast+0x5df/0x6b0 [ 2945.388497][T11879] netlink_sendmsg+0x6f8/0x7c0 [ 2945.393287][T11879] ? netlink_getsockopt+0x720/0x720 [ 2945.398827][T11879] ____sys_sendmsg+0x352/0x4c0 [ 2945.403759][T11879] ? import_iovec+0xb8/0xd0 [ 2945.408249][T11879] __sys_sendmsg+0x1ed/0x270 [ 2945.412829][T11879] ? __fsnotify_parent+0x32f/0x430 [ 2945.417925][T11879] ? get_pid_task+0x90/0xc0 [ 2945.422418][T11879] ? vfs_write+0x54d/0x7c0 [ 2945.426954][T11879] ? __fget_light+0x219/0x260 [ 2945.431628][T11879] ? fput+0x2d/0x130 [ 2945.435586][T11879] ? ksys_write+0x157/0x180 [ 2945.440182][T11879] __x64_sys_sendmsg+0x42/0x50 [ 2945.445133][T11879] do_syscall_64+0x39/0x80 [ 2945.449708][T11879] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2945.455604][T11879] RIP: 0033:0x45e219 [ 2945.459579][T11879] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.479344][T11879] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2945.492236][T11879] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2945.500217][T11879] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2945.508175][T11879] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:32 executing program 0 (fault-call:14 fault-nth:45): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2945.516159][T11879] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 2945.524221][T11879] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2945.568385][T11881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2945.578883][T11881] FAULT_INJECTION: forcing a failure. [ 2945.578883][T11881] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.595151][T11881] CPU: 1 PID: 11881 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2945.604345][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.615001][T11881] Call Trace: [ 2945.618330][T11881] dump_stack+0x116/0x15d [ 2945.622677][T11881] should_fail+0x231/0x240 [ 2945.628142][T11881] ? __kernfs_new_node+0x71/0x350 [ 2945.634431][T11881] __should_failslab+0x81/0x90 [ 2945.640375][T11881] should_failslab+0x5/0x20 [ 2945.645180][T11881] kmem_cache_alloc+0x36/0x2e0 [ 2945.651631][T11881] __kernfs_new_node+0x71/0x350 [ 2945.657043][T11881] ? rb_insert_color+0x7e/0x2e0 [ 2945.661893][T11881] ? kernfs_link_sibling+0x21c/0x230 [ 2945.668842][T11881] ? kernfs_activate+0x2c5/0x2e0 [ 2945.675186][T11881] kernfs_new_node+0x5b/0xd0 [ 2945.681456][T11881] __kernfs_create_file+0x45/0x180 [ 2945.687985][T11881] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2945.694472][T11881] internal_create_group+0x2e4/0x850 [ 2945.700311][T11881] sysfs_create_groups+0x3d/0xf0 [ 2945.706568][T11881] device_add+0x693/0xe50 [ 2945.711653][T11881] netdev_register_kobject+0xfd/0x230 [ 2945.718294][T11881] register_netdevice+0xbcf/0x1060 [ 2945.723497][T11881] ipvlan_link_new+0x2a2/0x5d0 [ 2945.728487][T11881] rtnl_newlink+0xda6/0x13b0 [ 2945.734035][T11881] ? __schedule+0x3c1/0x580 [ 2945.740402][T11881] ? preempt_schedule_irq+0x43/0x80 [ 2945.745704][T11881] ? irqentry_exit_cond_resched+0x30/0x40 [ 2945.751805][T11881] ? irqentry_exit+0x2a/0x40 [ 2945.757003][T11881] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2945.762862][T11881] ? aa_get_newest_label+0x74/0x250 [ 2945.768469][T11881] ? apparmor_capable+0xfe/0x160 [ 2945.774773][T11881] ? bpf_lsm_capable+0x5/0x10 [ 2945.779694][T11881] ? security_capable+0x91/0xa0 [ 2945.784577][T11881] ? __rcu_read_unlock+0x51/0x250 [ 2945.790456][T11881] ? ns_capable+0x79/0xa0 [ 2945.795547][T11881] ? rtnl_setlink+0x270/0x270 [ 2945.800253][T11881] rtnetlink_rcv_msg+0x723/0x7c0 [ 2945.806775][T11881] ? ___cache_free+0x3c/0x2f0 [ 2945.811509][T11881] ? ima_match_policy+0xa80/0xab0 [ 2945.816637][T11881] ? __kfree_skb+0xfe/0x150 [ 2945.821328][T11881] ? __kfree_skb+0xfe/0x150 [ 2945.825916][T11881] ? consume_skb+0x4b/0x160 [ 2945.831669][T11881] ? nlmon_xmit+0x47/0x50 [ 2945.837036][T11881] ? xmit_one+0x173/0x2e0 [ 2945.841703][T11881] ? local_bh_enable+0x1b/0x20 [ 2945.846566][T11881] ? __dev_queue_xmit+0xbf2/0x1500 [ 2945.852666][T11881] ? __skb_clone+0x2a9/0x2c0 [ 2945.857359][T11881] ? __rcu_read_unlock+0x51/0x250 [ 2945.862467][T11881] netlink_rcv_skb+0x13e/0x240 [ 2945.868441][T11881] ? rtnetlink_bind+0x60/0x60 [ 2945.873455][T11881] rtnetlink_rcv+0x18/0x20 [ 2945.878054][T11881] netlink_unicast+0x5df/0x6b0 [ 2945.882822][T11881] netlink_sendmsg+0x6f8/0x7c0 [ 2945.888948][T11881] ? netlink_getsockopt+0x720/0x720 [ 2945.895453][T11881] ____sys_sendmsg+0x352/0x4c0 [ 2945.900348][T11881] ? import_iovec+0xb8/0xd0 [ 2945.904928][T11881] __sys_sendmsg+0x1ed/0x270 [ 2945.909577][T11881] ? __fsnotify_parent+0x32f/0x430 [ 2945.915741][T11881] ? get_pid_task+0x90/0xc0 [ 2945.920331][T11881] ? vfs_write+0x54d/0x7c0 [ 2945.924859][T11881] ? __fget_light+0x219/0x260 [ 2945.931049][T11881] ? fput+0x2d/0x130 [ 2945.935527][T11881] ? ksys_write+0x157/0x180 [ 2945.941219][T11881] __x64_sys_sendmsg+0x42/0x50 [ 2945.946152][T11881] do_syscall_64+0x39/0x80 [ 2945.951632][T11881] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2945.959003][T11881] RIP: 0033:0x45e219 [ 2945.963000][T11881] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.983985][T11881] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2945.993779][T11881] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2946.002185][T11881] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2946.010735][T11881] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:32 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:32 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @func, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:32 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:32 executing program 0 (fault-call:14 fault-nth:46): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2946.018755][T11881] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 2946.026859][T11881] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2946.039919][ T17] usb 6-1: new low-speed USB device number 103 using dummy_hcd [ 2946.116091][T11895] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2946.127814][T11895] FAULT_INJECTION: forcing a failure. [ 2946.127814][T11895] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.141339][T11895] CPU: 0 PID: 11895 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2946.150426][T11895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.160689][T11895] Call Trace: [ 2946.163969][T11895] dump_stack+0x116/0x15d [ 2946.168546][T11895] should_fail+0x231/0x240 [ 2946.172958][T11895] ? __kernfs_new_node+0x71/0x350 [ 2946.178534][T11895] __should_failslab+0x81/0x90 [ 2946.183447][T11895] should_failslab+0x5/0x20 [ 2946.188033][T11895] kmem_cache_alloc+0x36/0x2e0 [ 2946.192855][T11895] __kernfs_new_node+0x71/0x350 [ 2946.198154][T11895] ? rb_insert_color+0x7e/0x2e0 [ 2946.203378][T11895] ? kernfs_link_sibling+0x21c/0x230 [ 2946.208694][T11895] ? kernfs_activate+0x2c5/0x2e0 [ 2946.213793][T11895] kernfs_new_node+0x5b/0xd0 [ 2946.218421][T11895] __kernfs_create_file+0x45/0x180 [ 2946.223514][T11895] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2946.229220][T11895] internal_create_group+0x2e4/0x850 [ 2946.234851][T11895] sysfs_create_groups+0x3d/0xf0 [ 2946.239893][T11895] device_add+0x693/0xe50 [ 2946.244251][T11895] netdev_register_kobject+0xfd/0x230 [ 2946.249611][T11895] register_netdevice+0xbcf/0x1060 [ 2946.254717][T11895] ipvlan_link_new+0x2a2/0x5d0 [ 2946.259515][T11895] rtnl_newlink+0xda6/0x13b0 [ 2946.264091][T11895] ? number+0xa03/0xb50 [ 2946.273479][T11895] ? __perf_event_task_sched_in+0x565/0x590 [ 2946.279618][T11895] ? kvm_sched_clock_read+0x15/0x40 [ 2946.284804][T11895] ? sched_clock+0xf/0x20 [ 2946.289143][T11895] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2946.294684][T11895] ? widen_string+0x3a/0x280 [ 2946.299902][T11895] ? widen_string+0x3a/0x280 [ 2946.304771][T11895] ? aa_get_newest_label+0x74/0x250 [ 2946.309960][T11895] ? apparmor_capable+0xfe/0x160 [ 2946.314991][T11895] ? bpf_lsm_capable+0x5/0x10 [ 2946.319804][T11895] ? security_capable+0x91/0xa0 [ 2946.325940][T11895] ? __rcu_read_unlock+0x51/0x250 [ 2946.330954][T11895] ? ns_capable+0x79/0xa0 [ 2946.335486][T11895] ? rtnl_setlink+0x270/0x270 [ 2946.340453][T11895] rtnetlink_rcv_msg+0x723/0x7c0 [ 2946.345566][T11895] ? ___cache_free+0x3c/0x2f0 [ 2946.350677][T11895] ? ima_match_policy+0xa80/0xab0 [ 2946.355969][T11895] ? __kfree_skb+0xfe/0x150 [ 2946.360721][T11895] ? __kfree_skb+0xfe/0x150 [ 2946.365794][T11895] ? consume_skb+0x4b/0x160 [ 2946.370680][T11895] ? nlmon_xmit+0x47/0x50 [ 2946.375098][T11895] ? xmit_one+0x173/0x2e0 [ 2946.379426][T11895] ? local_bh_enable+0x1b/0x20 [ 2946.384369][T11895] ? __dev_queue_xmit+0xbf2/0x1500 [ 2946.389555][T11895] ? __skb_clone+0x2a9/0x2c0 [ 2946.394251][T11895] ? __rcu_read_unlock+0x51/0x250 [ 2946.399582][T11895] netlink_rcv_skb+0x13e/0x240 [ 2946.404351][T11895] ? rtnetlink_bind+0x60/0x60 [ 2946.409173][T11895] rtnetlink_rcv+0x18/0x20 [ 2946.414607][T11895] netlink_unicast+0x5df/0x6b0 [ 2946.419624][T11895] netlink_sendmsg+0x6f8/0x7c0 [ 2946.424837][T11895] ? netlink_getsockopt+0x720/0x720 [ 2946.431337][T11895] ____sys_sendmsg+0x352/0x4c0 [ 2946.436163][T11895] ? import_iovec+0xb8/0xd0 [ 2946.440782][T11895] __sys_sendmsg+0x1ed/0x270 [ 2946.445491][T11895] ? __fsnotify_parent+0x32f/0x430 [ 2946.450789][T11895] ? get_pid_task+0x90/0xc0 [ 2946.455436][T11895] ? vfs_write+0x54d/0x7c0 [ 2946.460064][T11895] ? __fget_light+0x219/0x260 [ 2946.465439][T11895] ? fput+0x2d/0x130 [ 2946.469680][T11895] ? ksys_write+0x157/0x180 [ 2946.474344][T11895] __x64_sys_sendmsg+0x42/0x50 [ 2946.479096][T11895] do_syscall_64+0x39/0x80 [ 2946.483651][T11895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2946.489567][T11895] RIP: 0033:0x45e219 [ 2946.493759][T11895] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:33 executing program 0 (fault-call:14 fault-nth:47): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2946.513784][T11895] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2946.522689][T11895] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2946.530833][T11895] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2946.538988][T11895] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.547367][T11895] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 2946.555674][T11895] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2946.599418][T11897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2946.611707][T11897] FAULT_INJECTION: forcing a failure. [ 2946.611707][T11897] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.626683][T11897] CPU: 0 PID: 11897 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2946.636226][T11897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.647507][T11897] Call Trace: [ 2946.651960][T11897] dump_stack+0x116/0x15d [ 2946.657488][T11897] should_fail+0x231/0x240 [ 2946.662637][T11897] ? __kernfs_new_node+0x71/0x350 [ 2946.668928][T11897] __should_failslab+0x81/0x90 [ 2946.676893][T11897] should_failslab+0x5/0x20 [ 2946.683524][T11897] kmem_cache_alloc+0x36/0x2e0 [ 2946.690141][T11897] __kernfs_new_node+0x71/0x350 [ 2946.695030][T11897] ? rb_insert_color+0x7e/0x2e0 [ 2946.701014][T11897] ? kernfs_link_sibling+0x21c/0x230 [ 2946.707152][T11897] ? kernfs_activate+0x2c5/0x2e0 [ 2946.712973][T11897] kernfs_new_node+0x5b/0xd0 [ 2946.718080][T11897] __kernfs_create_file+0x45/0x180 [ 2946.724197][T11897] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2946.730692][T11897] internal_create_group+0x2e4/0x850 [ 2946.736924][T11897] sysfs_create_groups+0x3d/0xf0 [ 2946.741866][T11897] device_add+0x693/0xe50 [ 2946.748027][T11897] netdev_register_kobject+0xfd/0x230 [ 2946.754050][T11897] register_netdevice+0xbcf/0x1060 [ 2946.759168][T11897] ipvlan_link_new+0x2a2/0x5d0 [ 2946.764103][T11897] rtnl_newlink+0xda6/0x13b0 [ 2946.768834][T11897] ? __perf_event_task_sched_in+0x565/0x590 [ 2946.775018][T11897] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2946.781646][T11897] ? __perf_event_task_sched_in+0x565/0x590 [ 2946.787809][T11897] ? widen_string+0x3a/0x280 [ 2946.792795][T11897] ? aa_get_newest_label+0x74/0x250 [ 2946.798949][T11897] ? apparmor_capable+0xfe/0x160 [ 2946.803950][T11897] ? bpf_lsm_capable+0x5/0x10 [ 2946.809034][T11897] ? security_capable+0x91/0xa0 [ 2946.814922][T11897] ? __rcu_read_unlock+0x51/0x250 [ 2946.820784][T11897] ? ns_capable+0x79/0xa0 [ 2946.826002][T11897] ? rtnl_setlink+0x270/0x270 [ 2946.830827][T11897] rtnetlink_rcv_msg+0x723/0x7c0 [ 2946.835876][T11897] ? ___cache_free+0x3c/0x2f0 [ 2946.840767][T11897] ? ima_match_policy+0xa80/0xab0 [ 2946.846677][T11897] ? __kfree_skb+0xfe/0x150 [ 2946.851604][T11897] ? __kfree_skb+0xfe/0x150 [ 2946.857707][T11897] ? consume_skb+0x4b/0x160 [ 2946.862577][T11897] ? nlmon_xmit+0x47/0x50 [ 2946.867442][T11897] ? xmit_one+0x173/0x2e0 [ 2946.872454][T11897] ? local_bh_enable+0x1b/0x20 [ 2946.878335][T11897] ? __dev_queue_xmit+0xbf2/0x1500 [ 2946.883863][T11897] ? __skb_clone+0x2a9/0x2c0 [ 2946.888502][T11897] ? __rcu_read_unlock+0x51/0x250 [ 2946.894015][T11897] netlink_rcv_skb+0x13e/0x240 [ 2946.899377][T11897] ? rtnetlink_bind+0x60/0x60 [ 2946.904763][T11897] rtnetlink_rcv+0x18/0x20 [ 2946.910926][T11897] netlink_unicast+0x5df/0x6b0 [ 2946.916385][T11897] netlink_sendmsg+0x6f8/0x7c0 [ 2946.921156][T11897] ? netlink_getsockopt+0x720/0x720 [ 2946.927475][T11897] ____sys_sendmsg+0x352/0x4c0 [ 2946.933531][T11897] ? import_iovec+0xb8/0xd0 [ 2946.940852][T11897] __sys_sendmsg+0x1ed/0x270 [ 2946.945714][T11897] ? __fsnotify_parent+0x32f/0x430 [ 2946.951875][T11897] ? get_pid_task+0x90/0xc0 [ 2946.956594][T11897] ? vfs_write+0x54d/0x7c0 [ 2946.961808][T11897] ? __fget_light+0x219/0x260 [ 2946.966726][T11897] ? fput+0x2d/0x130 [ 2946.971500][T11897] ? ksys_write+0x157/0x180 [ 2946.976159][T11897] __x64_sys_sendmsg+0x42/0x50 [ 2946.981022][T11897] do_syscall_64+0x39/0x80 [ 2946.986984][T11897] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2946.993330][T11897] RIP: 0033:0x45e219 [ 2946.997741][T11897] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2947.018757][T11897] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2947.028585][T11897] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2947.036850][T11897] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:33 executing program 0 (fault-call:14 fault-nth:48): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2947.045014][T11897] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2947.053124][T11897] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 2947.061133][T11897] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2947.083577][ T17] usb 6-1: device descriptor read/64, error 18 [ 2947.112743][T11899] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2947.122893][T11899] FAULT_INJECTION: forcing a failure. [ 2947.122893][T11899] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.135590][T11899] CPU: 0 PID: 11899 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2947.145262][T11899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.155426][T11899] Call Trace: [ 2947.158982][T11899] dump_stack+0x116/0x15d [ 2947.163306][T11899] should_fail+0x231/0x240 [ 2947.167793][T11899] ? __kernfs_new_node+0x71/0x350 [ 2947.172804][T11899] __should_failslab+0x81/0x90 [ 2947.177570][T11899] should_failslab+0x5/0x20 [ 2947.182084][T11899] kmem_cache_alloc+0x36/0x2e0 [ 2947.186898][T11899] __kernfs_new_node+0x71/0x350 [ 2947.191770][T11899] ? rb_insert_color+0x7e/0x2e0 [ 2947.196802][T11899] ? kernfs_link_sibling+0x21c/0x230 [ 2947.202116][T11899] ? kernfs_activate+0x2c5/0x2e0 [ 2947.207042][T11899] kernfs_new_node+0x5b/0xd0 [ 2947.211711][T11899] __kernfs_create_file+0x45/0x180 [ 2947.217008][T11899] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2947.222775][T11899] internal_create_group+0x2e4/0x850 [ 2947.228045][T11899] sysfs_create_groups+0x3d/0xf0 [ 2947.232976][T11899] device_add+0x693/0xe50 [ 2947.237379][T11899] netdev_register_kobject+0xfd/0x230 [ 2947.242774][T11899] register_netdevice+0xbcf/0x1060 [ 2947.248092][T11899] ipvlan_link_new+0x2a2/0x5d0 [ 2947.252853][T11899] rtnl_newlink+0xda6/0x13b0 [ 2947.257609][T11899] ? irqentry_exit+0x2a/0x40 [ 2947.262291][T11899] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2947.271410][T11899] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2947.277754][T11899] ? widen_string+0x3a/0x280 [ 2947.282434][T11899] ? aa_get_newest_label+0x74/0x250 [ 2947.287666][T11899] ? apparmor_capable+0xfe/0x160 [ 2947.292788][T11899] ? bpf_lsm_capable+0x5/0x10 [ 2947.297547][T11899] ? security_capable+0x91/0xa0 [ 2947.302492][T11899] ? __rcu_read_unlock+0x51/0x250 [ 2947.307603][T11899] ? ns_capable+0x79/0xa0 [ 2947.311934][T11899] ? rtnl_setlink+0x270/0x270 [ 2947.316680][T11899] rtnetlink_rcv_msg+0x723/0x7c0 [ 2947.323427][T11899] ? ___cache_free+0x3c/0x2f0 [ 2947.328790][T11899] ? ima_match_policy+0xa80/0xab0 [ 2947.334593][T11899] ? __kfree_skb+0xfe/0x150 [ 2947.342148][T11899] ? __kfree_skb+0xfe/0x150 [ 2947.350969][T11899] ? consume_skb+0x4b/0x160 [ 2947.356823][T11899] ? nlmon_xmit+0x47/0x50 [ 2947.361418][T11899] ? xmit_one+0x173/0x2e0 [ 2947.365887][T11899] ? local_bh_enable+0x1b/0x20 [ 2947.370657][T11899] ? __dev_queue_xmit+0xbf2/0x1500 [ 2947.375825][T11899] ? __skb_clone+0x2a9/0x2c0 [ 2947.380425][T11899] ? __rcu_read_unlock+0x51/0x250 [ 2947.385539][T11899] netlink_rcv_skb+0x13e/0x240 [ 2947.390385][T11899] ? rtnetlink_bind+0x60/0x60 [ 2947.395322][T11899] rtnetlink_rcv+0x18/0x20 [ 2947.401777][T11899] netlink_unicast+0x5df/0x6b0 [ 2947.406768][T11899] netlink_sendmsg+0x6f8/0x7c0 [ 2947.411662][T11899] ? netlink_getsockopt+0x720/0x720 [ 2947.416846][T11899] ____sys_sendmsg+0x352/0x4c0 [ 2947.421840][T11899] ? import_iovec+0xb8/0xd0 [ 2947.426372][T11899] __sys_sendmsg+0x1ed/0x270 [ 2947.430960][T11899] ? __fsnotify_parent+0x32f/0x430 [ 2947.436127][T11899] ? get_pid_task+0x90/0xc0 [ 2947.440684][T11899] ? vfs_write+0x54d/0x7c0 [ 2947.445101][T11899] ? __fget_light+0x219/0x260 [ 2947.449785][T11899] ? fput+0x2d/0x130 [ 2947.453848][T11899] ? ksys_write+0x157/0x180 [ 2947.458361][T11899] __x64_sys_sendmsg+0x42/0x50 [ 2947.463365][T11899] do_syscall_64+0x39/0x80 [ 2947.467962][T11899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2947.473973][T11899] RIP: 0033:0x45e219 [ 2947.478045][T11899] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2947.498186][T11899] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2947.510853][T11899] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2947.518811][T11899] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2947.526832][T11899] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2947.535344][T11899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 2947.543609][T11899] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:34 executing program 0 (fault-call:14 fault-nth:49): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:34 executing program 5: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x4, &(0x7f0000000380)=[{&(0x7f0000000080)="a8c01fb55b0cb17d7ae6b130f5b6bb9b2ce27ca9eb31e5caebaa396d28a0c985406e7d96d4", 0x25, 0x3ff}, {&(0x7f00000000c0)="fbeaa59b863e6893df4cea5821219139ea7e6b9c40287dd30843a8a5db766b20581c8cbfa6350ed86374ce9ca0b539a9cbe02a25f6da5e41f6d8fe1a73376adc6ab03e64769dff54928a493c30be5bfa33", 0x51, 0x9}, {&(0x7f0000000180)="c4c26221eb7dc9e7cb419b20746b20ec4171726c32ded6febfb552722869259b49f47ab0d77e9c9b1d33c7e42f8f369bd107e57e047cbd8494c101e23489b736e0a87f45a145ca65a28c296f1b0fcd6bef5784d4c303a49562ee324d11b2d95455f2f677fe33f64d6d43222bbe4f413a4f17a13b7b520cd922ce5c96559a97e6ffd4d78fbba276efb618c469a2352ce5efc49b8c1cf338481cbeec9e1fd9e5eccbb251a51b9b9a754368fc5843a1aa5707f35d22a11f6a490e777832eed58e4fb4172ce26f202b5d8c18aed4554997fb2bfee3bdd55d4640082c4f6e2f3769d08d3eb98f", 0xe4, 0x6a7}, {&(0x7f0000000280)="6b9ccaf1c8be5f35e62b66b3beef3fc957f219fe8bdf71ea4d1efbcd58d6e961cc418cfd720c3baef97c232a61a3f78212c3d4cd5bc9bc8fec2ab4259fe7fe4bb5e17dd6a1704a34a92c9c48829245093d996c3ea0296971a9d5a10496b6b23a8abdc2f0918b74457f91ce1f443b96bd0263f2a548994c9da2ddb2f48825164c1e225276a3e98e86ce9773954ba22f7c974e4819b2a04e980651e1a63ec703acbd35f0b2df18670afff1fe9fb1401f7bc598d1058b2d7120dcd885a0a08d8c3d7498af16bdbd7a3e4c2a967eb0f9ae28f794478616db3da1a78cb77f155443f502934185ece8629c6e578235d8cd8ab1554978", 0xf3, 0x5}], 0x188105c, &(0x7f0000000400)={[{'}}>%/^/$}{'}, {'['}, {'{!'}, {'$'}, {'^\\$\xb5(-'}], [{@subj_type={'subj_type', 0x3d, '.'}}, {@uid_lt={'uid<', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@subj_type={'subj_type', 0x3d, '//)'}}, {@subj_type={'subj_type', 0x3d, '\\('}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x36, 0x37, 0x62, 0x31, 0x35, 0x63, 0x32], 0x2d, [0x62, 0x30, 0x32, 0x37], 0x2d, [0x37, 0x39, 0x35, 0x64], 0x2d, [0x62, 0x63, 0x61, 0x32], 0x2d, [0x31, 0x61, 0x61, 0x0, 0x39, 0x39, 0xf]}}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, './/\x13\\(*'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) syz_usb_connect(0x0, 0x2d, &(0x7f00000004c0)=ANY=[@ANYBLOB="aae52f0184d7a4ab4cf1314e2b03ba5175340d363bba7b7d11302ecd0a634e508732ec65fd441d653fb73d72ae1158bf344dcdbf856fff84a8f6570228c6e1be9fa89a3aaedb78a58f6ffb6cc6ddc33dc0c163a58a524fd95939ef25ecd4f268334fdd04fd5e87e5402e901c42bf080050b95cd9ebe13eab615e881129339b5c7099db1a17ac0fcbb347327cb18aca8ac42188bef6c84f684a9841a32164ff98d16056616c1995b64abea99842dbc1f50bb70dc642e78f4d22eb6942b4697097156ee381321d4f39963a5349623b83e3e62919c67037e0d905b8fee044c0cbc40e8cb3"], 0x0) [ 2947.562146][ T17] usb usb6-port1: attempt power cycle [ 2947.606944][T11902] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2947.616689][T11902] FAULT_INJECTION: forcing a failure. [ 2947.616689][T11902] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.651151][T11902] CPU: 1 PID: 11902 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2947.661941][T11902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.672758][T11902] Call Trace: [ 2947.676905][T11902] dump_stack+0x116/0x15d [ 2947.681331][T11902] should_fail+0x231/0x240 [ 2947.686817][T11902] ? __kernfs_new_node+0x71/0x350 [ 2947.693347][T11902] __should_failslab+0x81/0x90 [ 2947.698810][T11902] should_failslab+0x5/0x20 [ 2947.703500][T11902] kmem_cache_alloc+0x36/0x2e0 [ 2947.709276][T11902] __kernfs_new_node+0x71/0x350 [ 2947.715028][T11902] ? rb_insert_color+0x7e/0x2e0 [ 2947.720499][T11902] ? kernfs_link_sibling+0x21c/0x230 [ 2947.727751][T11902] ? kernfs_activate+0x2c5/0x2e0 [ 2947.733981][T11902] kernfs_new_node+0x5b/0xd0 [ 2947.739675][T11902] __kernfs_create_file+0x45/0x180 [ 2947.745246][T11902] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2947.750922][T11902] internal_create_group+0x2e4/0x850 [ 2947.756383][T11902] sysfs_create_groups+0x3d/0xf0 [ 2947.762095][T11902] device_add+0x693/0xe50 [ 2947.766953][T11902] netdev_register_kobject+0xfd/0x230 [ 2947.773767][T11902] register_netdevice+0xbcf/0x1060 [ 2947.780083][T11902] ipvlan_link_new+0x2a2/0x5d0 [ 2947.785989][T11902] rtnl_newlink+0xda6/0x13b0 [ 2947.790713][T11902] ? kvm_sched_clock_read+0x15/0x40 [ 2947.797368][T11902] ? sched_clock+0xf/0x20 [ 2947.802957][T11902] ? sched_clock_cpu+0x11/0x1a0 [ 2947.807969][T11902] ? irqtime_account_irq+0x2d/0xa0 [ 2947.813460][T11902] ? irqentry_exit_cond_resched+0x22/0x40 [ 2947.820743][T11902] ? widen_string+0x3a/0x280 [ 2947.826142][T11902] ? aa_get_newest_label+0x74/0x250 [ 2947.831616][T11902] ? apparmor_capable+0xfe/0x160 [ 2947.837443][T11902] ? bpf_lsm_capable+0x5/0x10 [ 2947.843462][T11902] ? security_capable+0x91/0xa0 [ 2947.849071][T11902] ? __rcu_read_unlock+0x51/0x250 [ 2947.854712][T11902] ? ns_capable+0x79/0xa0 [ 2947.860466][T11902] ? rtnl_setlink+0x270/0x270 [ 2947.865688][T11902] rtnetlink_rcv_msg+0x723/0x7c0 [ 2947.871212][T11902] ? ___cache_free+0x3c/0x2f0 [ 2947.876775][T11902] ? ima_match_policy+0xa80/0xab0 [ 2947.882946][T11902] ? __kfree_skb+0xfe/0x150 [ 2947.888960][T11902] ? __kfree_skb+0xfe/0x150 [ 2947.894247][T11902] ? consume_skb+0x4b/0x160 [ 2947.899900][T11902] ? nlmon_xmit+0x47/0x50 [ 2947.904417][T11902] ? xmit_one+0x173/0x2e0 [ 2947.910352][T11902] ? local_bh_enable+0x1b/0x20 [ 2947.916511][T11902] ? __dev_queue_xmit+0xbf2/0x1500 [ 2947.923447][T11902] ? __skb_clone+0x2a9/0x2c0 [ 2947.928891][T11902] ? __rcu_read_unlock+0x51/0x250 [ 2947.935065][T11902] netlink_rcv_skb+0x13e/0x240 [ 2947.941066][T11902] ? rtnetlink_bind+0x60/0x60 [ 2947.946984][T11902] rtnetlink_rcv+0x18/0x20 [ 2947.952566][T11902] netlink_unicast+0x5df/0x6b0 [ 2947.958406][T11902] netlink_sendmsg+0x6f8/0x7c0 [ 2947.963431][T11902] ? netlink_getsockopt+0x720/0x720 [ 2947.969081][T11902] ____sys_sendmsg+0x352/0x4c0 [ 2947.973899][T11902] ? import_iovec+0xb8/0xd0 [ 2947.978505][T11902] __sys_sendmsg+0x1ed/0x270 [ 2947.983168][T11902] ? __fsnotify_parent+0x32f/0x430 [ 2947.988278][T11902] ? get_pid_task+0x90/0xc0 [ 2947.992896][T11902] ? vfs_write+0x54d/0x7c0 [ 2947.997912][T11902] ? __fget_light+0x219/0x260 [ 2948.002664][T11902] ? fput+0x2d/0x130 [ 2948.006557][T11902] ? ksys_write+0x157/0x180 [ 2948.011197][T11902] __x64_sys_sendmsg+0x42/0x50 [ 2948.016453][T11902] do_syscall_64+0x39/0x80 [ 2948.020961][T11902] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2948.027118][T11902] RIP: 0033:0x45e219 [ 2948.031014][T11902] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:34 executing program 0 (fault-call:14 fault-nth:50): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2948.051295][T11902] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2948.060832][T11902] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2948.070060][T11902] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2948.078020][T11902] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.086070][T11902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 2948.094035][T11902] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2948.162586][T11909] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2948.174077][T11909] FAULT_INJECTION: forcing a failure. [ 2948.174077][T11909] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.188388][T11909] CPU: 0 PID: 11909 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2948.198369][T11909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.208630][T11909] Call Trace: [ 2948.211996][T11909] dump_stack+0x116/0x15d [ 2948.216583][T11909] should_fail+0x231/0x240 [ 2948.221247][T11909] ? __kernfs_new_node+0x71/0x350 [ 2948.227476][T11909] __should_failslab+0x81/0x90 [ 2948.232391][T11909] should_failslab+0x5/0x20 [ 2948.238474][T11909] kmem_cache_alloc+0x36/0x2e0 [ 2948.243307][T11909] __kernfs_new_node+0x71/0x350 [ 2948.248203][T11909] ? rb_insert_color+0x28d/0x2e0 [ 2948.253229][T11909] ? kernfs_link_sibling+0x21c/0x230 [ 2948.258534][T11909] ? kernfs_activate+0x2c5/0x2e0 [ 2948.263493][T11909] kernfs_new_node+0x5b/0xd0 [ 2948.268119][T11909] __kernfs_create_file+0x45/0x180 [ 2948.274288][T11909] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2948.279752][T11909] internal_create_group+0x2e4/0x850 [ 2948.285719][T11909] sysfs_create_groups+0x3d/0xf0 [ 2948.290863][T11909] device_add+0x693/0xe50 [ 2948.295296][T11909] netdev_register_kobject+0xfd/0x230 [ 2948.300678][T11909] register_netdevice+0xbcf/0x1060 [ 2948.306121][T11909] ipvlan_link_new+0x2a2/0x5d0 [ 2948.310876][T11909] rtnl_newlink+0xda6/0x13b0 [ 2948.315563][T11909] ? irqentry_exit+0x2a/0x40 [ 2948.320238][T11909] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2948.327705][T11909] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2948.337177][T11909] ? aa_get_newest_label+0x74/0x250 [ 2948.342793][T11909] ? apparmor_capable+0xfe/0x160 [ 2948.348061][T11909] ? bpf_lsm_capable+0x5/0x10 [ 2948.352729][T11909] ? security_capable+0x91/0xa0 [ 2948.357658][T11909] ? __rcu_read_unlock+0x51/0x250 [ 2948.363072][T11909] ? ns_capable+0x79/0xa0 [ 2948.367463][T11909] ? rtnl_setlink+0x270/0x270 [ 2948.372430][T11909] rtnetlink_rcv_msg+0x723/0x7c0 [ 2948.377378][T11909] ? ___cache_free+0x3c/0x2f0 [ 2948.382048][T11909] ? ima_match_policy+0xa80/0xab0 [ 2948.387073][T11909] ? __kfree_skb+0xfe/0x150 [ 2948.391590][T11909] ? __kfree_skb+0xfe/0x150 [ 2948.396095][T11909] ? consume_skb+0x4b/0x160 [ 2948.401103][T11909] ? nlmon_xmit+0x47/0x50 [ 2948.406235][T11909] ? xmit_one+0x173/0x2e0 [ 2948.410592][T11909] ? local_bh_enable+0x1b/0x20 [ 2948.415441][T11909] ? __dev_queue_xmit+0xbf2/0x1500 [ 2948.420625][T11909] ? __skb_clone+0x2a9/0x2c0 [ 2948.425241][T11909] ? __rcu_read_unlock+0x51/0x250 [ 2948.430317][T11909] netlink_rcv_skb+0x13e/0x240 [ 2948.435093][T11909] ? rtnetlink_bind+0x60/0x60 [ 2948.439793][T11909] rtnetlink_rcv+0x18/0x20 [ 2948.444264][T11909] netlink_unicast+0x5df/0x6b0 [ 2948.449044][T11909] netlink_sendmsg+0x6f8/0x7c0 [ 2948.453807][T11909] ? netlink_getsockopt+0x720/0x720 [ 2948.459009][T11909] ____sys_sendmsg+0x352/0x4c0 [ 2948.463891][T11909] ? import_iovec+0xb8/0xd0 [ 2948.468505][T11909] __sys_sendmsg+0x1ed/0x270 [ 2948.473150][T11909] ? __fsnotify_parent+0x32f/0x430 [ 2948.478460][T11909] ? get_pid_task+0x90/0xc0 [ 2948.483958][T11909] ? vfs_write+0x54d/0x7c0 [ 2948.488881][T11909] ? __fget_light+0x219/0x260 [ 2948.494596][T11909] ? fput+0x2d/0x130 [ 2948.498504][T11909] ? ksys_write+0x157/0x180 [ 2948.503953][T11909] __x64_sys_sendmsg+0x42/0x50 [ 2948.509684][T11909] do_syscall_64+0x39/0x80 [ 2948.515755][T11909] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2948.522487][T11909] RIP: 0033:0x45e219 [ 2948.526553][T11909] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2948.547668][T11909] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2948.559101][T11909] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2948.568313][T11909] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2948.576948][T11909] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.585404][T11909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 2948.593591][T11909] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:35 executing program 0 (fault-call:14 fault-nth:51): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2948.788235][T11911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2948.798191][T11911] FAULT_INJECTION: forcing a failure. [ 2948.798191][T11911] name failslab, interval 1, probability 0, space 0, times 0 [ 2948.816875][T11911] CPU: 0 PID: 11911 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2948.827785][T11911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.838744][T11911] Call Trace: [ 2948.842222][T11911] dump_stack+0x116/0x15d [ 2948.846964][T11911] should_fail+0x231/0x240 [ 2948.851667][T11911] ? __kernfs_new_node+0x71/0x350 [ 2948.857391][T11911] __should_failslab+0x81/0x90 [ 2948.862260][T11911] should_failslab+0x5/0x20 [ 2948.866773][T11911] kmem_cache_alloc+0x36/0x2e0 [ 2948.871737][T11911] __kernfs_new_node+0x71/0x350 [ 2948.876590][T11911] ? rb_insert_color+0x28d/0x2e0 [ 2948.884210][T11911] ? kernfs_link_sibling+0x21c/0x230 [ 2948.889577][T11911] ? kernfs_activate+0x2c5/0x2e0 [ 2948.895532][T11911] kernfs_new_node+0x5b/0xd0 [ 2948.901517][T11911] __kernfs_create_file+0x45/0x180 [ 2948.908977][T11911] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2948.914521][T11911] internal_create_group+0x2e4/0x850 [ 2948.920320][T11911] sysfs_create_groups+0x3d/0xf0 [ 2948.925289][T11911] device_add+0x693/0xe50 [ 2948.929617][T11911] netdev_register_kobject+0xfd/0x230 [ 2948.935192][T11911] register_netdevice+0xbcf/0x1060 [ 2948.940320][T11911] ipvlan_link_new+0x2a2/0x5d0 [ 2948.945195][T11911] rtnl_newlink+0xda6/0x13b0 [ 2948.950113][T11911] ? update_sd_lb_stats+0x1db/0x730 [ 2948.955464][T11911] ? widen_string+0x3a/0x280 [ 2948.960085][T11911] ? widen_string+0x3a/0x280 [ 2948.964853][T11911] ? aa_get_newest_label+0x74/0x250 [ 2948.971080][T11911] ? apparmor_capable+0xfe/0x160 [ 2948.976368][T11911] ? bpf_lsm_capable+0x5/0x10 [ 2948.981970][T11911] ? security_capable+0x91/0xa0 [ 2948.986898][T11911] ? __rcu_read_unlock+0x51/0x250 [ 2948.991911][T11911] ? ns_capable+0x79/0xa0 [ 2948.996265][T11911] ? rtnl_setlink+0x270/0x270 [ 2949.000958][T11911] rtnetlink_rcv_msg+0x723/0x7c0 [ 2949.005911][T11911] ? ___cache_free+0x3c/0x2f0 [ 2949.010596][T11911] ? ima_match_policy+0xa80/0xab0 [ 2949.015871][T11911] ? __kfree_skb+0xfe/0x150 [ 2949.020362][T11911] ? __kfree_skb+0xfe/0x150 [ 2949.025404][T11911] ? consume_skb+0x4b/0x160 [ 2949.029935][T11911] ? nlmon_xmit+0x47/0x50 [ 2949.034690][T11911] ? xmit_one+0x173/0x2e0 [ 2949.039187][T11911] ? local_bh_enable+0x1b/0x20 [ 2949.044126][T11911] ? __dev_queue_xmit+0xbf2/0x1500 [ 2949.049365][T11911] ? __skb_clone+0x2a9/0x2c0 [ 2949.054213][T11911] ? __rcu_read_unlock+0x51/0x250 [ 2949.059271][T11911] netlink_rcv_skb+0x13e/0x240 [ 2949.064053][T11911] ? rtnetlink_bind+0x60/0x60 [ 2949.069345][T11911] rtnetlink_rcv+0x18/0x20 [ 2949.073762][T11911] netlink_unicast+0x5df/0x6b0 [ 2949.078514][T11911] netlink_sendmsg+0x6f8/0x7c0 [ 2949.083280][T11911] ? netlink_getsockopt+0x720/0x720 17:15:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2949.088468][T11911] ____sys_sendmsg+0x352/0x4c0 [ 2949.093249][T11911] ? import_iovec+0xb8/0xd0 [ 2949.097789][T11911] __sys_sendmsg+0x1ed/0x270 [ 2949.102388][T11911] ? __fsnotify_parent+0x32f/0x430 [ 2949.107527][T11911] ? get_pid_task+0x90/0xc0 [ 2949.112053][T11911] ? vfs_write+0x54d/0x7c0 [ 2949.116541][T11911] ? __fget_light+0x219/0x260 [ 2949.121227][T11911] ? fput+0x2d/0x130 [ 2949.125133][T11911] ? ksys_write+0x157/0x180 [ 2949.129650][T11911] __x64_sys_sendmsg+0x42/0x50 [ 2949.134438][T11911] do_syscall_64+0x39/0x80 [ 2949.138852][T11911] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.144737][T11911] RIP: 0033:0x45e219 [ 2949.148650][T11911] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.168398][T11911] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2949.176899][T11911] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:35 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:35 executing program 0 (fault-call:14 fault-nth:52): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:35 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:35 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2949.185320][T11911] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2949.193617][T11911] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.201678][T11911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 2949.210138][T11911] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2949.286361][T11920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2949.297759][ T17] usb 6-1: new high-speed USB device number 104 using dummy_hcd [ 2949.307643][T11920] FAULT_INJECTION: forcing a failure. [ 2949.307643][T11920] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.323935][T11920] CPU: 1 PID: 11920 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.333551][T11920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.344452][T11920] Call Trace: [ 2949.349020][T11920] dump_stack+0x116/0x15d [ 2949.353615][T11920] should_fail+0x231/0x240 [ 2949.358312][T11920] ? __kernfs_new_node+0x71/0x350 [ 2949.364916][T11920] __should_failslab+0x81/0x90 [ 2949.371060][T11920] should_failslab+0x5/0x20 [ 2949.376125][T11920] kmem_cache_alloc+0x36/0x2e0 [ 2949.381108][T11920] __kernfs_new_node+0x71/0x350 [ 2949.387273][T11920] ? rb_insert_color+0x29f/0x2e0 [ 2949.393230][T11920] ? kernfs_link_sibling+0x21c/0x230 [ 2949.399514][T11920] ? kernfs_activate+0x2c5/0x2e0 [ 2949.405657][T11920] kernfs_new_node+0x5b/0xd0 [ 2949.411864][T11920] __kernfs_create_file+0x45/0x180 [ 2949.418952][T11920] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2949.424829][T11920] internal_create_group+0x2e4/0x850 [ 2949.434495][T11920] sysfs_create_groups+0x3d/0xf0 [ 2949.440678][T11920] device_add+0x693/0xe50 [ 2949.445065][T11920] netdev_register_kobject+0xfd/0x230 [ 2949.450950][T11920] register_netdevice+0xbcf/0x1060 [ 2949.457345][T11920] ipvlan_link_new+0x2a2/0x5d0 [ 2949.462160][T11920] rtnl_newlink+0xda6/0x13b0 [ 2949.466835][T11920] ? number+0xa03/0xb50 [ 2949.470995][T11920] ? format_decode+0x1d3/0x840 [ 2949.476799][T11920] ? widen_string+0x3a/0x280 [ 2949.481556][T11920] ? widen_string+0x3a/0x280 [ 2949.486322][T11920] ? aa_get_newest_label+0x74/0x250 [ 2949.491520][T11920] ? apparmor_capable+0xfe/0x160 [ 2949.496797][T11920] ? bpf_lsm_capable+0x5/0x10 [ 2949.502899][T11920] ? security_capable+0x91/0xa0 [ 2949.508826][T11920] ? __rcu_read_unlock+0x51/0x250 [ 2949.514892][T11920] ? ns_capable+0x79/0xa0 [ 2949.521005][T11920] ? rtnl_setlink+0x270/0x270 [ 2949.526063][T11920] rtnetlink_rcv_msg+0x723/0x7c0 [ 2949.532277][T11920] ? ___cache_free+0x3c/0x2f0 17:15:36 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2949.537064][T11920] ? ima_match_policy+0xa80/0xab0 [ 2949.542098][T11920] ? __kfree_skb+0xfe/0x150 [ 2949.546810][T11920] ? __kfree_skb+0xfe/0x150 [ 2949.551691][T11920] ? consume_skb+0x4b/0x160 [ 2949.557080][T11920] ? nlmon_xmit+0x47/0x50 [ 2949.561523][T11920] ? xmit_one+0x173/0x2e0 [ 2949.566494][T11920] ? local_bh_enable+0x1b/0x20 [ 2949.571538][T11920] ? __dev_queue_xmit+0xbf2/0x1500 [ 2949.576742][T11920] ? __skb_clone+0x2a9/0x2c0 [ 2949.581328][T11920] ? __rcu_read_unlock+0x51/0x250 [ 2949.588534][T11920] netlink_rcv_skb+0x13e/0x240 [ 2949.593423][T11920] ? rtnetlink_bind+0x60/0x60 [ 2949.598699][T11920] rtnetlink_rcv+0x18/0x20 [ 2949.604090][T11920] netlink_unicast+0x5df/0x6b0 [ 2949.609376][T11920] netlink_sendmsg+0x6f8/0x7c0 [ 2949.614153][T11920] ? netlink_getsockopt+0x720/0x720 [ 2949.620201][T11920] ____sys_sendmsg+0x352/0x4c0 [ 2949.625257][T11920] ? import_iovec+0xb8/0xd0 [ 2949.629850][T11920] __sys_sendmsg+0x1ed/0x270 [ 2949.634836][T11920] ? __fsnotify_parent+0x32f/0x430 [ 2949.640884][T11920] ? get_pid_task+0x90/0xc0 [ 2949.645552][T11920] ? vfs_write+0x54d/0x7c0 [ 2949.650485][T11920] ? __fget_light+0x219/0x260 [ 2949.656815][T11920] ? fput+0x2d/0x130 [ 2949.661769][T11920] ? ksys_write+0x157/0x180 [ 2949.666367][T11920] __x64_sys_sendmsg+0x42/0x50 [ 2949.671264][T11920] do_syscall_64+0x39/0x80 [ 2949.676375][T11920] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2949.682772][T11920] RIP: 0033:0x45e219 [ 2949.687402][T11920] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.707465][T11920] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2949.716697][T11920] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2949.725812][T11920] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:36 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:36 executing program 0 (fault-call:14 fault-nth:53): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2949.735770][T11920] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.744927][T11920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 [ 2949.753514][T11920] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2949.760641][T11929] ptrace attach of "/root/syz-executor.4"[11928] was attempted by "/root/syz-executor.4"[11929] [ 2949.809339][T11934] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2949.823438][T11934] FAULT_INJECTION: forcing a failure. [ 2949.823438][T11934] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.840913][T11934] CPU: 0 PID: 11934 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2949.851558][T11934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.862754][T11934] Call Trace: [ 2949.866602][T11934] dump_stack+0x116/0x15d [ 2949.871572][T11934] should_fail+0x231/0x240 [ 2949.877408][T11934] ? __kernfs_new_node+0x71/0x350 [ 2949.883325][T11934] __should_failslab+0x81/0x90 [ 2949.888458][T11934] should_failslab+0x5/0x20 [ 2949.895253][T11934] kmem_cache_alloc+0x36/0x2e0 [ 2949.901089][T11934] __kernfs_new_node+0x71/0x350 [ 2949.907443][T11934] ? rb_insert_color+0x29f/0x2e0 [ 2949.912820][T11934] ? kernfs_link_sibling+0x21c/0x230 [ 2949.918740][T11934] ? kernfs_activate+0x2c5/0x2e0 [ 2949.924612][T11934] kernfs_new_node+0x5b/0xd0 [ 2949.929796][T11934] __kernfs_create_file+0x45/0x180 [ 2949.934924][T11934] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2949.940980][T11934] internal_create_group+0x2e4/0x850 [ 2949.946615][T11934] sysfs_create_groups+0x3d/0xf0 [ 2949.951992][T11934] device_add+0x693/0xe50 [ 2949.956661][T11934] netdev_register_kobject+0xfd/0x230 [ 2949.962565][T11934] register_netdevice+0xbcf/0x1060 [ 2949.968068][T11934] ipvlan_link_new+0x2a2/0x5d0 [ 2949.972836][T11934] rtnl_newlink+0xda6/0x13b0 [ 2949.977941][T11934] ? irqentry_exit+0x2a/0x40 [ 2949.983353][T11934] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2949.989261][T11934] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2949.996840][T11934] ? aa_get_newest_label+0x74/0x250 [ 2950.002418][T11934] ? apparmor_capable+0xfe/0x160 [ 2950.007452][T11934] ? bpf_lsm_capable+0x5/0x10 [ 2950.013535][T11934] ? security_capable+0x91/0xa0 [ 2950.019794][T11934] ? __rcu_read_unlock+0x51/0x250 [ 2950.024981][T11934] ? ns_capable+0x79/0xa0 [ 2950.029408][T11934] ? rtnl_setlink+0x270/0x270 [ 2950.034079][T11934] rtnetlink_rcv_msg+0x723/0x7c0 [ 2950.039381][T11934] ? ___cache_free+0x3c/0x2f0 [ 2950.044053][T11934] ? ima_match_policy+0xa80/0xab0 [ 2950.049668][T11934] ? __kfree_skb+0xfe/0x150 [ 2950.054170][T11934] ? __kfree_skb+0xfe/0x150 [ 2950.058709][T11934] ? consume_skb+0x4b/0x160 [ 2950.063828][T11934] ? nlmon_xmit+0x47/0x50 [ 2950.068470][T11934] ? xmit_one+0x173/0x2e0 [ 2950.072874][T11934] ? local_bh_enable+0x1b/0x20 [ 2950.077623][T11934] ? __dev_queue_xmit+0xbf2/0x1500 [ 2950.082885][T11934] ? __skb_clone+0x2a9/0x2c0 [ 2950.087467][T11934] ? __rcu_read_unlock+0x51/0x250 [ 2950.092577][T11934] netlink_rcv_skb+0x13e/0x240 [ 2950.097328][T11934] ? rtnetlink_bind+0x60/0x60 [ 2950.102106][T11934] rtnetlink_rcv+0x18/0x20 [ 2950.106588][T11934] netlink_unicast+0x5df/0x6b0 [ 2950.111338][T11934] netlink_sendmsg+0x6f8/0x7c0 [ 2950.116129][T11934] ? netlink_getsockopt+0x720/0x720 [ 2950.121586][T11934] ____sys_sendmsg+0x352/0x4c0 [ 2950.126356][T11934] ? import_iovec+0xb8/0xd0 [ 2950.130851][T11934] __sys_sendmsg+0x1ed/0x270 [ 2950.135453][T11934] ? __fsnotify_parent+0x32f/0x430 [ 2950.140587][T11934] ? get_pid_task+0x90/0xc0 [ 2950.145093][T11934] ? vfs_write+0x54d/0x7c0 [ 2950.149608][T11934] ? __fget_light+0x219/0x260 [ 2950.154264][T11934] ? fput+0x2d/0x130 [ 2950.158148][T11934] ? ksys_write+0x157/0x180 [ 2950.162810][T11934] __x64_sys_sendmsg+0x42/0x50 [ 2950.167692][T11934] do_syscall_64+0x39/0x80 [ 2950.172117][T11934] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2950.178159][T11934] RIP: 0033:0x45e219 [ 2950.182109][T11934] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:36 executing program 0 (fault-call:14 fault-nth:54): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2950.204300][T11934] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2950.212847][T11934] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2950.221006][T11934] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2950.229053][T11934] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.237295][T11934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000035 [ 2950.245471][T11934] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2950.296873][T11936] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2950.307678][T11936] FAULT_INJECTION: forcing a failure. [ 2950.307678][T11936] name failslab, interval 1, probability 0, space 0, times 0 [ 2950.312281][ T17] usb 6-1: device descriptor read/8, error -61 [ 2950.321454][T11936] CPU: 0 PID: 11936 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2950.337331][T11936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.349063][T11936] Call Trace: [ 2950.352713][T11936] dump_stack+0x116/0x15d [ 2950.357967][T11936] should_fail+0x231/0x240 [ 2950.364722][T11936] ? __kernfs_new_node+0x71/0x350 [ 2950.370522][T11936] __should_failslab+0x81/0x90 [ 2950.375976][T11936] should_failslab+0x5/0x20 [ 2950.381398][T11936] kmem_cache_alloc+0x36/0x2e0 [ 2950.386911][T11936] __kernfs_new_node+0x71/0x350 [ 2950.392052][T11936] ? rb_insert_color+0x29f/0x2e0 [ 2950.397667][T11936] ? kernfs_link_sibling+0x21c/0x230 [ 2950.403120][T11936] ? kernfs_activate+0x2c5/0x2e0 [ 2950.408779][T11936] kernfs_new_node+0x5b/0xd0 [ 2950.414395][T11936] __kernfs_create_file+0x45/0x180 [ 2950.419919][T11936] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2950.425303][T11936] internal_create_group+0x2e4/0x850 [ 2950.430857][T11936] sysfs_create_groups+0x3d/0xf0 [ 2950.435955][T11936] device_add+0x693/0xe50 [ 2950.440280][T11936] netdev_register_kobject+0xfd/0x230 [ 2950.445783][T11936] register_netdevice+0xbcf/0x1060 [ 2950.452838][T11936] ipvlan_link_new+0x2a2/0x5d0 [ 2950.458468][T11936] rtnl_newlink+0xda6/0x13b0 [ 2950.463670][T11936] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2950.470911][T11936] ? __perf_event_task_sched_in+0x565/0x590 [ 2950.479368][T11936] ? kvm_sched_clock_read+0x15/0x40 [ 2950.485836][T11936] ? sched_clock+0xf/0x20 [ 2950.491492][T11936] ? widen_string+0x3a/0x280 [ 2950.497090][T11936] ? aa_get_newest_label+0x74/0x250 [ 2950.502419][T11936] ? apparmor_capable+0xfe/0x160 [ 2950.508226][T11936] ? bpf_lsm_capable+0x5/0x10 [ 2950.514918][T11936] ? security_capable+0x91/0xa0 [ 2950.521426][T11936] ? __rcu_read_unlock+0x51/0x250 [ 2950.527406][T11936] ? ns_capable+0x79/0xa0 [ 2950.533858][T11936] ? rtnl_setlink+0x270/0x270 [ 2950.539551][T11936] rtnetlink_rcv_msg+0x723/0x7c0 [ 2950.544957][T11936] ? ___cache_free+0x3c/0x2f0 [ 2950.550634][T11936] ? kvm_sched_clock_read+0x15/0x40 [ 2950.556302][T11936] ? sched_clock+0xf/0x20 [ 2950.561861][T11936] ? __kfree_skb+0xfe/0x150 [ 2950.566468][T11936] ? __kfree_skb+0xfe/0x150 [ 2950.582373][T11936] ? consume_skb+0x4b/0x160 [ 2950.588991][T11936] ? nlmon_xmit+0x47/0x50 [ 2950.593381][T11936] ? rcu_preempt_deferred_qs_irqrestore+0x396/0x570 [ 2950.601911][T11936] ? __rcu_read_unlock+0xba/0x250 [ 2950.608373][T11936] netlink_rcv_skb+0x13e/0x240 [ 2950.613960][T11936] ? rtnetlink_bind+0x60/0x60 [ 2950.618865][T11936] rtnetlink_rcv+0x18/0x20 [ 2950.624494][T11936] netlink_unicast+0x5df/0x6b0 [ 2950.630086][T11936] netlink_sendmsg+0x6f8/0x7c0 [ 2950.635144][T11936] ? netlink_getsockopt+0x720/0x720 [ 2950.641045][T11936] ____sys_sendmsg+0x352/0x4c0 [ 2950.646695][T11936] ? import_iovec+0xb8/0xd0 [ 2950.651199][T11936] __sys_sendmsg+0x1ed/0x270 [ 2950.656043][T11936] ? __fsnotify_parent+0x32f/0x430 [ 2950.661143][T11936] ? get_pid_task+0x90/0xc0 [ 2950.665629][T11936] ? vfs_write+0x54d/0x7c0 [ 2950.670042][T11936] ? __fget_light+0x219/0x260 [ 2950.675277][T11936] ? fput+0x2d/0x130 [ 2950.679308][T11936] ? ksys_write+0x157/0x180 [ 2950.683798][T11936] __x64_sys_sendmsg+0x42/0x50 [ 2950.688667][T11936] do_syscall_64+0x39/0x80 [ 2950.693064][T11936] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2950.698950][T11936] RIP: 0033:0x45e219 [ 2950.702829][T11936] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.722654][T11936] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2950.731162][T11936] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2950.739154][T11936] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2950.747107][T11936] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.755076][T11936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000036 [ 2950.763057][T11936] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:37 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x402, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000000f14000426bd7000fbdbdf2508000300ffffffff08000300000800010040008000080003000200000007004500636d0000080001000000000008000310d189030000000800010001000000021730d6bdc167068faaa7df000400000000006c"], 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x400d5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @link_local}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) pipe(&(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@private}}, &(0x7f0000000280)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x80, 0x6f7, 0x1, @private1={0xfc, 0x1, [], 0x1}, @mcast1, 0x8000, 0x10, 0x4c24, 0x8}}) 17:15:37 executing program 0 (fault-call:14 fault-nth:55): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2950.853729][T11941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2950.868730][T11941] FAULT_INJECTION: forcing a failure. [ 2950.868730][T11941] name failslab, interval 1, probability 0, space 0, times 0 [ 2950.885868][T11941] CPU: 1 PID: 11941 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2950.895011][T11941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.905060][T11941] Call Trace: [ 2950.908344][T11941] dump_stack+0x116/0x15d [ 2950.913019][T11941] should_fail+0x231/0x240 [ 2950.917439][T11941] ? __kernfs_new_node+0x71/0x350 [ 2950.922580][T11941] __should_failslab+0x81/0x90 [ 2950.927339][T11941] should_failslab+0x5/0x20 [ 2950.931822][T11941] kmem_cache_alloc+0x36/0x2e0 [ 2950.936717][T11941] __kernfs_new_node+0x71/0x350 [ 2950.941593][T11941] ? idr_alloc_cyclic+0x249/0x2c0 [ 2950.946744][T11941] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 2950.952544][T11941] ? security_kernfs_init_security+0x7b/0x90 [ 2950.958531][T11941] ? rb_insert_color+0x7e/0x2e0 [ 2950.963388][T11941] kernfs_new_node+0x5b/0xd0 [ 2950.967981][T11941] __kernfs_create_file+0x45/0x180 [ 2950.973102][T11941] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2950.978467][T11941] internal_create_group+0x2e4/0x850 [ 2950.983778][T11941] sysfs_create_groups+0x3d/0xf0 [ 2950.988705][T11941] device_add+0x6fe/0xe50 [ 2950.993086][T11941] netdev_register_kobject+0xfd/0x230 [ 2950.998593][T11941] register_netdevice+0xbcf/0x1060 [ 2951.003803][T11941] ipvlan_link_new+0x2a2/0x5d0 [ 2951.008582][T11941] rtnl_newlink+0xda6/0x13b0 [ 2951.013206][T11941] ? __switch_to+0x14e/0x4c0 [ 2951.017783][T11941] ? _raw_spin_unlock_irq+0x22/0x40 [ 2951.023009][T11941] ? finish_task_switch+0xc0/0x2a0 [ 2951.028218][T11941] ? widen_string+0x3a/0x280 [ 2951.032852][T11941] ? widen_string+0x3a/0x280 [ 2951.037522][T11941] ? aa_get_newest_label+0x74/0x250 [ 2951.042707][T11941] ? apparmor_capable+0xfe/0x160 [ 2951.047654][T11941] ? bpf_lsm_capable+0x5/0x10 [ 2951.052393][T11941] ? security_capable+0x91/0xa0 [ 2951.058282][T11941] ? __rcu_read_unlock+0x51/0x250 [ 2951.063290][T11941] ? ns_capable+0x79/0xa0 [ 2951.067664][T11941] ? rtnl_setlink+0x270/0x270 [ 2951.072378][T11941] rtnetlink_rcv_msg+0x723/0x7c0 [ 2951.077341][T11941] ? ___cache_free+0x3c/0x2f0 [ 2951.082071][T11941] ? ima_match_policy+0xa80/0xab0 [ 2951.087097][T11941] ? __kfree_skb+0xfe/0x150 [ 2951.091753][T11941] ? __kfree_skb+0xfe/0x150 [ 2951.096252][T11941] ? consume_skb+0x4b/0x160 [ 2951.100838][T11941] ? nlmon_xmit+0x47/0x50 [ 2951.105339][T11941] ? xmit_one+0x173/0x2e0 [ 2951.109650][T11941] ? local_bh_enable+0x1b/0x20 [ 2951.114461][T11941] ? __dev_queue_xmit+0xbf2/0x1500 [ 2951.119607][T11941] ? __skb_clone+0x2a9/0x2c0 [ 2951.124402][T11941] ? __rcu_read_unlock+0x51/0x250 [ 2951.129539][T11941] netlink_rcv_skb+0x13e/0x240 [ 2951.134330][T11941] ? rtnetlink_bind+0x60/0x60 [ 2951.138985][T11941] rtnetlink_rcv+0x18/0x20 [ 2951.143492][T11941] netlink_unicast+0x5df/0x6b0 [ 2951.148321][T11941] netlink_sendmsg+0x6f8/0x7c0 [ 2951.153197][T11941] ? netlink_getsockopt+0x720/0x720 [ 2951.158403][T11941] ____sys_sendmsg+0x352/0x4c0 [ 2951.163252][T11941] ? import_iovec+0xb8/0xd0 [ 2951.167799][T11941] __sys_sendmsg+0x1ed/0x270 [ 2951.172582][T11941] ? __fsnotify_parent+0x32f/0x430 [ 2951.177809][T11941] ? get_pid_task+0x90/0xc0 [ 2951.182298][T11941] ? vfs_write+0x54d/0x7c0 [ 2951.186966][T11941] ? __fget_light+0x219/0x260 [ 2951.191707][T11941] ? fput+0x2d/0x130 [ 2951.195970][T11941] ? ksys_write+0x157/0x180 [ 2951.200503][T11941] __x64_sys_sendmsg+0x42/0x50 [ 2951.205259][T11941] do_syscall_64+0x39/0x80 [ 2951.209700][T11941] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2951.215627][T11941] RIP: 0033:0x45e219 [ 2951.219589][T11941] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2951.239293][T11941] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2951.247713][T11941] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:37 executing program 0 (fault-call:14 fault-nth:56): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2951.255813][T11941] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2951.263770][T11941] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2951.271725][T11941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000037 [ 2951.279680][T11941] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2951.332161][T11946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2951.345381][T11946] FAULT_INJECTION: forcing a failure. [ 2951.345381][T11946] name failslab, interval 1, probability 0, space 0, times 0 [ 2951.361622][ T17] usb 6-1: new high-speed USB device number 105 using dummy_hcd [ 2951.362411][T11946] CPU: 0 PID: 11946 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2951.379092][T11946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2951.389762][T11946] Call Trace: [ 2951.393820][T11946] dump_stack+0x116/0x15d [ 2951.399413][T11946] should_fail+0x231/0x240 [ 2951.405054][T11946] ? __kernfs_new_node+0x71/0x350 [ 2951.412077][T11946] __should_failslab+0x81/0x90 [ 2951.417513][T11946] should_failslab+0x5/0x20 [ 2951.423010][T11946] kmem_cache_alloc+0x36/0x2e0 [ 2951.428481][T11946] __kernfs_new_node+0x71/0x350 [ 2951.434044][T11946] ? idr_alloc_cyclic+0x249/0x2c0 [ 2951.439584][T11946] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 2951.445391][T11946] ? security_kernfs_init_security+0x7b/0x90 [ 2951.453143][T11946] ? rb_insert_color+0x7e/0x2e0 [ 2951.458313][T11946] kernfs_new_node+0x5b/0xd0 [ 2951.463564][T11946] __kernfs_create_file+0x45/0x180 [ 2951.469172][T11946] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2951.474871][T11946] internal_create_group+0x2e4/0x850 [ 2951.485743][T11946] sysfs_create_groups+0x3d/0xf0 [ 2951.491072][T11946] device_add+0x6fe/0xe50 [ 2951.495483][T11946] netdev_register_kobject+0xfd/0x230 [ 2951.503533][T11946] register_netdevice+0xbcf/0x1060 [ 2951.509977][T11946] ipvlan_link_new+0x2a2/0x5d0 [ 2951.515141][T11946] rtnl_newlink+0xda6/0x13b0 [ 2951.520246][T11946] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2951.525910][T11946] ? __switch_to+0x14e/0x4c0 [ 2951.531267][T11946] ? __perf_event_task_sched_in+0x565/0x590 [ 2951.537401][T11946] ? kvm_sched_clock_read+0x15/0x40 [ 2951.543981][T11946] ? sched_clock+0xf/0x20 [ 2951.549499][T11946] ? widen_string+0x3a/0x280 [ 2951.554962][T11946] ? aa_get_newest_label+0x74/0x250 [ 2951.560568][T11946] ? apparmor_capable+0xfe/0x160 [ 2951.566073][T11946] ? bpf_lsm_capable+0x5/0x10 [ 2951.571388][T11946] ? security_capable+0x91/0xa0 [ 2951.576886][T11946] ? __rcu_read_unlock+0x51/0x250 [ 2951.582327][T11946] ? ns_capable+0x79/0xa0 [ 2951.587602][T11946] ? rtnl_setlink+0x270/0x270 [ 2951.593370][T11946] rtnetlink_rcv_msg+0x723/0x7c0 [ 2951.599278][T11946] ? ___cache_free+0x3c/0x2f0 [ 2951.606205][T11946] ? ima_match_policy+0xa80/0xab0 [ 2951.612907][T11946] ? __kfree_skb+0xfe/0x150 [ 2951.618024][T11946] ? __kfree_skb+0xfe/0x150 [ 2951.622744][T11946] ? consume_skb+0x4b/0x160 [ 2951.627358][T11946] ? nlmon_xmit+0x47/0x50 [ 2951.631883][T11946] ? xmit_one+0x173/0x2e0 [ 2951.637767][T11946] ? local_bh_enable+0x1b/0x20 [ 2951.642540][T11946] ? __dev_queue_xmit+0xbf2/0x1500 [ 2951.647813][T11946] ? __skb_clone+0x2a9/0x2c0 [ 2951.652477][T11946] ? __rcu_read_unlock+0x51/0x250 [ 2951.657510][T11946] netlink_rcv_skb+0x13e/0x240 [ 2951.662492][T11946] ? rtnetlink_bind+0x60/0x60 [ 2951.667272][T11946] rtnetlink_rcv+0x18/0x20 [ 2951.671669][T11946] netlink_unicast+0x5df/0x6b0 [ 2951.676613][T11946] netlink_sendmsg+0x6f8/0x7c0 [ 2951.681397][T11946] ? netlink_getsockopt+0x720/0x720 [ 2951.686685][T11946] ____sys_sendmsg+0x352/0x4c0 [ 2951.691560][T11946] ? import_iovec+0xb8/0xd0 [ 2951.698412][T11946] __sys_sendmsg+0x1ed/0x270 [ 2951.703224][T11946] ? __fsnotify_parent+0x32f/0x430 [ 2951.708510][T11946] ? get_pid_task+0x90/0xc0 [ 2951.713338][T11946] ? vfs_write+0x54d/0x7c0 [ 2951.717897][T11946] ? __fget_light+0x219/0x260 [ 2951.722563][T11946] ? fput+0x2d/0x130 [ 2951.726444][T11946] ? ksys_write+0x157/0x180 [ 2951.731023][T11946] __x64_sys_sendmsg+0x42/0x50 [ 2951.735790][T11946] do_syscall_64+0x39/0x80 [ 2951.740190][T11946] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2951.746089][T11946] RIP: 0033:0x45e219 [ 2951.749961][T11946] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2951.771912][T11946] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2951.781684][T11946] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2951.790332][T11946] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2951.798396][T11946] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2951.806714][T11946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000038 [ 2951.815690][T11946] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2951.902567][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 2951.950782][ T17] usb 6-1: too many configurations: 172, using maximum allowed: 8 [ 2952.081095][ T17] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 2952.088781][ T17] usb 6-1: can't read configurations, error -61 [ 2952.096245][ T17] usb usb6-port1: unable to enumerate USB device 17:15:38 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:38 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:38 executing program 0 (fault-call:14 fault-nth:57): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:38 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2952.285796][T11954] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2952.295684][T11954] FAULT_INJECTION: forcing a failure. [ 2952.295684][T11954] name failslab, interval 1, probability 0, space 0, times 0 [ 2952.308352][T11954] CPU: 0 PID: 11954 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2952.317608][T11954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.328613][T11954] Call Trace: [ 2952.332180][T11954] dump_stack+0x116/0x15d [ 2952.336526][T11954] should_fail+0x231/0x240 [ 2952.341073][T11954] ? __kernfs_new_node+0x71/0x350 [ 2952.348837][T11954] __should_failslab+0x81/0x90 [ 2952.353844][T11954] should_failslab+0x5/0x20 [ 2952.358341][T11954] kmem_cache_alloc+0x36/0x2e0 [ 2952.363355][T11954] __kernfs_new_node+0x71/0x350 [ 2952.368219][T11954] ? rb_insert_color+0x7e/0x2e0 [ 2952.373151][T11954] ? kernfs_link_sibling+0x21c/0x230 [ 2952.378424][T11954] ? kernfs_activate+0x2c5/0x2e0 [ 2952.383352][T11954] kernfs_new_node+0x5b/0xd0 [ 2952.387950][T11954] __kernfs_create_file+0x45/0x180 [ 2952.393467][T11954] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2952.398905][T11954] internal_create_group+0x2e4/0x850 [ 2952.404200][T11954] sysfs_create_groups+0x3d/0xf0 [ 2952.409397][T11954] device_add+0x6fe/0xe50 [ 2952.413980][T11954] netdev_register_kobject+0xfd/0x230 [ 2952.419500][T11954] register_netdevice+0xbcf/0x1060 [ 2952.424939][T11954] ipvlan_link_new+0x2a2/0x5d0 [ 2952.429690][T11954] rtnl_newlink+0xda6/0x13b0 [ 2952.434476][T11954] ? number+0xa03/0xb50 [ 2952.438687][T11954] ? format_decode+0x1d3/0x840 [ 2952.443630][T11954] ? widen_string+0x3a/0x280 [ 2952.448283][T11954] ? widen_string+0x3a/0x280 [ 2952.452990][T11954] ? aa_get_newest_label+0x74/0x250 [ 2952.458342][T11954] ? apparmor_capable+0xfe/0x160 [ 2952.463369][T11954] ? bpf_lsm_capable+0x5/0x10 [ 2952.468034][T11954] ? security_capable+0x91/0xa0 [ 2952.472917][T11954] ? __rcu_read_unlock+0x51/0x250 [ 2952.478038][T11954] ? ns_capable+0x79/0xa0 [ 2952.484674][T11954] ? rtnl_setlink+0x270/0x270 [ 2952.489498][T11954] rtnetlink_rcv_msg+0x723/0x7c0 [ 2952.494435][T11954] ? ___cache_free+0x3c/0x2f0 [ 2952.499277][T11954] ? ima_match_policy+0xa80/0xab0 [ 2952.504439][T11954] ? __kfree_skb+0xfe/0x150 [ 2952.509136][T11954] ? __kfree_skb+0xfe/0x150 [ 2952.513745][T11954] ? consume_skb+0x4b/0x160 [ 2952.518287][T11954] ? nlmon_xmit+0x47/0x50 [ 2952.522774][T11954] ? xmit_one+0x173/0x2e0 [ 2952.527362][T11954] ? local_bh_enable+0x1b/0x20 [ 2952.532255][T11954] ? __dev_queue_xmit+0xbf2/0x1500 [ 2952.537455][T11954] ? __skb_clone+0x2a9/0x2c0 [ 2952.542034][T11954] ? __rcu_read_unlock+0x51/0x250 [ 2952.547273][T11954] netlink_rcv_skb+0x13e/0x240 [ 2952.552906][T11954] ? rtnetlink_bind+0x60/0x60 [ 2952.559159][T11954] rtnetlink_rcv+0x18/0x20 [ 2952.563591][T11954] netlink_unicast+0x5df/0x6b0 [ 2952.568528][T11954] netlink_sendmsg+0x6f8/0x7c0 [ 2952.573464][T11954] ? netlink_getsockopt+0x720/0x720 [ 2952.578760][T11954] ____sys_sendmsg+0x352/0x4c0 [ 2952.583614][T11954] ? import_iovec+0xb8/0xd0 [ 2952.588225][T11954] __sys_sendmsg+0x1ed/0x270 [ 2952.593251][T11954] ? __fsnotify_parent+0x32f/0x430 [ 2952.601318][T11954] ? get_pid_task+0x90/0xc0 [ 2952.605814][T11954] ? vfs_write+0x54d/0x7c0 [ 2952.610223][T11954] ? __fget_light+0x219/0x260 [ 2952.615188][T11954] ? fput+0x2d/0x130 [ 2952.619896][T11954] ? ksys_write+0x157/0x180 [ 2952.624520][T11954] __x64_sys_sendmsg+0x42/0x50 [ 2952.629569][T11954] do_syscall_64+0x39/0x80 [ 2952.633998][T11954] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2952.639898][T11954] RIP: 0033:0x45e219 [ 2952.643918][T11954] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.664196][T11954] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2952.673160][T11954] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:39 executing program 0 (fault-call:14 fault-nth:58): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2952.681124][T11954] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2952.689333][T11954] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2952.697575][T11954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000039 [ 2952.705821][T11954] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:39 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x94}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2952.808734][T11960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2952.827274][T11960] FAULT_INJECTION: forcing a failure. [ 2952.827274][T11960] name failslab, interval 1, probability 0, space 0, times 0 [ 2952.846174][T11960] CPU: 1 PID: 11960 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2952.855154][T11960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.865614][T11960] Call Trace: [ 2952.869660][T11960] dump_stack+0x116/0x15d [ 2952.876397][T11960] should_fail+0x231/0x240 [ 2952.882245][T11960] ? __kernfs_new_node+0x71/0x350 [ 2952.887680][T11960] __should_failslab+0x81/0x90 [ 2952.893409][T11960] should_failslab+0x5/0x20 [ 2952.898827][T11960] kmem_cache_alloc+0x36/0x2e0 [ 2952.904189][T11960] __kernfs_new_node+0x71/0x350 [ 2952.909263][T11960] ? rb_insert_color+0x7e/0x2e0 [ 2952.914616][T11960] ? kernfs_link_sibling+0x21c/0x230 [ 2952.920300][T11960] ? kernfs_activate+0x2c5/0x2e0 [ 2952.925624][T11960] kernfs_new_node+0x5b/0xd0 [ 2952.931336][T11960] __kernfs_create_file+0x45/0x180 [ 2952.937793][T11960] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2952.943391][T11960] internal_create_group+0x2e4/0x850 [ 2952.948674][T11960] sysfs_create_groups+0x3d/0xf0 [ 2952.953692][T11960] device_add+0x6fe/0xe50 [ 2952.958653][T11960] netdev_register_kobject+0xfd/0x230 [ 2952.964073][T11960] register_netdevice+0xbcf/0x1060 [ 2952.969402][T11960] ipvlan_link_new+0x2a2/0x5d0 [ 2952.974779][T11960] rtnl_newlink+0xda6/0x13b0 [ 2952.979919][T11960] ? update_load_avg+0x1ad/0x2d0 [ 2952.985268][T11960] ? rb_insert_color+0x7e/0x2e0 [ 2952.990348][T11960] ? enqueue_entity+0x25a/0x480 [ 2952.995582][T11960] ? widen_string+0x3a/0x280 [ 2953.001252][T11960] ? aa_get_newest_label+0x74/0x250 [ 2953.007479][T11960] ? apparmor_capable+0xfe/0x160 [ 2953.013038][T11960] ? bpf_lsm_capable+0x5/0x10 [ 2953.018242][T11960] ? security_capable+0x91/0xa0 [ 2953.023100][T11960] ? __rcu_read_unlock+0x51/0x250 [ 2953.028109][T11960] ? ns_capable+0x79/0xa0 [ 2953.032428][T11960] ? rtnl_setlink+0x270/0x270 [ 2953.037134][T11960] rtnetlink_rcv_msg+0x723/0x7c0 [ 2953.042329][T11960] ? ___cache_free+0x3c/0x2f0 [ 2953.047216][T11960] ? ima_match_policy+0xa80/0xab0 [ 2953.052386][T11960] ? __kfree_skb+0xfe/0x150 [ 2953.056945][T11960] ? __kfree_skb+0xfe/0x150 [ 2953.061428][T11960] ? consume_skb+0x4b/0x160 [ 2953.066149][T11960] ? nlmon_xmit+0x47/0x50 [ 2953.070487][T11960] ? xmit_one+0x173/0x2e0 [ 2953.075130][T11960] ? local_bh_enable+0x1b/0x20 [ 2953.080140][T11960] ? __dev_queue_xmit+0xbf2/0x1500 [ 2953.085315][T11960] ? __skb_clone+0x2a9/0x2c0 [ 2953.089991][T11960] ? __rcu_read_unlock+0x51/0x250 [ 2953.095177][T11960] netlink_rcv_skb+0x13e/0x240 [ 2953.100029][T11960] ? rtnetlink_bind+0x60/0x60 [ 2953.104743][T11960] rtnetlink_rcv+0x18/0x20 [ 2953.109189][T11960] netlink_unicast+0x5df/0x6b0 [ 2953.113962][T11960] netlink_sendmsg+0x6f8/0x7c0 [ 2953.118709][T11960] ? netlink_getsockopt+0x720/0x720 [ 2953.123983][T11960] ____sys_sendmsg+0x352/0x4c0 [ 2953.128837][T11960] ? import_iovec+0xb8/0xd0 [ 2953.133397][T11960] __sys_sendmsg+0x1ed/0x270 [ 2953.138065][T11960] ? __fsnotify_parent+0x32f/0x430 [ 2953.143347][T11960] ? get_pid_task+0x90/0xc0 [ 2953.148197][T11960] ? vfs_write+0x54d/0x7c0 [ 2953.152601][T11960] ? __fget_light+0x219/0x260 [ 2953.158218][T11960] ? fput+0x2d/0x130 [ 2953.162104][T11960] ? ksys_write+0x157/0x180 [ 2953.166782][T11960] __x64_sys_sendmsg+0x42/0x50 [ 2953.171533][T11960] do_syscall_64+0x39/0x80 [ 2953.175943][T11960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2953.181827][T11960] RIP: 0033:0x45e219 [ 2953.185792][T11960] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:39 executing program 0 (fault-call:14 fault-nth:59): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2953.205633][T11960] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2953.214073][T11960] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2953.222027][T11960] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2953.229978][T11960] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.237932][T11960] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003a [ 2953.246553][T11960] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2953.304272][T11965] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2953.316837][T11965] FAULT_INJECTION: forcing a failure. [ 2953.316837][T11965] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.332895][T11965] CPU: 0 PID: 11965 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2953.343123][T11965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.354839][T11965] Call Trace: [ 2953.358828][T11965] dump_stack+0x116/0x15d [ 2953.364602][T11965] should_fail+0x231/0x240 [ 2953.370062][T11965] ? __kernfs_new_node+0x71/0x350 [ 2953.381025][T11965] __should_failslab+0x81/0x90 [ 2953.386442][T11965] should_failslab+0x5/0x20 [ 2953.391798][T11965] kmem_cache_alloc+0x36/0x2e0 [ 2953.397057][T11965] __kernfs_new_node+0x71/0x350 [ 2953.402428][T11965] ? rb_insert_color+0x2c9/0x2e0 [ 2953.407915][T11965] ? kernfs_link_sibling+0x21c/0x230 [ 2953.413293][T11965] ? kernfs_activate+0x2c5/0x2e0 [ 2953.418395][T11965] kernfs_new_node+0x5b/0xd0 [ 2953.423316][T11965] __kernfs_create_file+0x45/0x180 [ 2953.428512][T11965] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2953.433861][T11965] internal_create_group+0x2e4/0x850 [ 2953.439142][T11965] sysfs_create_groups+0x3d/0xf0 [ 2953.444160][T11965] device_add+0x6fe/0xe50 [ 2953.448490][T11965] netdev_register_kobject+0xfd/0x230 [ 2953.453854][T11965] register_netdevice+0xbcf/0x1060 [ 2953.459045][T11965] ipvlan_link_new+0x2a2/0x5d0 [ 2953.463880][T11965] rtnl_newlink+0xda6/0x13b0 [ 2953.468540][T11965] ? __schedule+0x3c1/0x580 [ 2953.473240][T11965] ? preempt_schedule_irq+0x43/0x80 [ 2953.478560][T11965] ? irqentry_exit_cond_resched+0x30/0x40 [ 2953.484380][T11965] ? irqentry_exit+0x2a/0x40 [ 2953.489724][T11965] ? widen_string+0x3a/0x280 [ 2953.494402][T11965] ? aa_get_newest_label+0x74/0x250 [ 2953.499890][T11965] ? apparmor_capable+0xfe/0x160 [ 2953.504831][T11965] ? bpf_lsm_capable+0x5/0x10 [ 2953.509568][T11965] ? security_capable+0x91/0xa0 [ 2953.514409][T11965] ? __rcu_read_unlock+0x51/0x250 [ 2953.519530][T11965] ? ns_capable+0x79/0xa0 [ 2953.523870][T11965] ? rtnl_setlink+0x270/0x270 [ 2953.528604][T11965] rtnetlink_rcv_msg+0x723/0x7c0 [ 2953.533695][T11965] ? ___cache_free+0x3c/0x2f0 [ 2953.538363][T11965] ? ima_match_policy+0xa80/0xab0 [ 2953.543379][T11965] ? __kfree_skb+0xfe/0x150 [ 2953.547868][T11965] ? __kfree_skb+0xfe/0x150 [ 2953.552348][T11965] ? consume_skb+0x4b/0x160 [ 2953.556828][T11965] ? nlmon_xmit+0x47/0x50 [ 2953.561164][T11965] ? xmit_one+0x173/0x2e0 [ 2953.565472][T11965] ? local_bh_enable+0x1b/0x20 [ 2953.570609][T11965] ? __dev_queue_xmit+0xbf2/0x1500 [ 2953.575775][T11965] ? __skb_clone+0x2a9/0x2c0 [ 2953.580390][T11965] ? __rcu_read_unlock+0x51/0x250 [ 2953.585393][T11965] netlink_rcv_skb+0x13e/0x240 [ 2953.590145][T11965] ? rtnetlink_bind+0x60/0x60 [ 2953.595451][T11965] rtnetlink_rcv+0x18/0x20 [ 2953.600579][T11965] netlink_unicast+0x5df/0x6b0 [ 2953.605439][T11965] netlink_sendmsg+0x6f8/0x7c0 [ 2953.610206][T11965] ? netlink_getsockopt+0x720/0x720 [ 2953.615409][T11965] ____sys_sendmsg+0x352/0x4c0 [ 2953.620237][T11965] ? import_iovec+0xb8/0xd0 [ 2953.624937][T11965] __sys_sendmsg+0x1ed/0x270 [ 2953.629693][T11965] ? __fsnotify_parent+0x32f/0x430 [ 2953.634792][T11965] ? get_pid_task+0x90/0xc0 [ 2953.639380][T11965] ? vfs_write+0x54d/0x7c0 [ 2953.643870][T11965] ? __fget_light+0x219/0x260 [ 2953.648620][T11965] ? fput+0x2d/0x130 [ 2953.652595][T11965] ? ksys_write+0x157/0x180 [ 2953.657093][T11965] __x64_sys_sendmsg+0x42/0x50 [ 2953.661883][T11965] do_syscall_64+0x39/0x80 [ 2953.670018][T11965] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2953.675931][T11965] RIP: 0033:0x45e219 [ 2953.679818][T11965] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:40 executing program 0 (fault-call:14 fault-nth:60): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2953.699565][T11965] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2953.708057][T11965] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2953.716192][T11965] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2953.724342][T11965] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.732326][T11965] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003b [ 2953.740433][T11965] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2953.792212][T11967] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2953.805305][T11967] FAULT_INJECTION: forcing a failure. [ 2953.805305][T11967] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.823538][T11967] CPU: 1 PID: 11967 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2953.833387][T11967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.845566][T11967] Call Trace: [ 2953.849996][T11967] dump_stack+0x116/0x15d [ 2953.855575][T11967] should_fail+0x231/0x240 [ 2953.862291][T11967] ? __kernfs_new_node+0x71/0x350 [ 2953.867937][T11967] __should_failslab+0x81/0x90 [ 2953.874148][T11967] should_failslab+0x5/0x20 [ 2953.880988][T11967] kmem_cache_alloc+0x36/0x2e0 [ 2953.886657][T11967] __kernfs_new_node+0x71/0x350 [ 2953.892475][T11967] ? rb_insert_color+0x2c9/0x2e0 [ 2953.897590][T11967] ? kernfs_link_sibling+0x21c/0x230 [ 2953.903026][T11967] ? kernfs_activate+0x2c5/0x2e0 [ 2953.908282][T11967] kernfs_new_node+0x5b/0xd0 [ 2953.912951][T11967] __kernfs_create_file+0x45/0x180 [ 2953.918219][T11967] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2953.924426][T11967] internal_create_group+0x2e4/0x850 [ 2953.930984][T11967] sysfs_create_groups+0x3d/0xf0 [ 2953.935913][T11967] device_add+0x6fe/0xe50 [ 2953.940288][T11967] netdev_register_kobject+0xfd/0x230 [ 2953.946525][T11967] register_netdevice+0xbcf/0x1060 [ 2953.951698][T11967] ipvlan_link_new+0x2a2/0x5d0 [ 2953.956625][T11967] rtnl_newlink+0xda6/0x13b0 [ 2953.962329][T11967] ? preempt_schedule_irq+0x43/0x80 [ 2953.969177][T11967] ? irqentry_exit_cond_resched+0x30/0x40 [ 2953.975213][T11967] ? irqentry_exit+0x2a/0x40 [ 2953.979806][T11967] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2953.986902][T11967] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2953.994206][T11967] ? aa_get_newest_label+0x74/0x250 [ 2953.999444][T11967] ? apparmor_capable+0xfe/0x160 [ 2954.004904][T11967] ? bpf_lsm_capable+0x5/0x10 [ 2954.011250][T11967] ? security_capable+0x91/0xa0 [ 2954.016105][T11967] ? __rcu_read_unlock+0x51/0x250 [ 2954.021649][T11967] ? ns_capable+0x79/0xa0 [ 2954.027830][T11967] ? rtnl_setlink+0x270/0x270 [ 2954.032509][T11967] rtnetlink_rcv_msg+0x723/0x7c0 [ 2954.037446][T11967] ? ___cache_free+0x3c/0x2f0 [ 2954.043129][T11967] ? ima_match_policy+0xa80/0xab0 [ 2954.049271][T11967] ? __kfree_skb+0xfe/0x150 [ 2954.055147][T11967] ? __kfree_skb+0xfe/0x150 [ 2954.059684][T11967] ? consume_skb+0x4b/0x160 [ 2954.064398][T11967] ? nlmon_xmit+0x47/0x50 [ 2954.069708][T11967] ? xmit_one+0x173/0x2e0 [ 2954.074562][T11967] ? local_bh_enable+0x1b/0x20 [ 2954.079435][T11967] ? __dev_queue_xmit+0xbf2/0x1500 [ 2954.084950][T11967] ? __skb_clone+0x2a9/0x2c0 [ 2954.090119][T11967] ? __rcu_read_unlock+0x51/0x250 [ 2954.095146][T11967] netlink_rcv_skb+0x13e/0x240 [ 2954.100005][T11967] ? rtnetlink_bind+0x60/0x60 [ 2954.105658][T11967] rtnetlink_rcv+0x18/0x20 [ 2954.111034][T11967] netlink_unicast+0x5df/0x6b0 [ 2954.115883][T11967] netlink_sendmsg+0x6f8/0x7c0 [ 2954.121381][T11967] ? netlink_getsockopt+0x720/0x720 [ 2954.127550][T11967] ____sys_sendmsg+0x352/0x4c0 [ 2954.132942][T11967] ? import_iovec+0xb8/0xd0 [ 2954.137901][T11967] __sys_sendmsg+0x1ed/0x270 [ 2954.143176][T11967] ? __fsnotify_parent+0x32f/0x430 [ 2954.149152][T11967] ? get_pid_task+0x90/0xc0 [ 2954.153856][T11967] ? vfs_write+0x54d/0x7c0 [ 2954.159858][T11967] ? __fget_light+0x219/0x260 [ 2954.164597][T11967] ? fput+0x2d/0x130 [ 2954.168486][T11967] ? ksys_write+0x157/0x180 [ 2954.173185][T11967] __x64_sys_sendmsg+0x42/0x50 [ 2954.177958][T11967] do_syscall_64+0x39/0x80 [ 2954.182993][T11967] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2954.189761][T11967] RIP: 0033:0x45e219 [ 2954.193720][T11967] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.213333][T11967] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2954.222971][T11967] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2954.231379][T11967] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:40 executing program 0 (fault-call:14 fault-nth:61): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2954.239720][T11967] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.248029][T11967] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003c [ 2954.256199][T11967] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2954.311517][T11974] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2954.323646][T11974] FAULT_INJECTION: forcing a failure. [ 2954.323646][T11974] name failslab, interval 1, probability 0, space 0, times 0 [ 2954.341712][T11974] CPU: 0 PID: 11974 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2954.351075][T11974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.361271][T11974] Call Trace: [ 2954.364652][T11974] dump_stack+0x116/0x15d [ 2954.368980][T11974] should_fail+0x231/0x240 [ 2954.373461][T11974] ? __kernfs_new_node+0x71/0x350 [ 2954.378548][T11974] __should_failslab+0x81/0x90 [ 2954.383455][T11974] should_failslab+0x5/0x20 [ 2954.387960][T11974] kmem_cache_alloc+0x36/0x2e0 [ 2954.392979][T11974] __kernfs_new_node+0x71/0x350 [ 2954.397843][T11974] ? rb_insert_color+0x28d/0x2e0 [ 2954.402859][T11974] ? kernfs_link_sibling+0x21c/0x230 [ 2954.408290][T11974] ? kernfs_activate+0x2c5/0x2e0 [ 2954.413435][T11974] kernfs_new_node+0x5b/0xd0 [ 2954.418015][T11974] __kernfs_create_file+0x45/0x180 [ 2954.423551][T11974] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2954.429013][T11974] internal_create_group+0x2e4/0x850 [ 2954.434363][T11974] sysfs_create_groups+0x3d/0xf0 [ 2954.439417][T11974] device_add+0x6fe/0xe50 [ 2954.444242][T11974] netdev_register_kobject+0xfd/0x230 [ 2954.449645][T11974] register_netdevice+0xbcf/0x1060 [ 2954.454996][T11974] ipvlan_link_new+0x2a2/0x5d0 [ 2954.459883][T11974] rtnl_newlink+0xda6/0x13b0 [ 2954.464583][T11974] ? widen_string+0x3a/0x280 [ 2954.469201][T11974] ? widen_string+0x3a/0x280 [ 2954.473908][T11974] ? aa_get_newest_label+0x74/0x250 [ 2954.479128][T11974] ? apparmor_capable+0xfe/0x160 [ 2954.484164][T11974] ? bpf_lsm_capable+0x5/0x10 [ 2954.488846][T11974] ? security_capable+0x91/0xa0 [ 2954.494303][T11974] ? __rcu_read_unlock+0x51/0x250 [ 2954.499606][T11974] ? ns_capable+0x79/0xa0 [ 2954.503936][T11974] ? rtnl_setlink+0x270/0x270 [ 2954.508652][T11974] rtnetlink_rcv_msg+0x723/0x7c0 [ 2954.513826][T11974] ? ___cache_free+0x3c/0x2f0 [ 2954.518501][T11974] ? ima_match_policy+0xa80/0xab0 [ 2954.523605][T11974] ? __kfree_skb+0xfe/0x150 [ 2954.528410][T11974] ? __kfree_skb+0xfe/0x150 [ 2954.532896][T11974] ? consume_skb+0x4b/0x160 [ 2954.537441][T11974] ? nlmon_xmit+0x47/0x50 [ 2954.541797][T11974] ? xmit_one+0x173/0x2e0 [ 2954.546135][T11974] ? local_bh_enable+0x1b/0x20 [ 2954.550984][T11974] ? __dev_queue_xmit+0xbf2/0x1500 [ 2954.556090][T11974] ? __skb_clone+0x2a9/0x2c0 [ 2954.561021][T11974] ? __rcu_read_unlock+0x51/0x250 [ 2954.566069][T11974] netlink_rcv_skb+0x13e/0x240 [ 2954.570864][T11974] ? rtnetlink_bind+0x60/0x60 [ 2954.575526][T11974] rtnetlink_rcv+0x18/0x20 [ 2954.580024][T11974] netlink_unicast+0x5df/0x6b0 [ 2954.584992][T11974] netlink_sendmsg+0x6f8/0x7c0 [ 2954.590068][T11974] ? netlink_getsockopt+0x720/0x720 [ 2954.596915][T11974] ____sys_sendmsg+0x352/0x4c0 [ 2954.602016][T11974] ? import_iovec+0xb8/0xd0 [ 2954.606701][T11974] __sys_sendmsg+0x1ed/0x270 [ 2954.611389][T11974] ? __fsnotify_parent+0x32f/0x430 [ 2954.617552][T11974] ? get_pid_task+0x90/0xc0 [ 2954.622083][T11974] ? vfs_write+0x54d/0x7c0 [ 2954.626532][T11974] ? __fget_light+0x219/0x260 [ 2954.631686][T11974] ? fput+0x2d/0x130 [ 2954.635667][T11974] ? ksys_write+0x157/0x180 [ 2954.640162][T11974] __x64_sys_sendmsg+0x42/0x50 [ 2954.644979][T11974] do_syscall_64+0x39/0x80 [ 2954.649628][T11974] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2954.655712][T11974] RIP: 0033:0x45e219 [ 2954.659592][T11974] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.679512][T11974] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2954.688530][T11974] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2954.696671][T11974] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2954.705186][T11974] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.713617][T11974] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003d [ 2954.721854][T11974] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:41 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x404200, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)=0x3) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:15:41 executing program 0 (fault-call:14 fault-nth:62): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:41 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:41 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:42 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2955.302553][T11978] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2955.312737][T11978] FAULT_INJECTION: forcing a failure. [ 2955.312737][T11978] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.340746][T11978] CPU: 1 PID: 11978 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2955.351740][T11978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.362009][T11978] Call Trace: [ 2955.365289][T11978] dump_stack+0x116/0x15d [ 2955.369622][T11978] should_fail+0x231/0x240 [ 2955.374132][T11978] ? __kernfs_new_node+0x71/0x350 [ 2955.379156][T11978] __should_failslab+0x81/0x90 [ 2955.383917][T11978] should_failslab+0x5/0x20 [ 2955.389283][T11978] kmem_cache_alloc+0x36/0x2e0 [ 2955.394154][T11978] __kernfs_new_node+0x71/0x350 [ 2955.399008][T11978] ? rb_insert_color+0x7e/0x2e0 [ 2955.404093][T11978] ? kernfs_link_sibling+0x21c/0x230 [ 2955.409460][T11978] ? kernfs_activate+0x2c5/0x2e0 [ 2955.414451][T11978] kernfs_new_node+0x5b/0xd0 [ 2955.419275][T11978] __kernfs_create_file+0x45/0x180 [ 2955.424495][T11978] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2955.430014][T11978] internal_create_group+0x2e4/0x850 [ 2955.435310][T11978] sysfs_create_groups+0x3d/0xf0 [ 2955.440387][T11978] device_add+0x6fe/0xe50 [ 2955.444805][T11978] netdev_register_kobject+0xfd/0x230 [ 2955.450173][T11978] register_netdevice+0xbcf/0x1060 [ 2955.455289][T11978] ipvlan_link_new+0x2a2/0x5d0 [ 2955.460039][T11978] rtnl_newlink+0xda6/0x13b0 [ 2955.464619][T11978] ? number+0xa03/0xb50 [ 2955.468850][T11978] ? format_decode+0x1d3/0x840 [ 2955.474492][T11978] ? widen_string+0x3a/0x280 [ 2955.479078][T11978] ? widen_string+0x3a/0x280 [ 2955.483770][T11978] ? aa_get_newest_label+0x74/0x250 [ 2955.489246][T11978] ? apparmor_capable+0xfe/0x160 [ 2955.494312][T11978] ? bpf_lsm_capable+0x5/0x10 [ 2955.499565][T11978] ? security_capable+0x91/0xa0 [ 2955.504660][T11978] ? __rcu_read_unlock+0x51/0x250 [ 2955.509915][T11978] ? ns_capable+0x79/0xa0 [ 2955.514423][T11978] ? rtnl_setlink+0x270/0x270 [ 2955.519169][T11978] rtnetlink_rcv_msg+0x723/0x7c0 [ 2955.524133][T11978] ? ___cache_free+0x3c/0x2f0 [ 2955.529139][T11978] ? ima_match_policy+0xa80/0xab0 [ 2955.534160][T11978] ? __kfree_skb+0xfe/0x150 [ 2955.538794][T11978] ? __kfree_skb+0xfe/0x150 [ 2955.543374][T11978] ? consume_skb+0x4b/0x160 [ 2955.548742][T11978] ? nlmon_xmit+0x47/0x50 [ 2955.553292][T11978] ? xmit_one+0x173/0x2e0 [ 2955.557609][T11978] ? local_bh_enable+0x1b/0x20 [ 2955.562404][T11978] ? __dev_queue_xmit+0xbf2/0x1500 [ 2955.568064][T11978] ? __skb_clone+0x2a9/0x2c0 [ 2955.573955][T11978] ? __rcu_read_unlock+0x51/0x250 [ 2955.579302][T11978] netlink_rcv_skb+0x13e/0x240 [ 2955.584080][T11978] ? rtnetlink_bind+0x60/0x60 [ 2955.588854][T11978] rtnetlink_rcv+0x18/0x20 [ 2955.593282][T11978] netlink_unicast+0x5df/0x6b0 [ 2955.598280][T11978] netlink_sendmsg+0x6f8/0x7c0 [ 2955.603141][T11978] ? netlink_getsockopt+0x720/0x720 [ 2955.608404][T11978] ____sys_sendmsg+0x352/0x4c0 [ 2955.613394][T11978] ? import_iovec+0xb8/0xd0 [ 2955.618237][T11978] __sys_sendmsg+0x1ed/0x270 [ 2955.622821][T11978] ? __fsnotify_parent+0x32f/0x430 [ 2955.628121][T11978] ? get_pid_task+0x90/0xc0 [ 2955.632891][T11978] ? vfs_write+0x54d/0x7c0 [ 2955.637311][T11978] ? __fget_light+0x219/0x260 [ 2955.641994][T11978] ? fput+0x2d/0x130 [ 2955.646032][T11978] ? ksys_write+0x157/0x180 [ 2955.650538][T11978] __x64_sys_sendmsg+0x42/0x50 [ 2955.655408][T11978] do_syscall_64+0x39/0x80 [ 2955.659849][T11978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2955.666187][T11978] RIP: 0033:0x45e219 [ 2955.670152][T11978] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.691322][T11978] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:42 executing program 0 (fault-call:14 fault-nth:63): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2955.703314][T11978] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2955.712076][T11978] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2955.720904][T11978] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2955.729191][T11978] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e [ 2955.737599][T11978] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:42 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x94}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2955.834041][T11995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2955.847146][T11995] FAULT_INJECTION: forcing a failure. [ 2955.847146][T11995] name failslab, interval 1, probability 0, space 0, times 0 [ 2955.866271][T11995] CPU: 0 PID: 11995 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2955.878088][T11995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.888660][T11995] Call Trace: [ 2955.892625][T11995] dump_stack+0x116/0x15d [ 2955.898213][T11995] should_fail+0x231/0x240 [ 2955.904650][T11995] ? __kernfs_new_node+0x71/0x350 [ 2955.913851][T11995] __should_failslab+0x81/0x90 [ 2955.920417][T11995] should_failslab+0x5/0x20 [ 2955.925907][T11995] kmem_cache_alloc+0x36/0x2e0 [ 2955.926708][T11999] ptrace attach of "/root/syz-executor.4"[11998] was attempted by "/root/syz-executor.4"[11999] [ 2955.931755][T11995] __kernfs_new_node+0x71/0x350 [ 2955.949143][T11995] ? rb_insert_color+0x7e/0x2e0 [ 2955.955205][T11995] ? kernfs_link_sibling+0x21c/0x230 [ 2955.962231][T11995] ? kernfs_activate+0x2c5/0x2e0 [ 2955.967644][T11995] kernfs_new_node+0x5b/0xd0 [ 2955.973068][T11995] __kernfs_create_file+0x45/0x180 [ 2955.978330][T11995] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2955.984894][T11995] internal_create_group+0x2e4/0x850 [ 2955.991610][T11995] sysfs_create_groups+0x3d/0xf0 [ 2955.997084][T11995] device_add+0x6fe/0xe50 [ 2956.002557][T11995] netdev_register_kobject+0xfd/0x230 [ 2956.008036][T11995] register_netdevice+0xbcf/0x1060 [ 2956.013416][T11995] ipvlan_link_new+0x2a2/0x5d0 [ 2956.018877][T11995] rtnl_newlink+0xda6/0x13b0 [ 2956.024061][T11995] ? irqentry_exit+0x2a/0x40 [ 2956.029405][T11995] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2956.037348][T11995] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2956.043685][T11995] ? widen_string+0x3a/0x280 [ 2956.049810][T11995] ? aa_get_newest_label+0x74/0x250 [ 2956.055519][T11995] ? apparmor_capable+0xfe/0x160 [ 2956.060485][T11995] ? bpf_lsm_capable+0x5/0x10 [ 2956.065933][T11995] ? security_capable+0x91/0xa0 [ 2956.071132][T11995] ? __rcu_read_unlock+0x51/0x250 [ 2956.076184][T11995] ? ns_capable+0x79/0xa0 [ 2956.080792][T11995] ? rtnl_setlink+0x270/0x270 [ 2956.085766][T11995] rtnetlink_rcv_msg+0x723/0x7c0 [ 2956.090805][T11995] ? ___cache_free+0x3c/0x2f0 [ 2956.095544][T11995] ? ima_match_policy+0xa80/0xab0 [ 2956.100557][T11995] ? __kfree_skb+0xfe/0x150 [ 2956.105175][T11995] ? __kfree_skb+0xfe/0x150 [ 2956.109744][T11995] ? consume_skb+0x4b/0x160 [ 2956.114259][T11995] ? nlmon_xmit+0x47/0x50 [ 2956.119439][T11995] ? xmit_one+0x173/0x2e0 [ 2956.123817][T11995] ? local_bh_enable+0x1b/0x20 [ 2956.128563][T11995] ? __dev_queue_xmit+0xbf2/0x1500 [ 2956.133661][T11995] ? __skb_clone+0x2a9/0x2c0 [ 2956.138233][T11995] ? __rcu_read_unlock+0x51/0x250 [ 2956.143243][T11995] netlink_rcv_skb+0x13e/0x240 [ 2956.148115][T11995] ? rtnetlink_bind+0x60/0x60 [ 2956.152834][T11995] rtnetlink_rcv+0x18/0x20 [ 2956.157250][T11995] netlink_unicast+0x5df/0x6b0 [ 2956.161995][T11995] netlink_sendmsg+0x6f8/0x7c0 [ 2956.166921][T11995] ? netlink_getsockopt+0x720/0x720 [ 2956.172146][T11995] ____sys_sendmsg+0x352/0x4c0 [ 2956.177014][T11995] ? import_iovec+0xb8/0xd0 [ 2956.181984][T11995] __sys_sendmsg+0x1ed/0x270 [ 2956.186870][T11995] ? __fsnotify_parent+0x32f/0x430 [ 2956.192184][T11995] ? get_pid_task+0x90/0xc0 [ 2956.196677][T11995] ? vfs_write+0x54d/0x7c0 [ 2956.201083][T11995] ? __fget_light+0x219/0x260 [ 2956.205799][T11995] ? fput+0x2d/0x130 [ 2956.209690][T11995] ? ksys_write+0x157/0x180 [ 2956.214199][T11995] __x64_sys_sendmsg+0x42/0x50 [ 2956.219051][T11995] do_syscall_64+0x39/0x80 [ 2956.223559][T11995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2956.229434][T11995] RIP: 0033:0x45e219 [ 2956.233489][T11995] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.255546][T11995] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2956.264151][T11995] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2956.272203][T11995] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:42 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x94}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:43 executing program 0 (fault-call:14 fault-nth:64): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2956.280522][T11995] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.288478][T11995] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003f [ 2956.296513][T11995] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2956.365948][T12004] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2956.377857][T12004] FAULT_INJECTION: forcing a failure. [ 2956.377857][T12004] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.391270][T12004] CPU: 0 PID: 12004 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2956.400411][T12004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.411031][T12004] Call Trace: [ 2956.414636][T12004] dump_stack+0x116/0x15d [ 2956.420006][T12004] should_fail+0x231/0x240 [ 2956.426131][T12004] ? __kernfs_new_node+0x71/0x350 [ 2956.432324][T12004] __should_failslab+0x81/0x90 [ 2956.437457][T12004] should_failslab+0x5/0x20 [ 2956.442483][T12004] kmem_cache_alloc+0x36/0x2e0 [ 2956.447338][T12004] __kernfs_new_node+0x71/0x350 [ 2956.453023][T12004] ? rb_insert_color+0x7e/0x2e0 [ 2956.458028][T12004] ? kernfs_link_sibling+0x21c/0x230 [ 2956.463313][T12004] ? kernfs_activate+0x2c5/0x2e0 [ 2956.468556][T12004] kernfs_new_node+0x5b/0xd0 [ 2956.473224][T12004] __kernfs_create_file+0x45/0x180 [ 2956.478335][T12004] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2956.483926][T12004] internal_create_group+0x2e4/0x850 [ 2956.490659][T12004] sysfs_create_groups+0x3d/0xf0 [ 2956.495595][T12004] device_add+0x6fe/0xe50 [ 2956.499989][T12004] netdev_register_kobject+0xfd/0x230 [ 2956.505344][T12004] register_netdevice+0xbcf/0x1060 [ 2956.510442][T12004] ipvlan_link_new+0x2a2/0x5d0 [ 2956.516065][T12004] rtnl_newlink+0xda6/0x13b0 [ 2956.520651][T12004] ? _raw_spin_unlock_irq+0x22/0x40 [ 2956.525836][T12004] ? finish_task_switch+0xc0/0x2a0 [ 2956.530925][T12004] ? __perf_event_task_sched_in+0x565/0x590 [ 2956.536842][T12004] ? kvm_sched_clock_read+0x15/0x40 [ 2956.542023][T12004] ? sched_clock+0xf/0x20 [ 2956.546693][T12004] ? widen_string+0x3a/0x280 [ 2956.551323][T12004] ? aa_get_newest_label+0x74/0x250 [ 2956.556495][T12004] ? apparmor_capable+0xfe/0x160 [ 2956.561429][T12004] ? bpf_lsm_capable+0x5/0x10 [ 2956.566107][T12004] ? security_capable+0x91/0xa0 [ 2956.570947][T12004] ? __rcu_read_unlock+0x51/0x250 [ 2956.576051][T12004] ? ns_capable+0x79/0xa0 [ 2956.580437][T12004] ? rtnl_setlink+0x270/0x270 [ 2956.585089][T12004] rtnetlink_rcv_msg+0x723/0x7c0 [ 2956.590175][T12004] ? ___cache_free+0x3c/0x2f0 [ 2956.594830][T12004] ? ima_match_policy+0xa80/0xab0 [ 2956.600724][T12004] ? __kfree_skb+0xfe/0x150 [ 2956.605420][T12004] ? __kfree_skb+0xfe/0x150 [ 2956.610025][T12004] ? consume_skb+0x4b/0x160 [ 2956.615011][T12004] ? nlmon_xmit+0x47/0x50 [ 2956.623070][T12004] ? xmit_one+0x173/0x2e0 [ 2956.627392][T12004] ? local_bh_enable+0x1b/0x20 [ 2956.632166][T12004] ? __dev_queue_xmit+0xbf2/0x1500 [ 2956.637268][T12004] ? __skb_clone+0x2a9/0x2c0 [ 2956.641881][T12004] ? __rcu_read_unlock+0x51/0x250 [ 2956.647178][T12004] netlink_rcv_skb+0x13e/0x240 [ 2956.651928][T12004] ? rtnetlink_bind+0x60/0x60 [ 2956.656595][T12004] rtnetlink_rcv+0x18/0x20 [ 2956.661010][T12004] netlink_unicast+0x5df/0x6b0 [ 2956.665836][T12004] netlink_sendmsg+0x6f8/0x7c0 [ 2956.670607][T12004] ? netlink_getsockopt+0x720/0x720 [ 2956.675780][T12004] ____sys_sendmsg+0x352/0x4c0 [ 2956.680695][T12004] ? import_iovec+0xb8/0xd0 [ 2956.685253][T12004] __sys_sendmsg+0x1ed/0x270 [ 2956.690438][T12004] ? __fsnotify_parent+0x32f/0x430 [ 2956.695569][T12004] ? get_pid_task+0x90/0xc0 [ 2956.700049][T12004] ? vfs_write+0x54d/0x7c0 [ 2956.704557][T12004] ? __fget_light+0x219/0x260 [ 2956.709340][T12004] ? fput+0x2d/0x130 [ 2956.713220][T12004] ? ksys_write+0x157/0x180 [ 2956.717743][T12004] __x64_sys_sendmsg+0x42/0x50 [ 2956.722510][T12004] do_syscall_64+0x39/0x80 [ 2956.726917][T12004] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2956.732788][T12004] RIP: 0033:0x45e219 [ 2956.736672][T12004] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.756948][T12004] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:43 executing program 0 (fault-call:14 fault-nth:65): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2956.765333][T12004] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2956.773377][T12004] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2956.781437][T12004] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.789447][T12004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040 [ 2956.797392][T12004] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2956.855443][T12006] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2956.866773][T12006] FAULT_INJECTION: forcing a failure. [ 2956.866773][T12006] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.880573][T12006] CPU: 0 PID: 12006 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2956.881926][T10032] usb 6-1: new high-speed USB device number 106 using dummy_hcd [ 2956.889793][T12006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.908512][T12006] Call Trace: [ 2956.912420][T12006] dump_stack+0x116/0x15d [ 2956.917595][T12006] should_fail+0x231/0x240 [ 2956.922918][T12006] ? __kernfs_new_node+0x71/0x350 [ 2956.928582][T12006] __should_failslab+0x81/0x90 [ 2956.933795][T12006] should_failslab+0x5/0x20 [ 2956.938828][T12006] kmem_cache_alloc+0x36/0x2e0 [ 2956.944034][T12006] __kernfs_new_node+0x71/0x350 [ 2956.951302][T12006] ? rb_insert_color+0x2ac/0x2e0 [ 2956.956520][T12006] ? kernfs_link_sibling+0x21c/0x230 [ 2956.962231][T12006] ? kernfs_activate+0x2c5/0x2e0 [ 2956.968402][T12006] kernfs_new_node+0x5b/0xd0 [ 2956.973589][T12006] __kernfs_create_file+0x45/0x180 [ 2956.979757][T12006] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2956.985224][T12006] internal_create_group+0x2e4/0x850 [ 2956.991326][T12006] sysfs_create_groups+0x3d/0xf0 [ 2956.997658][T12006] device_add+0x6fe/0xe50 [ 2957.002935][T12006] netdev_register_kobject+0xfd/0x230 [ 2957.008384][T12006] register_netdevice+0xbcf/0x1060 [ 2957.013539][T12006] ipvlan_link_new+0x2a2/0x5d0 [ 2957.018627][T12006] rtnl_newlink+0xda6/0x13b0 [ 2957.023962][T12006] ? _raw_spin_unlock_irq+0x22/0x40 [ 2957.029156][T12006] ? finish_task_switch+0xc0/0x2a0 [ 2957.035008][T12006] ? __schedule+0x3c1/0x580 [ 2957.041406][T12006] ? widen_string+0x3a/0x280 [ 2957.046664][T12006] ? aa_get_newest_label+0x74/0x250 [ 2957.051926][T12006] ? apparmor_capable+0xfe/0x160 [ 2957.057004][T12006] ? bpf_lsm_capable+0x5/0x10 [ 2957.062412][T12006] ? security_capable+0x91/0xa0 [ 2957.067463][T12006] ? __rcu_read_unlock+0x51/0x250 [ 2957.073407][T12006] ? ns_capable+0x79/0xa0 [ 2957.079481][T12006] ? rtnl_setlink+0x270/0x270 [ 2957.085014][T12006] rtnetlink_rcv_msg+0x723/0x7c0 [ 2957.090320][T12006] ? ___cache_free+0x3c/0x2f0 [ 2957.094991][T12006] ? ima_match_policy+0xa80/0xab0 [ 2957.099996][T12006] ? __kfree_skb+0xfe/0x150 [ 2957.104479][T12006] ? __kfree_skb+0xfe/0x150 [ 2957.109027][T12006] ? consume_skb+0x4b/0x160 [ 2957.113507][T12006] ? nlmon_xmit+0x47/0x50 [ 2957.119098][T12006] ? xmit_one+0x173/0x2e0 [ 2957.123417][T12006] ? local_bh_enable+0x1b/0x20 [ 2957.128162][T12006] ? __dev_queue_xmit+0xbf2/0x1500 [ 2957.133288][T12006] ? __skb_clone+0x2a9/0x2c0 [ 2957.137920][T12006] ? __rcu_read_unlock+0x51/0x250 [ 2957.143010][T12006] netlink_rcv_skb+0x13e/0x240 [ 2957.147785][T12006] ? rtnetlink_bind+0x60/0x60 [ 2957.152474][T12006] rtnetlink_rcv+0x18/0x20 [ 2957.157027][T12006] netlink_unicast+0x5df/0x6b0 [ 2957.161769][T12006] netlink_sendmsg+0x6f8/0x7c0 [ 2957.166683][T12006] ? netlink_getsockopt+0x720/0x720 [ 2957.172429][T12006] ____sys_sendmsg+0x352/0x4c0 [ 2957.177173][T12006] ? import_iovec+0xb8/0xd0 [ 2957.181653][T12006] __sys_sendmsg+0x1ed/0x270 [ 2957.186222][T12006] ? __fsnotify_parent+0x32f/0x430 [ 2957.191327][T12006] ? get_pid_task+0x90/0xc0 [ 2957.195867][T12006] ? vfs_write+0x54d/0x7c0 [ 2957.200346][T12006] ? __fget_light+0x219/0x260 [ 2957.205054][T12006] ? fput+0x2d/0x130 [ 2957.208927][T12006] ? ksys_write+0x157/0x180 [ 2957.213409][T12006] __x64_sys_sendmsg+0x42/0x50 [ 2957.218151][T12006] do_syscall_64+0x39/0x80 [ 2957.222558][T12006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2957.228461][T12006] RIP: 0033:0x45e219 [ 2957.232339][T12006] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:43 executing program 0 (fault-call:14 fault-nth:66): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2957.251924][T12006] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2957.260311][T12006] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2957.268272][T12006] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2957.276319][T12006] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2957.284265][T12006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000041 [ 2957.292226][T12006] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2957.345014][T12008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2957.357362][T12008] FAULT_INJECTION: forcing a failure. [ 2957.357362][T12008] name failslab, interval 1, probability 0, space 0, times 0 [ 2957.375400][T12008] CPU: 0 PID: 12008 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2957.385200][T12008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.396569][T12008] Call Trace: [ 2957.400394][T12008] dump_stack+0x116/0x15d [ 2957.406927][T12008] should_fail+0x231/0x240 [ 2957.411812][T12008] ? __kernfs_new_node+0x71/0x350 [ 2957.417050][T12008] __should_failslab+0x81/0x90 [ 2957.422039][T12008] should_failslab+0x5/0x20 [ 2957.427352][T12008] kmem_cache_alloc+0x36/0x2e0 [ 2957.432514][T12008] __kernfs_new_node+0x71/0x350 [ 2957.437886][T12008] ? rb_insert_color+0x2ac/0x2e0 [ 2957.442838][T12008] ? kernfs_link_sibling+0x21c/0x230 [ 2957.448111][T12008] ? kernfs_activate+0x2c5/0x2e0 [ 2957.453046][T12008] kernfs_new_node+0x5b/0xd0 [ 2957.457736][T12008] __kernfs_create_file+0x45/0x180 [ 2957.462888][T12008] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2957.468601][T12008] internal_create_group+0x2e4/0x850 [ 2957.473887][T12008] sysfs_create_groups+0x3d/0xf0 [ 2957.478804][T12008] device_add+0x6fe/0xe50 [ 2957.483114][T12008] netdev_register_kobject+0xfd/0x230 [ 2957.488550][T12008] register_netdevice+0xbcf/0x1060 [ 2957.493722][T12008] ipvlan_link_new+0x2a2/0x5d0 [ 2957.498638][T12008] rtnl_newlink+0xda6/0x13b0 [ 2957.503316][T12008] ? __schedule+0x3c1/0x580 [ 2957.508006][T12008] ? prandom_u32_state+0x9/0x80 [ 2957.512957][T12008] ? aa_get_newest_label+0x74/0x250 [ 2957.518262][T12008] ? apparmor_capable+0xfe/0x160 [ 2957.523305][T12008] ? bpf_lsm_capable+0x5/0x10 [ 2957.527971][T12008] ? security_capable+0x91/0xa0 [ 2957.532817][T12008] ? __rcu_read_unlock+0x51/0x250 [ 2957.537850][T12008] ? ns_capable+0x79/0xa0 [ 2957.542466][T12008] ? rtnl_setlink+0x270/0x270 [ 2957.547251][T12008] rtnetlink_rcv_msg+0x723/0x7c0 [ 2957.552400][T12008] ? ___cache_free+0x3c/0x2f0 [ 2957.557319][T12008] ? ima_match_policy+0xa80/0xab0 [ 2957.562729][T12008] ? __kfree_skb+0xfe/0x150 [ 2957.567916][T12008] ? __kfree_skb+0xfe/0x150 [ 2957.572491][T12008] ? consume_skb+0x4b/0x160 [ 2957.577144][T12008] ? nlmon_xmit+0x47/0x50 [ 2957.581478][T12008] ? xmit_one+0x173/0x2e0 [ 2957.585792][T12008] ? local_bh_enable+0x1b/0x20 [ 2957.590645][T12008] ? __dev_queue_xmit+0xbf2/0x1500 [ 2957.596063][T12008] ? __skb_clone+0x2a9/0x2c0 [ 2957.601072][T12008] ? __rcu_read_unlock+0x51/0x250 [ 2957.606096][T12008] netlink_rcv_skb+0x13e/0x240 [ 2957.611004][T12008] ? rtnetlink_bind+0x60/0x60 [ 2957.615758][T12008] rtnetlink_rcv+0x18/0x20 [ 2957.620693][T12008] netlink_unicast+0x5df/0x6b0 [ 2957.625996][T12008] netlink_sendmsg+0x6f8/0x7c0 [ 2957.630833][T12008] ? netlink_getsockopt+0x720/0x720 [ 2957.636094][T12008] ____sys_sendmsg+0x352/0x4c0 [ 2957.640844][T12008] ? import_iovec+0xb8/0xd0 [ 2957.645334][T12008] __sys_sendmsg+0x1ed/0x270 [ 2957.649986][T12008] ? __fsnotify_parent+0x32f/0x430 [ 2957.655144][T12008] ? get_pid_task+0x90/0xc0 [ 2957.659727][T12008] ? vfs_write+0x54d/0x7c0 [ 2957.664150][T12008] ? __fget_light+0x219/0x260 [ 2957.668939][T12008] ? fput+0x2d/0x130 [ 2957.672822][T12008] ? __fpregs_load_activate+0x103/0x1f0 [ 2957.678365][T12008] __x64_sys_sendmsg+0x42/0x50 [ 2957.683239][T12008] do_syscall_64+0x39/0x80 [ 2957.687749][T12008] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2957.693686][T12008] RIP: 0033:0x45e219 [ 2957.697558][T12008] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2957.717890][T12008] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2957.726287][T12008] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2957.734431][T12008] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:44 executing program 0 (fault-call:14 fault-nth:67): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2957.742431][T12008] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2957.750419][T12008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000042 [ 2957.759775][T12008] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2957.807562][T12010] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2957.820128][T12010] FAULT_INJECTION: forcing a failure. [ 2957.820128][T12010] name failslab, interval 1, probability 0, space 0, times 0 [ 2957.837322][T12010] CPU: 0 PID: 12010 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2957.847860][T12010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.859084][T12010] Call Trace: [ 2957.863145][T12010] dump_stack+0x116/0x15d [ 2957.868423][T12010] should_fail+0x231/0x240 [ 2957.873982][T12010] ? __kernfs_new_node+0x71/0x350 [ 2957.879229][T12010] __should_failslab+0x81/0x90 [ 2957.884641][T12010] should_failslab+0x5/0x20 [ 2957.889827][T12010] kmem_cache_alloc+0x36/0x2e0 [ 2957.896642][T12010] __kernfs_new_node+0x71/0x350 [ 2957.902087][T12010] ? rb_insert_color+0x7e/0x2e0 [ 2957.907432][T12010] ? kernfs_link_sibling+0x21c/0x230 [ 2957.913807][T12010] ? kernfs_activate+0x2c5/0x2e0 [ 2957.919356][T12010] kernfs_new_node+0x5b/0xd0 [ 2957.925012][T12010] __kernfs_create_file+0x45/0x180 [ 2957.930515][T12010] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2957.936033][T12010] internal_create_group+0x2e4/0x850 [ 2957.941337][T12010] sysfs_create_groups+0x3d/0xf0 [ 2957.946742][T12010] device_add+0x6fe/0xe50 [ 2957.951862][T12010] netdev_register_kobject+0xfd/0x230 [ 2957.958230][T12010] register_netdevice+0xbcf/0x1060 [ 2957.963458][T12010] ipvlan_link_new+0x2a2/0x5d0 [ 2957.968809][T12010] rtnl_newlink+0xda6/0x13b0 [ 2957.974140][T12010] ? kcsan_setup_watchpoint+0x1fc/0x4e0 [ 2957.980507][T12010] ? aa_get_newest_label+0x74/0x250 [ 2957.986348][T12010] ? apparmor_capable+0xfe/0x160 [ 2957.991673][T12010] ? bpf_lsm_capable+0x5/0x10 [ 2957.996932][T12010] ? security_capable+0x91/0xa0 [ 2958.002472][T12010] ? __rcu_read_unlock+0x51/0x250 [ 2958.008600][T12010] ? ns_capable+0x79/0xa0 [ 2958.013856][T12010] ? rtnl_setlink+0x270/0x270 [ 2958.018968][T12010] rtnetlink_rcv_msg+0x723/0x7c0 [ 2958.024740][T12010] ? ___cache_free+0x3c/0x2f0 [ 2958.030458][T12010] ? ima_match_policy+0xa80/0xab0 [ 2958.035686][T12010] ? __kfree_skb+0xfe/0x150 [ 2958.040987][T12010] ? __kfree_skb+0xfe/0x150 [ 2958.046293][T12010] ? consume_skb+0x4b/0x160 [ 2958.050890][T12010] ? nlmon_xmit+0x47/0x50 [ 2958.056344][T12010] ? xmit_one+0x173/0x2e0 [ 2958.060870][T12010] ? local_bh_enable+0x1b/0x20 [ 2958.066004][T12010] ? __dev_queue_xmit+0xbf2/0x1500 [ 2958.071881][T12010] ? __skb_clone+0x2a9/0x2c0 [ 2958.077112][T12010] ? __rcu_read_unlock+0x51/0x250 [ 2958.082636][T12010] netlink_rcv_skb+0x13e/0x240 [ 2958.087704][T12010] ? rtnetlink_bind+0x60/0x60 [ 2958.092474][T12010] rtnetlink_rcv+0x18/0x20 [ 2958.096877][T12010] netlink_unicast+0x5df/0x6b0 [ 2958.101633][T12010] netlink_sendmsg+0x6f8/0x7c0 [ 2958.106745][T12010] ? netlink_getsockopt+0x720/0x720 [ 2958.112653][T12010] ____sys_sendmsg+0x352/0x4c0 [ 2958.117647][T12010] ? import_iovec+0xb8/0xd0 [ 2958.122417][T12010] __sys_sendmsg+0x1ed/0x270 [ 2958.127182][T12010] ? __fsnotify_parent+0x32f/0x430 [ 2958.132413][T12010] ? get_pid_task+0x90/0xc0 [ 2958.137076][T12010] ? vfs_write+0x54d/0x7c0 [ 2958.141492][T12010] ? __fget_light+0x219/0x260 [ 2958.146555][T12010] ? fput+0x2d/0x130 [ 2958.150530][T12010] ? ksys_write+0x157/0x180 [ 2958.155019][T12010] __x64_sys_sendmsg+0x42/0x50 [ 2958.159768][T12010] do_syscall_64+0x39/0x80 [ 2958.164246][T12010] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2958.170303][T12010] RIP: 0033:0x45e219 [ 2958.174438][T12010] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2958.194867][T12010] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2958.203492][T12010] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2958.211798][T12010] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2958.219860][T12010] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2958.228772][T12010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000043 [ 2958.237748][T12010] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:45 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x8]}, 0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0xe46, {{0xa, 0x4e22, 0xffffffff, @mcast2, 0x1}}, 0x1, 0x6, [{{0xa, 0x4e20, 0xfffffffd, @remote, 0xffffffff}}, {{0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x3d}}}, {{0xa, 0x4e22, 0x0, @remote, 0x101}}, {{0xa, 0x4e22, 0x80, @mcast1, 0xff}}, {{0xa, 0x4e24, 0x4b2, @loopback, 0x9}}, {{0xa, 0x4e22, 0x3ff, @private0={0xfc, 0x0, [], 0x1}, 0x800}}]}, 0x390) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:15:45 executing program 0 (fault-call:14 fault-nth:68): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2958.300707][T10032] usb 6-1: Using ep0 maxpacket: 32 17:15:45 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:45 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:45 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2958.380164][T10032] usb 6-1: device descriptor read/all, error -71 [ 2958.401130][T12018] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2958.414747][T12018] FAULT_INJECTION: forcing a failure. [ 2958.414747][T12018] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.428300][T12018] CPU: 0 PID: 12018 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2958.438479][T12018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.448797][T12018] Call Trace: [ 2958.452157][T12018] dump_stack+0x116/0x15d [ 2958.456661][T12018] should_fail+0x231/0x240 [ 2958.461346][T12018] ? __kernfs_new_node+0x71/0x350 [ 2958.466784][T12018] __should_failslab+0x81/0x90 [ 2958.472108][T12018] should_failslab+0x5/0x20 [ 2958.476650][T12018] kmem_cache_alloc+0x36/0x2e0 [ 2958.481407][T12018] __kernfs_new_node+0x71/0x350 [ 2958.486302][T12018] ? rb_insert_color+0x28d/0x2e0 [ 2958.491300][T12018] ? kernfs_link_sibling+0x21c/0x230 [ 2958.496745][T12018] ? kernfs_activate+0x2c5/0x2e0 [ 2958.501715][T12018] kernfs_new_node+0x5b/0xd0 [ 2958.506298][T12018] __kernfs_create_file+0x45/0x180 [ 2958.511404][T12018] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2958.516783][T12018] internal_create_group+0x2e4/0x850 [ 2958.522289][T12018] sysfs_create_groups+0x3d/0xf0 [ 2958.528901][T12018] device_add+0x6fe/0xe50 [ 2958.533377][T12018] netdev_register_kobject+0xfd/0x230 [ 2958.539453][T12018] register_netdevice+0xbcf/0x1060 [ 2958.544608][T12018] ipvlan_link_new+0x2a2/0x5d0 [ 2958.550008][T12018] rtnl_newlink+0xda6/0x13b0 [ 2958.555492][T12018] ? _raw_spin_unlock_irq+0x22/0x40 [ 2958.561612][T12018] ? finish_task_switch+0xc0/0x2a0 [ 2958.568608][T12018] ? widen_string+0x3a/0x280 [ 2958.573722][T12018] ? widen_string+0x3a/0x280 [ 2958.578450][T12018] ? aa_get_newest_label+0x74/0x250 [ 2958.584107][T12018] ? apparmor_capable+0xfe/0x160 [ 2958.589077][T12018] ? bpf_lsm_capable+0x5/0x10 [ 2958.593764][T12018] ? security_capable+0x91/0xa0 [ 2958.598689][T12018] ? __rcu_read_unlock+0x51/0x250 [ 2958.604040][T12018] ? ns_capable+0x79/0xa0 [ 2958.608361][T12018] ? rtnl_setlink+0x270/0x270 [ 2958.613222][T12018] rtnetlink_rcv_msg+0x723/0x7c0 [ 2958.618750][T12018] ? ___cache_free+0x3c/0x2f0 [ 2958.626563][T12018] ? ima_match_policy+0xa80/0xab0 [ 2958.631702][T12018] ? __kfree_skb+0xfe/0x150 [ 2958.636741][T12018] ? __kfree_skb+0xfe/0x150 [ 2958.641250][T12018] ? consume_skb+0x4b/0x160 [ 2958.645910][T12018] ? nlmon_xmit+0x47/0x50 [ 2958.651486][T12018] ? xmit_one+0x173/0x2e0 [ 2958.656390][T12018] ? local_bh_enable+0x1b/0x20 [ 2958.661404][T12018] ? __dev_queue_xmit+0xbf2/0x1500 [ 2958.666756][T12018] ? __skb_clone+0x2a9/0x2c0 [ 2958.671704][T12018] ? __rcu_read_unlock+0x51/0x250 [ 2958.678344][T12018] netlink_rcv_skb+0x13e/0x240 [ 2958.683326][T12018] ? rtnetlink_bind+0x60/0x60 [ 2958.688079][T12018] rtnetlink_rcv+0x18/0x20 [ 2958.692516][T12018] netlink_unicast+0x5df/0x6b0 [ 2958.697739][T12018] netlink_sendmsg+0x6f8/0x7c0 [ 2958.703118][T12018] ? netlink_getsockopt+0x720/0x720 [ 2958.709590][T12018] ____sys_sendmsg+0x352/0x4c0 [ 2958.715134][T12018] ? import_iovec+0xb8/0xd0 [ 2958.719992][T12018] __sys_sendmsg+0x1ed/0x270 [ 2958.726955][T12018] ? __fsnotify_parent+0x32f/0x430 [ 2958.732149][T12018] ? get_pid_task+0x90/0xc0 [ 2958.736687][T12018] ? vfs_write+0x54d/0x7c0 [ 2958.741111][T12018] ? __fget_light+0x219/0x260 [ 2958.745963][T12018] ? fput+0x2d/0x130 [ 2958.749961][T12018] ? ksys_write+0x157/0x180 [ 2958.754776][T12018] __x64_sys_sendmsg+0x42/0x50 [ 2958.759820][T12018] do_syscall_64+0x39/0x80 [ 2958.765377][T12018] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2958.771285][T12018] RIP: 0033:0x45e219 [ 2958.775159][T12018] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2958.795118][T12018] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2958.803561][T12018] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2958.811538][T12018] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2958.819680][T12018] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:45 executing program 0 (fault-call:14 fault-nth:69): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2958.828157][T12018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000044 [ 2958.836137][T12018] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2958.894981][T12031] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2958.906428][T12031] FAULT_INJECTION: forcing a failure. [ 2958.906428][T12031] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.920308][T12031] CPU: 0 PID: 12031 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2958.929155][T12031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.939527][T12031] Call Trace: [ 2958.943665][T12031] dump_stack+0x116/0x15d [ 2958.948061][T12031] should_fail+0x231/0x240 [ 2958.952512][T12031] ? __kernfs_new_node+0x71/0x350 [ 2958.959182][T12031] __should_failslab+0x81/0x90 [ 2958.964438][T12031] should_failslab+0x5/0x20 [ 2958.970021][T12031] kmem_cache_alloc+0x36/0x2e0 [ 2958.974817][T12031] __kernfs_new_node+0x71/0x350 [ 2958.980294][T12031] ? rb_insert_color+0x28d/0x2e0 [ 2958.985922][T12031] ? kernfs_link_sibling+0x21c/0x230 [ 2958.991218][T12031] ? kernfs_activate+0x2c5/0x2e0 [ 2958.996764][T12031] kernfs_new_node+0x5b/0xd0 [ 2959.002034][T12031] __kernfs_create_file+0x45/0x180 [ 2959.007255][T12031] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2959.012895][T12031] internal_create_group+0x2e4/0x850 [ 2959.018593][T12031] sysfs_create_groups+0x3d/0xf0 [ 2959.023807][T12031] device_add+0x6fe/0xe50 [ 2959.028598][T12031] netdev_register_kobject+0xfd/0x230 [ 2959.034350][T12031] register_netdevice+0xbcf/0x1060 [ 2959.039970][T12031] ipvlan_link_new+0x2a2/0x5d0 [ 2959.045372][T12031] rtnl_newlink+0xda6/0x13b0 [ 2959.050787][T12031] ? __schedule+0x3c1/0x580 [ 2959.056151][T12031] ? __perf_event_task_sched_in+0x565/0x590 [ 2959.062883][T12031] ? kvm_sched_clock_read+0x15/0x40 [ 2959.068430][T12031] ? sched_clock+0xf/0x20 [ 2959.073796][T12031] ? widen_string+0x3a/0x280 [ 2959.079390][T12031] ? aa_get_newest_label+0x74/0x250 [ 2959.085013][T12031] ? apparmor_capable+0xfe/0x160 [ 2959.090545][T12031] ? bpf_lsm_capable+0x5/0x10 [ 2959.095798][T12031] ? security_capable+0x91/0xa0 [ 2959.101862][T12031] ? __rcu_read_unlock+0x51/0x250 [ 2959.108111][T12031] ? ns_capable+0x79/0xa0 [ 2959.113734][T12031] ? rtnl_setlink+0x270/0x270 [ 2959.119644][T12031] rtnetlink_rcv_msg+0x723/0x7c0 [ 2959.124832][T12031] ? ___cache_free+0x3c/0x2f0 [ 2959.132163][T12031] ? ima_match_policy+0xa80/0xab0 [ 2959.137588][T12031] ? __kfree_skb+0xfe/0x150 [ 2959.143800][T12031] ? __kfree_skb+0xfe/0x150 [ 2959.148929][T12031] ? consume_skb+0x4b/0x160 [ 2959.154670][T12031] ? nlmon_xmit+0x47/0x50 [ 2959.159953][T12031] ? xmit_one+0x173/0x2e0 [ 2959.165199][T12031] ? local_bh_enable+0x1b/0x20 [ 2959.170810][T12031] ? __dev_queue_xmit+0xbf2/0x1500 [ 2959.176019][T12031] ? __skb_clone+0x2a9/0x2c0 [ 2959.180650][T12031] ? __rcu_read_unlock+0x51/0x250 [ 2959.185691][T12031] netlink_rcv_skb+0x13e/0x240 [ 2959.190453][T12031] ? rtnetlink_bind+0x60/0x60 [ 2959.195123][T12031] rtnetlink_rcv+0x18/0x20 [ 2959.199627][T12031] netlink_unicast+0x5df/0x6b0 [ 2959.204379][T12031] netlink_sendmsg+0x6f8/0x7c0 [ 2959.209172][T12031] ? netlink_getsockopt+0x720/0x720 [ 2959.214407][T12031] ____sys_sendmsg+0x352/0x4c0 [ 2959.219355][T12031] ? import_iovec+0xb8/0xd0 [ 2959.223858][T12031] __sys_sendmsg+0x1ed/0x270 [ 2959.228427][T12031] ? __fsnotify_parent+0x32f/0x430 [ 2959.233522][T12031] ? get_pid_task+0x90/0xc0 [ 2959.238020][T12031] ? vfs_write+0x54d/0x7c0 [ 2959.244438][T12031] ? __fget_light+0x219/0x260 [ 2959.249365][T12031] ? fput+0x2d/0x130 [ 2959.253310][T12031] ? ksys_write+0x157/0x180 [ 2959.257807][T12031] __x64_sys_sendmsg+0x42/0x50 [ 2959.262644][T12031] do_syscall_64+0x39/0x80 [ 2959.267044][T12031] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2959.272921][T12031] RIP: 0033:0x45e219 [ 2959.276805][T12031] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.297122][T12031] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2959.310222][T12031] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2959.318636][T12031] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2959.329914][T12031] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2959.338099][T12031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000045 17:15:46 executing program 0 (fault-call:14 fault-nth:70): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:46 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2959.346291][T12031] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2959.402466][T12035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2959.413840][T12035] FAULT_INJECTION: forcing a failure. [ 2959.413840][T12035] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.426736][T12035] CPU: 0 PID: 12035 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2959.436203][T12035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.446727][T12035] Call Trace: [ 2959.450599][T12035] dump_stack+0x116/0x15d [ 2959.455986][T12035] should_fail+0x231/0x240 [ 2959.460501][T12035] ? __kernfs_new_node+0x71/0x350 [ 2959.465767][T12035] __should_failslab+0x81/0x90 [ 2959.471250][T12035] should_failslab+0x5/0x20 [ 2959.476766][T12035] kmem_cache_alloc+0x36/0x2e0 [ 2959.482510][T12035] __kernfs_new_node+0x71/0x350 [ 2959.487771][T12035] ? rb_insert_color+0x28d/0x2e0 [ 2959.493099][T12035] ? kernfs_link_sibling+0x21c/0x230 [ 2959.498508][T12035] ? kernfs_activate+0x2c5/0x2e0 [ 2959.503900][T12035] kernfs_new_node+0x5b/0xd0 [ 2959.508547][T12035] __kernfs_create_file+0x45/0x180 [ 2959.513671][T12035] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2959.519209][T12035] internal_create_group+0x2e4/0x850 [ 2959.524875][T12035] sysfs_create_groups+0x3d/0xf0 [ 2959.529812][T12035] device_add+0x6fe/0xe50 [ 2959.534351][T12035] netdev_register_kobject+0xfd/0x230 [ 2959.540135][T12035] register_netdevice+0xbcf/0x1060 [ 2959.545301][T12035] ipvlan_link_new+0x2a2/0x5d0 [ 2959.550266][T12035] rtnl_newlink+0xda6/0x13b0 [ 2959.555275][T12035] ? prandom_u32_state+0x9/0x80 [ 2959.560364][T12035] ? __perf_event_task_sched_in+0x565/0x590 [ 2959.570067][T12035] ? kvm_sched_clock_read+0x15/0x40 [ 2959.575426][T12035] ? sched_clock+0xf/0x20 [ 2959.579909][T12035] ? widen_string+0x3a/0x280 [ 2959.584538][T12035] ? aa_get_newest_label+0x74/0x250 [ 2959.589840][T12035] ? apparmor_capable+0xfe/0x160 [ 2959.594954][T12035] ? bpf_lsm_capable+0x5/0x10 [ 2959.599818][T12035] ? security_capable+0x91/0xa0 [ 2959.604667][T12035] ? __rcu_read_unlock+0x51/0x250 [ 2959.609710][T12035] ? ns_capable+0x79/0xa0 [ 2959.614125][T12035] ? rtnl_setlink+0x270/0x270 [ 2959.618811][T12035] rtnetlink_rcv_msg+0x723/0x7c0 [ 2959.623744][T12035] ? ___cache_free+0x3c/0x2f0 [ 2959.628490][T12035] ? ima_match_policy+0xa80/0xab0 [ 2959.633764][T12035] ? __kfree_skb+0xfe/0x150 [ 2959.638602][T12035] ? __kfree_skb+0xfe/0x150 [ 2959.643169][T12035] ? consume_skb+0x4b/0x160 [ 2959.647661][T12035] ? nlmon_xmit+0x47/0x50 [ 2959.652016][T12035] ? xmit_one+0x173/0x2e0 [ 2959.656347][T12035] ? local_bh_enable+0x1b/0x20 [ 2959.661310][T12035] ? __dev_queue_xmit+0xbf2/0x1500 [ 2959.666510][T12035] ? __skb_clone+0x2a9/0x2c0 [ 2959.671090][T12035] ? __rcu_read_unlock+0x51/0x250 [ 2959.676175][T12035] netlink_rcv_skb+0x13e/0x240 [ 2959.680943][T12035] ? rtnetlink_bind+0x60/0x60 [ 2959.685617][T12035] rtnetlink_rcv+0x18/0x20 [ 2959.690067][T12035] netlink_unicast+0x5df/0x6b0 [ 2959.694824][T12035] netlink_sendmsg+0x6f8/0x7c0 [ 2959.699991][T12035] ? netlink_getsockopt+0x720/0x720 [ 2959.705378][T12035] ____sys_sendmsg+0x352/0x4c0 [ 2959.710289][T12035] ? import_iovec+0xb8/0xd0 [ 2959.714824][T12035] __sys_sendmsg+0x1ed/0x270 [ 2959.719483][T12035] ? __fsnotify_parent+0x32f/0x430 [ 2959.724587][T12035] ? get_pid_task+0x90/0xc0 [ 2959.729264][T12035] ? vfs_write+0x54d/0x7c0 [ 2959.733695][T12035] ? __fget_light+0x219/0x260 [ 2959.738373][T12035] ? fput+0x2d/0x130 [ 2959.742776][T12035] ? ksys_write+0x157/0x180 [ 2959.747284][T12035] __x64_sys_sendmsg+0x42/0x50 [ 2959.752055][T12035] do_syscall_64+0x39/0x80 [ 2959.757581][T12035] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2959.763758][T12035] RIP: 0033:0x45e219 [ 2959.768007][T12035] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.789074][T12035] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2959.797590][T12035] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2959.805974][T12035] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2959.814440][T12035] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2959.824291][T12035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000046 [ 2959.832928][T12035] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:46 executing program 0 (fault-call:14 fault-nth:71): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2959.853910][T10032] usb 6-1: new high-speed USB device number 107 using dummy_hcd [ 2959.896226][T12038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2959.909377][T12038] FAULT_INJECTION: forcing a failure. [ 2959.909377][T12038] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.929221][T12038] CPU: 1 PID: 12038 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2959.940128][T12038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.950301][T12038] Call Trace: [ 2959.953997][T12038] dump_stack+0x116/0x15d [ 2959.959035][T12038] should_fail+0x231/0x240 [ 2959.964181][T12038] ? __kernfs_new_node+0x71/0x350 [ 2959.969350][T12038] __should_failslab+0x81/0x90 [ 2959.974340][T12038] should_failslab+0x5/0x20 [ 2959.979270][T12038] kmem_cache_alloc+0x36/0x2e0 [ 2959.984814][T12038] __kernfs_new_node+0x71/0x350 [ 2959.990805][T12038] ? rb_insert_color+0x7e/0x2e0 [ 2959.996630][T12038] ? kernfs_link_sibling+0x21c/0x230 [ 2960.003651][T12038] ? kernfs_activate+0x2c5/0x2e0 [ 2960.009858][T12038] kernfs_new_node+0x5b/0xd0 [ 2960.014901][T12038] __kernfs_create_file+0x45/0x180 [ 2960.020668][T12038] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2960.027060][T12038] internal_create_group+0x2e4/0x850 [ 2960.033178][T12038] sysfs_create_groups+0x3d/0xf0 [ 2960.039647][T12038] device_add+0x6fe/0xe50 [ 2960.045020][T12038] netdev_register_kobject+0xfd/0x230 [ 2960.050427][T12038] register_netdevice+0xbcf/0x1060 [ 2960.055559][T12038] ipvlan_link_new+0x2a2/0x5d0 [ 2960.061964][T12038] rtnl_newlink+0xda6/0x13b0 [ 2960.068380][T12038] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2960.074697][T12038] ? widen_string+0x3a/0x280 [ 2960.079506][T12038] ? aa_get_newest_label+0x74/0x250 [ 2960.084809][T12038] ? apparmor_capable+0xfe/0x160 [ 2960.090073][T12038] ? bpf_lsm_capable+0x5/0x10 [ 2960.095375][T12038] ? security_capable+0x91/0xa0 [ 2960.100351][T12038] ? __rcu_read_unlock+0x51/0x250 [ 2960.105597][T12038] ? ns_capable+0x79/0xa0 [ 2960.109988][T12038] ? rtnl_setlink+0x270/0x270 [ 2960.114702][T12038] rtnetlink_rcv_msg+0x723/0x7c0 [ 2960.120344][T12038] ? ___cache_free+0x3c/0x2f0 [ 2960.125175][T12038] ? ima_match_policy+0xa80/0xab0 [ 2960.130179][T12038] ? __kfree_skb+0xfe/0x150 [ 2960.134696][T12038] ? __kfree_skb+0xfe/0x150 [ 2960.139189][T12038] ? consume_skb+0x4b/0x160 [ 2960.143668][T12038] ? nlmon_xmit+0x47/0x50 [ 2960.148363][T12038] ? xmit_one+0x173/0x2e0 [ 2960.152938][T12038] ? local_bh_enable+0x1b/0x20 [ 2960.158041][T12038] ? __dev_queue_xmit+0xbf2/0x1500 [ 2960.164114][T12038] ? __skb_clone+0x2a9/0x2c0 [ 2960.168683][T12038] ? __rcu_read_unlock+0x51/0x250 [ 2960.173731][T12038] netlink_rcv_skb+0x13e/0x240 [ 2960.178473][T12038] ? rtnetlink_bind+0x60/0x60 [ 2960.183128][T12038] rtnetlink_rcv+0x18/0x20 [ 2960.187522][T12038] netlink_unicast+0x5df/0x6b0 [ 2960.192301][T12038] netlink_sendmsg+0x6f8/0x7c0 [ 2960.197081][T12038] ? netlink_getsockopt+0x720/0x720 [ 2960.202272][T12038] ____sys_sendmsg+0x352/0x4c0 [ 2960.207016][T12038] ? import_iovec+0xb8/0xd0 [ 2960.212289][T12038] __sys_sendmsg+0x1ed/0x270 [ 2960.216979][T12038] ? __fsnotify_parent+0x32f/0x430 [ 2960.223361][T12038] ? get_pid_task+0x90/0xc0 [ 2960.227857][T12038] ? vfs_write+0x54d/0x7c0 [ 2960.232382][T12038] ? __fget_light+0x219/0x260 [ 2960.237076][T12038] ? fput+0x2d/0x130 [ 2960.240969][T12038] ? ksys_write+0x157/0x180 [ 2960.245503][T12038] __x64_sys_sendmsg+0x42/0x50 [ 2960.250535][T12038] do_syscall_64+0x39/0x80 [ 2960.255145][T12038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2960.261211][T12038] RIP: 0033:0x45e219 [ 2960.265138][T12038] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2960.284898][T12038] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:47 executing program 0 (fault-call:14 fault-nth:72): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2960.293535][T12038] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2960.301491][T12038] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2960.309455][T12038] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2960.317516][T12038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000047 [ 2960.327349][T12038] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2960.396143][T12040] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2960.422153][T12040] FAULT_INJECTION: forcing a failure. [ 2960.422153][T12040] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.435073][T12040] CPU: 0 PID: 12040 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2960.444280][T12040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.454529][T12040] Call Trace: [ 2960.458598][T12040] dump_stack+0x116/0x15d [ 2960.463863][T12040] should_fail+0x231/0x240 [ 2960.469576][T12040] ? __kernfs_new_node+0x71/0x350 [ 2960.475214][T12040] __should_failslab+0x81/0x90 [ 2960.480233][T12040] should_failslab+0x5/0x20 [ 2960.485511][T12040] kmem_cache_alloc+0x36/0x2e0 [ 2960.491239][T12040] __kernfs_new_node+0x71/0x350 [ 2960.496978][T12040] ? rb_insert_color+0x7e/0x2e0 [ 2960.502545][T12040] ? kernfs_link_sibling+0x21c/0x230 [ 2960.508167][T12040] ? kernfs_activate+0x2c5/0x2e0 [ 2960.513856][T12040] kernfs_new_node+0x5b/0xd0 [ 2960.519227][T12040] __kernfs_create_file+0x45/0x180 [ 2960.524940][T12040] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2960.530614][T12040] internal_create_group+0x2e4/0x850 [ 2960.536585][T12040] sysfs_create_groups+0x3d/0xf0 [ 2960.541908][T12040] device_add+0x6fe/0xe50 [ 2960.546401][T12040] netdev_register_kobject+0xfd/0x230 [ 2960.552028][T12040] register_netdevice+0xbcf/0x1060 [ 2960.557589][T12040] ipvlan_link_new+0x2a2/0x5d0 [ 2960.562630][T12040] rtnl_newlink+0xda6/0x13b0 [ 2960.571325][T12040] ? prandom_u32_state+0x9/0x80 [ 2960.576511][T12040] ? widen_string+0x3a/0x280 [ 2960.581246][T12040] ? widen_string+0x3a/0x280 [ 2960.585917][T12040] ? aa_get_newest_label+0x74/0x250 [ 2960.591158][T12040] ? apparmor_capable+0xfe/0x160 [ 2960.596146][T12040] ? bpf_lsm_capable+0x5/0x10 [ 2960.601047][T12040] ? security_capable+0x91/0xa0 [ 2960.606074][T12040] ? __rcu_read_unlock+0x51/0x250 [ 2960.611398][T12040] ? ns_capable+0x79/0xa0 [ 2960.615808][T12040] ? rtnl_setlink+0x270/0x270 [ 2960.620673][T12040] rtnetlink_rcv_msg+0x723/0x7c0 [ 2960.625637][T12040] ? ___cache_free+0x3c/0x2f0 [ 2960.630425][T12040] ? ima_match_policy+0xa80/0xab0 [ 2960.635462][T12040] ? __kfree_skb+0xfe/0x150 [ 2960.640127][T12040] ? __kfree_skb+0xfe/0x150 [ 2960.644623][T12040] ? consume_skb+0x4b/0x160 [ 2960.649139][T12040] ? nlmon_xmit+0x47/0x50 [ 2960.653645][T12040] ? xmit_one+0x173/0x2e0 [ 2960.658161][T12040] ? local_bh_enable+0x1b/0x20 [ 2960.662919][T12040] ? __dev_queue_xmit+0xbf2/0x1500 [ 2960.668612][T12040] ? __skb_clone+0x2a9/0x2c0 [ 2960.673578][T12040] ? __rcu_read_unlock+0x51/0x250 [ 2960.678923][T12040] netlink_rcv_skb+0x13e/0x240 [ 2960.683712][T12040] ? rtnetlink_bind+0x60/0x60 [ 2960.688717][T12040] rtnetlink_rcv+0x18/0x20 [ 2960.693238][T12040] netlink_unicast+0x5df/0x6b0 [ 2960.698125][T12040] netlink_sendmsg+0x6f8/0x7c0 [ 2960.703322][T12040] ? netlink_getsockopt+0x720/0x720 [ 2960.708564][T12040] ____sys_sendmsg+0x352/0x4c0 [ 2960.713423][T12040] ? import_iovec+0xb8/0xd0 [ 2960.718486][T12040] __sys_sendmsg+0x1ed/0x270 [ 2960.723817][T12040] ? __fsnotify_parent+0x32f/0x430 [ 2960.729248][T12040] ? get_pid_task+0x90/0xc0 [ 2960.734016][T12040] ? vfs_write+0x54d/0x7c0 [ 2960.738794][T12040] ? __fget_light+0x219/0x260 [ 2960.743539][T12040] ? fput+0x2d/0x130 [ 2960.747480][T12040] ? ksys_write+0x157/0x180 [ 2960.751994][T12040] __x64_sys_sendmsg+0x42/0x50 [ 2960.757078][T12040] do_syscall_64+0x39/0x80 [ 2960.762408][T12040] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2960.768516][T12040] RIP: 0033:0x45e219 [ 2960.772806][T12040] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2960.792712][T12040] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2960.803194][T12040] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2960.811167][T12040] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2960.819139][T12040] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2960.827178][T12040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000048 [ 2960.835321][T12040] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:47 executing program 0 (fault-call:14 fault-nth:73): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2960.853498][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2960.936784][T12042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2960.962634][T12042] FAULT_INJECTION: forcing a failure. [ 2960.962634][T12042] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.978132][T12042] CPU: 1 PID: 12042 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2960.988375][T12042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.999358][T12042] Call Trace: [ 2961.002684][T12042] dump_stack+0x116/0x15d [ 2961.008312][T12042] should_fail+0x231/0x240 [ 2961.012731][T12042] ? __kernfs_new_node+0x71/0x350 [ 2961.017825][T12042] __should_failslab+0x81/0x90 [ 2961.023089][T12042] should_failslab+0x5/0x20 [ 2961.027664][T12042] kmem_cache_alloc+0x36/0x2e0 [ 2961.032407][T12042] __kernfs_new_node+0x71/0x350 [ 2961.037237][T12042] ? rb_insert_color+0x2ac/0x2e0 [ 2961.042698][T12042] ? kernfs_link_sibling+0x21c/0x230 [ 2961.047963][T12042] ? kernfs_activate+0x2c5/0x2e0 [ 2961.053024][T12042] kernfs_new_node+0x5b/0xd0 [ 2961.057594][T12042] __kernfs_create_file+0x45/0x180 [ 2961.062756][T12042] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2961.068113][T12042] internal_create_group+0x2e4/0x850 [ 2961.073499][T12042] sysfs_create_groups+0x3d/0xf0 [ 2961.078421][T12042] device_add+0x6fe/0xe50 [ 2961.082902][T12042] netdev_register_kobject+0xfd/0x230 [ 2961.088488][T12042] register_netdevice+0xbcf/0x1060 [ 2961.093578][T12042] ipvlan_link_new+0x2a2/0x5d0 [ 2961.098378][T12042] rtnl_newlink+0xda6/0x13b0 [ 2961.103051][T12042] ? number+0xa03/0xb50 [ 2961.107195][T12042] ? format_decode+0x1d3/0x840 [ 2961.112088][T12042] ? widen_string+0x3a/0x280 [ 2961.116657][T12042] ? widen_string+0x3a/0x280 [ 2961.121227][T12042] ? aa_get_newest_label+0x74/0x250 [ 2961.126520][T12042] ? apparmor_capable+0xfe/0x160 [ 2961.131640][T12042] ? bpf_lsm_capable+0x5/0x10 [ 2961.136460][T12042] ? security_capable+0x91/0xa0 [ 2961.141453][T12042] ? __rcu_read_unlock+0x51/0x250 [ 2961.146465][T12042] ? ns_capable+0x79/0xa0 [ 2961.150773][T12042] ? rtnl_setlink+0x270/0x270 [ 2961.155431][T12042] rtnetlink_rcv_msg+0x723/0x7c0 [ 2961.160384][T12042] ? ___cache_free+0x3c/0x2f0 [ 2961.165264][T12042] ? ima_match_policy+0xa80/0xab0 [ 2961.170382][T12042] ? __kfree_skb+0xfe/0x150 [ 2961.174919][T12042] ? __kfree_skb+0xfe/0x150 [ 2961.179645][T12042] ? consume_skb+0x4b/0x160 [ 2961.184234][T12042] ? nlmon_xmit+0x47/0x50 [ 2961.188631][T12042] ? xmit_one+0x173/0x2e0 [ 2961.192953][T12042] ? local_bh_enable+0x1b/0x20 [ 2961.198032][T12042] ? __dev_queue_xmit+0xbf2/0x1500 [ 2961.203128][T12042] ? __skb_clone+0x2a9/0x2c0 [ 2961.207941][T12042] ? __rcu_read_unlock+0x51/0x250 [ 2961.213404][T12042] netlink_rcv_skb+0x13e/0x240 [ 2961.218274][T12042] ? rtnetlink_bind+0x60/0x60 [ 2961.223038][T12042] rtnetlink_rcv+0x18/0x20 [ 2961.229105][T12042] netlink_unicast+0x5df/0x6b0 [ 2961.234084][T12042] netlink_sendmsg+0x6f8/0x7c0 [ 2961.239073][T12042] ? netlink_getsockopt+0x720/0x720 [ 2961.244826][T12042] ____sys_sendmsg+0x352/0x4c0 [ 2961.249684][T12042] ? import_iovec+0xb8/0xd0 [ 2961.254491][T12042] __sys_sendmsg+0x1ed/0x270 [ 2961.259177][T12042] ? __fsnotify_parent+0x32f/0x430 [ 2961.264420][T12042] ? get_pid_task+0x90/0xc0 [ 2961.268988][T12042] ? vfs_write+0x54d/0x7c0 [ 2961.273595][T12042] ? __fget_light+0x219/0x260 [ 2961.278274][T12042] ? fput+0x2d/0x130 [ 2961.282158][T12042] ? ksys_write+0x157/0x180 [ 2961.287528][T12042] __x64_sys_sendmsg+0x42/0x50 [ 2961.292368][T12042] do_syscall_64+0x39/0x80 [ 2961.296812][T12042] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2961.303212][T12042] RIP: 0033:0x45e219 [ 2961.307228][T12042] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2961.328301][T12042] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2961.336880][T12042] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2961.344844][T12042] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2961.352990][T12042] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2961.361221][T12042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000049 [ 2961.369222][T12042] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2961.379625][T10032] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 17:15:48 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:48 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:48 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2961.419722][T10032] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2961.430639][T10032] usb 6-1: config 0 has no interface number 0 [ 2961.438749][T10032] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2961.448500][T10032] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2961.460288][T10032] usb 6-1: config 0 descriptor?? 17:15:48 executing program 0 (fault-call:14 fault-nth:74): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @local}}, 0x1, 0x0, 0xffffffff, 0x0, 0x3}, &(0x7f00000002c0)=0x98) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000305) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e6ffec0038206d025cbb7769029109e3430ddbe37879f48f5d0d7df28fb7bf34b427b1e1e445026dd339a015be1444ab142a544c96defe9fbe8b259f1696daee4211bf6b8c2374faa6dbd5b4b77faa996d5af35416d7cf9779059bd2b0a6476cb9dfaba9ed50cef8a19a76dfb0f474640d59fb431e789a78e6b553881f10034827ac825a896ea5b8c38e48eb6ff6132f869e7c40334aa5b8c607451a2d517dae802a1ebe68f163ccbafe9713b9da12d7ea26004d3723ffe1a87999", @ANYRES16=0x0, @ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x48000}, 0x800) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000000640)={&(0x7f0000000480), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="24010000170a01020000000000000000070000060900020073797a32000000000c00054000000000000000020800074000000000f00003800800014000000000400003801400010076657468305f746f5f626f6e6400000014000100776c616e3000000000000000000000001400010073697430000000000000000000000000a400038014000100776c616e31000000000000000000000014000100726f73653000000000000000200000001400010076657468305f746f5f62726964676500140001007465616d5f736c6176655f310000fd430000140001007665746830000000000000000000000014000100767823616e3100000000000000000000140001006d6163767461703000000000000000001400010069705f7674693000000000000000"], 0x124}, 0x1, 0x0, 0x0, 0x8880}, 0x40800) socketpair(0x2c, 0x1, 0x7, &(0x7f0000000bc0)={0xffffffffffffffff}) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f0000000c00)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000c40)=0x28) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvme-fabrics\x00', 0x80441, 0x0) sendfile(r1, r3, &(0x7f0000000040)=0x100000000, 0x2) statfs(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=""/145) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000880)={0x6, {{0x2, 0x4e23, @loopback}}, 0x1, 0x2, [{{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}}, {{0x2, 0x4e20, @multicast2}}]}, 0x190) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, 0x0, 0x7, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFACCT_QUOTA={0xc}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x80000001}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}, @NFACCT_FILTER_MASK={0x0, 0x1, 0x1, 0x0, 0xbeb1}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1ff}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0xfffffffffffffd4e}, 0x1, 0x0, 0x0, 0x4}, 0x811) syz_usb_connect(0x0, 0x2d, &(0x7f0000000780)=ANY=[@ANYBLOB="12010000f166bc75f8af0097e8d50000000109021b0001000000000904019ff143668b26f15bd1950d8886ffda10ad1d9886d12128f5468945d50a2ed507a2d36f5be3852518ba4456b4284954ffa24501638f61d97fadfea8796c18341ad15cac261a3bffc57654daee107e0ed71550522e171428b128b9e74abfba1f24aaa15282b061a93038c006463e3a44fdb8f34675c96a63889126860d7b4a1c160e85dd90558ad6e5d57602001036ac3582a8db56ae431447e6d8daff41301fb29618e194fab2"], 0x0) [ 2961.481174][T10032] usb 6-1: can't set config #0, error -71 [ 2961.496567][T10032] usb 6-1: USB disconnect, device number 107 [ 2961.529861][T12057] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2961.556037][T12057] FAULT_INJECTION: forcing a failure. [ 2961.556037][T12057] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.575159][T12057] CPU: 1 PID: 12057 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2961.584695][T12057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.595179][T12057] Call Trace: [ 2961.599004][T12057] dump_stack+0x116/0x15d [ 2961.603543][T12057] should_fail+0x231/0x240 [ 2961.608093][T12057] ? __kernfs_new_node+0x71/0x350 [ 2961.613664][T12057] __should_failslab+0x81/0x90 [ 2961.619008][T12057] should_failslab+0x5/0x20 [ 2961.624763][T12057] kmem_cache_alloc+0x36/0x2e0 [ 2961.630225][T12057] __kernfs_new_node+0x71/0x350 [ 2961.635700][T12057] ? rb_insert_color+0x7e/0x2e0 [ 2961.640692][T12057] ? kernfs_link_sibling+0x21c/0x230 [ 2961.646030][T12057] ? kernfs_activate+0x2c5/0x2e0 [ 2961.651353][T12057] kernfs_new_node+0x5b/0xd0 [ 2961.656687][T12057] __kernfs_create_file+0x45/0x180 [ 2961.662010][T12057] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2961.667756][T12057] internal_create_group+0x2e4/0x850 [ 2961.673389][T12057] sysfs_create_groups+0x3d/0xf0 [ 2961.678789][T12057] device_add+0x6fe/0xe50 [ 2961.683825][T12057] netdev_register_kobject+0xfd/0x230 [ 2961.690385][T12057] register_netdevice+0xbcf/0x1060 [ 2961.696002][T12057] ipvlan_link_new+0x2a2/0x5d0 [ 2961.700767][T12057] rtnl_newlink+0xda6/0x13b0 [ 2961.706504][T12057] ? irqentry_exit+0x2a/0x40 [ 2961.712052][T12057] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 2961.718237][T12057] ? widen_string+0x3a/0x280 [ 2961.722904][T12057] ? widen_string+0x3a/0x280 [ 2961.728497][T12057] ? aa_get_newest_label+0x74/0x250 [ 2961.735073][T12057] ? apparmor_capable+0xfe/0x160 [ 2961.740794][T12057] ? bpf_lsm_capable+0x5/0x10 [ 2961.745931][T12057] ? security_capable+0x91/0xa0 [ 2961.752484][T12057] ? __rcu_read_unlock+0x51/0x250 [ 2961.757884][T12057] ? ns_capable+0x79/0xa0 [ 2961.762287][T12057] ? rtnl_setlink+0x270/0x270 [ 2961.767485][T12057] rtnetlink_rcv_msg+0x723/0x7c0 [ 2961.772625][T12057] ? ___cache_free+0x3c/0x2f0 [ 2961.777907][T12057] ? __kfree_skb+0xfe/0x150 [ 2961.782469][T12057] ? __kfree_skb+0xfe/0x150 [ 2961.787110][T12057] ? consume_skb+0x4b/0x160 [ 2961.792619][T12057] ? nlmon_xmit+0x47/0x50 [ 2961.796967][T12057] ? do_softirq_own_stack+0x32/0x40 [ 2961.802608][T12057] ? local_bh_enable+0x1b/0x20 [ 2961.807706][T12057] ? __dev_queue_xmit+0xbf2/0x1500 [ 2961.813149][T12057] ? __skb_clone+0x2a9/0x2c0 [ 2961.818648][T12057] ? __rcu_read_unlock+0x51/0x250 [ 2961.824159][T12057] netlink_rcv_skb+0x13e/0x240 [ 2961.829573][T12057] ? rtnetlink_bind+0x60/0x60 [ 2961.835023][T12057] rtnetlink_rcv+0x18/0x20 [ 2961.840615][T12057] netlink_unicast+0x5df/0x6b0 [ 2961.845382][T12057] netlink_sendmsg+0x6f8/0x7c0 [ 2961.850790][T12057] ? netlink_getsockopt+0x720/0x720 [ 2961.856214][T12057] ____sys_sendmsg+0x352/0x4c0 [ 2961.861007][T12057] ? import_iovec+0xb8/0xd0 [ 2961.866679][T12057] __sys_sendmsg+0x1ed/0x270 [ 2961.871916][T12057] ? __fsnotify_parent+0x32f/0x430 [ 2961.877234][T12057] ? get_pid_task+0x90/0xc0 [ 2961.882770][T12057] ? vfs_write+0x54d/0x7c0 [ 2961.887552][T12057] ? __fget_light+0x219/0x260 [ 2961.892665][T12057] ? fput+0x2d/0x130 [ 2961.897720][T12057] ? ksys_write+0x157/0x180 [ 2961.902400][T12057] __x64_sys_sendmsg+0x42/0x50 [ 2961.907325][T12057] do_syscall_64+0x39/0x80 [ 2961.911970][T12057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2961.918952][T12057] RIP: 0033:0x45e219 [ 2961.923030][T12057] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2961.943357][T12057] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2961.951970][T12057] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2961.960359][T12057] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2961.968449][T12057] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 17:15:48 executing program 0 (fault-call:14 fault-nth:75): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2961.976838][T12057] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004a [ 2961.985576][T12057] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2962.038326][T12067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2962.048751][T12067] FAULT_INJECTION: forcing a failure. [ 2962.048751][T12067] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.065673][T12067] CPU: 0 PID: 12067 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2962.074468][T12067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.084519][T12067] Call Trace: [ 2962.087795][T12067] dump_stack+0x116/0x15d [ 2962.092176][T12067] should_fail+0x231/0x240 [ 2962.097285][T12067] ? __kernfs_new_node+0x71/0x350 [ 2962.102353][T12067] __should_failslab+0x81/0x90 [ 2962.107233][T12067] should_failslab+0x5/0x20 [ 2962.111835][T12067] kmem_cache_alloc+0x36/0x2e0 [ 2962.116697][T12067] __kernfs_new_node+0x71/0x350 [ 2962.121645][T12067] ? rb_insert_color+0x28d/0x2e0 [ 2962.126570][T12067] ? kernfs_link_sibling+0x21c/0x230 [ 2962.131900][T12067] ? kernfs_activate+0x2c5/0x2e0 [ 2962.136872][T12067] kernfs_new_node+0x5b/0xd0 [ 2962.141739][T12067] __kernfs_create_file+0x45/0x180 [ 2962.146980][T12067] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2962.152433][T12067] internal_create_group+0x2e4/0x850 [ 2962.157838][T12067] sysfs_create_groups+0x3d/0xf0 [ 2962.162834][T12067] device_add+0x6fe/0xe50 [ 2962.167165][T12067] netdev_register_kobject+0xfd/0x230 [ 2962.172563][T12067] register_netdevice+0xbcf/0x1060 [ 2962.177773][T12067] ipvlan_link_new+0x2a2/0x5d0 [ 2962.182617][T12067] rtnl_newlink+0xda6/0x13b0 [ 2962.187630][T12067] ? kvm_sched_clock_read+0x15/0x40 [ 2962.192931][T12067] ? sched_clock+0xf/0x20 [ 2962.197252][T12067] ? sched_clock_cpu+0x11/0x1a0 [ 2962.202299][T12067] ? irqtime_account_irq+0x2d/0xa0 [ 2962.207653][T12067] ? irqentry_exit_cond_resched+0x22/0x40 [ 2962.213424][T12067] ? aa_get_newest_label+0x74/0x250 [ 2962.218709][T12067] ? apparmor_capable+0xfe/0x160 [ 2962.223813][T12067] ? bpf_lsm_capable+0x5/0x10 [ 2962.228709][T12067] ? security_capable+0x91/0xa0 [ 2962.233696][T12067] ? __rcu_read_unlock+0x51/0x250 [ 2962.238707][T12067] ? ns_capable+0x79/0xa0 [ 2962.243133][T12067] ? rtnl_setlink+0x270/0x270 [ 2962.247849][T12067] rtnetlink_rcv_msg+0x723/0x7c0 [ 2962.253327][T12067] ? ___cache_free+0x3c/0x2f0 [ 2962.258144][T12067] ? ima_match_policy+0xa80/0xab0 [ 2962.263159][T12067] ? __kfree_skb+0xfe/0x150 [ 2962.267655][T12067] ? __kfree_skb+0xfe/0x150 [ 2962.272162][T12067] ? consume_skb+0x4b/0x160 [ 2962.276721][T12067] ? nlmon_xmit+0x47/0x50 [ 2962.281090][T12067] ? xmit_one+0x173/0x2e0 [ 2962.285761][T12067] ? local_bh_enable+0x1b/0x20 [ 2962.290561][T12067] ? __dev_queue_xmit+0xbf2/0x1500 [ 2962.295813][T12067] ? __skb_clone+0x2a9/0x2c0 [ 2962.300424][T12067] ? __rcu_read_unlock+0x51/0x250 [ 2962.305792][T12067] netlink_rcv_skb+0x13e/0x240 [ 2962.310536][T12067] ? rtnetlink_bind+0x60/0x60 [ 2962.315203][T12067] rtnetlink_rcv+0x18/0x20 [ 2962.319601][T12067] netlink_unicast+0x5df/0x6b0 [ 2962.324872][T12067] netlink_sendmsg+0x6f8/0x7c0 [ 2962.330009][T12067] ? netlink_getsockopt+0x720/0x720 [ 2962.335737][T12067] ____sys_sendmsg+0x352/0x4c0 [ 2962.340833][T12067] ? import_iovec+0xb8/0xd0 [ 2962.345538][T12067] __sys_sendmsg+0x1ed/0x270 [ 2962.350472][T12067] ? __fsnotify_parent+0x32f/0x430 [ 2962.355688][T12067] ? get_pid_task+0x90/0xc0 [ 2962.360181][T12067] ? vfs_write+0x54d/0x7c0 [ 2962.364599][T12067] ? __fget_light+0x219/0x260 [ 2962.369321][T12067] ? fput+0x2d/0x130 [ 2962.373371][T12067] ? ksys_write+0x157/0x180 [ 2962.378061][T12067] __x64_sys_sendmsg+0x42/0x50 [ 2962.382822][T12067] do_syscall_64+0x39/0x80 [ 2962.387229][T12067] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2962.393118][T12067] RIP: 0033:0x45e219 [ 2962.397004][T12067] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.417242][T12067] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2962.425807][T12067] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:15:49 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2962.433762][T12067] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2962.441743][T12067] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2962.450053][T12067] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004b [ 2962.458023][T12067] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:49 executing program 0 (fault-call:14 fault-nth:76): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2962.582303][T12072] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2962.595112][T12072] FAULT_INJECTION: forcing a failure. [ 2962.595112][T12072] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.609263][T12072] CPU: 0 PID: 12072 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2962.618760][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.630982][T12072] Call Trace: [ 2962.634359][T12072] dump_stack+0x116/0x15d [ 2962.639395][T12072] should_fail+0x231/0x240 [ 2962.644537][T12072] ? __kernfs_new_node+0x71/0x350 [ 2962.650577][T12072] __should_failslab+0x81/0x90 [ 2962.657048][T12072] should_failslab+0x5/0x20 [ 2962.661916][T12072] kmem_cache_alloc+0x36/0x2e0 [ 2962.668214][T12072] __kernfs_new_node+0x71/0x350 [ 2962.674051][T12072] ? rb_insert_color+0x28d/0x2e0 [ 2962.680418][T12072] ? kernfs_link_sibling+0x21c/0x230 [ 2962.686336][T12072] ? kernfs_activate+0x2c5/0x2e0 [ 2962.691768][T12072] kernfs_new_node+0x5b/0xd0 [ 2962.697244][T12072] __kernfs_create_file+0x45/0x180 [ 2962.702585][T12072] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2962.708254][T12072] internal_create_group+0x2e4/0x850 [ 2962.714247][T12072] sysfs_create_groups+0x3d/0xf0 [ 2962.719968][T12072] device_add+0x6fe/0xe50 [ 2962.724394][T12072] netdev_register_kobject+0xfd/0x230 [ 2962.729772][T12072] register_netdevice+0xbcf/0x1060 [ 2962.734870][T12072] ipvlan_link_new+0x2a2/0x5d0 [ 2962.739716][T12072] rtnl_newlink+0xda6/0x13b0 [ 2962.744310][T12072] ? irqentry_exit+0x2a/0x40 [ 2962.749028][T12072] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2962.755042][T12072] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2962.761210][T12072] ? aa_get_newest_label+0x74/0x250 [ 2962.766493][T12072] ? apparmor_capable+0xfe/0x160 [ 2962.771624][T12072] ? bpf_lsm_capable+0x5/0x10 [ 2962.776419][T12072] ? security_capable+0x91/0xa0 [ 2962.781298][T12072] ? __rcu_read_unlock+0x51/0x250 [ 2962.786307][T12072] ? ns_capable+0x79/0xa0 [ 2962.790639][T12072] ? rtnl_setlink+0x270/0x270 [ 2962.795481][T12072] rtnetlink_rcv_msg+0x723/0x7c0 [ 2962.800589][T12072] ? ___cache_free+0x3c/0x2f0 [ 2962.805244][T12072] ? ima_match_policy+0xa80/0xab0 [ 2962.810249][T12072] ? __kfree_skb+0xfe/0x150 [ 2962.819169][T12072] ? __kfree_skb+0xfe/0x150 [ 2962.823778][T12072] ? consume_skb+0x4b/0x160 [ 2962.828531][T12072] ? nlmon_xmit+0x47/0x50 [ 2962.832864][T12072] ? xmit_one+0x173/0x2e0 [ 2962.837186][T12072] ? local_bh_enable+0x1b/0x20 [ 2962.842473][T12072] ? __dev_queue_xmit+0xbf2/0x1500 [ 2962.847597][T12072] ? __skb_clone+0x2a9/0x2c0 [ 2962.852210][T12072] ? __rcu_read_unlock+0x51/0x250 [ 2962.857407][T12072] netlink_rcv_skb+0x13e/0x240 [ 2962.862223][T12072] ? rtnetlink_bind+0x60/0x60 [ 2962.866891][T12072] rtnetlink_rcv+0x18/0x20 [ 2962.871485][T12072] netlink_unicast+0x5df/0x6b0 [ 2962.876553][T12072] netlink_sendmsg+0x6f8/0x7c0 [ 2962.881302][T12072] ? netlink_getsockopt+0x720/0x720 [ 2962.886498][T12072] ____sys_sendmsg+0x352/0x4c0 [ 2962.891272][T12072] ? import_iovec+0xb8/0xd0 [ 2962.895757][T12072] __sys_sendmsg+0x1ed/0x270 [ 2962.900463][T12072] ? __fsnotify_parent+0x32f/0x430 [ 2962.905816][T12072] ? get_pid_task+0x90/0xc0 [ 2962.910336][T12072] ? vfs_write+0x54d/0x7c0 [ 2962.914829][T12072] ? __fget_light+0x219/0x260 [ 2962.919965][T12072] ? fput+0x2d/0x130 [ 2962.924031][T12072] ? ksys_write+0x157/0x180 [ 2962.928548][T12072] __x64_sys_sendmsg+0x42/0x50 [ 2962.933347][T12072] do_syscall_64+0x39/0x80 [ 2962.937754][T12072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2962.943722][T12072] RIP: 0033:0x45e219 [ 2962.947602][T12072] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.968888][T12072] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:49 executing program 0 (fault-call:14 fault-nth:77): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2962.977558][T12072] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2962.985544][T12072] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2962.993505][T12072] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2963.001481][T12072] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004c [ 2963.010071][T12072] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2963.020178][T10032] usb 6-1: new high-speed USB device number 108 using dummy_hcd [ 2963.081385][T12074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2963.093719][T12074] FAULT_INJECTION: forcing a failure. [ 2963.093719][T12074] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.108665][T12074] CPU: 0 PID: 12074 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2963.118498][T12074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.128863][T12074] Call Trace: [ 2963.132742][T12074] dump_stack+0x116/0x15d [ 2963.138516][T12074] should_fail+0x231/0x240 [ 2963.144467][T12074] ? __kernfs_new_node+0x71/0x350 [ 2963.151540][T12074] __should_failslab+0x81/0x90 [ 2963.159192][T12074] should_failslab+0x5/0x20 [ 2963.164001][T12074] kmem_cache_alloc+0x36/0x2e0 [ 2963.170157][T12074] __kernfs_new_node+0x71/0x350 [ 2963.176202][T12074] ? rb_insert_color+0x7e/0x2e0 [ 2963.181927][T12074] ? kernfs_link_sibling+0x21c/0x230 [ 2963.189144][T12074] ? kernfs_activate+0x2c5/0x2e0 [ 2963.195753][T12074] kernfs_new_node+0x5b/0xd0 [ 2963.201462][T12074] __kernfs_create_file+0x45/0x180 [ 2963.206972][T12074] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2963.212689][T12074] internal_create_group+0x2e4/0x850 [ 2963.219510][T12074] sysfs_create_groups+0x3d/0xf0 [ 2963.225330][T12074] device_add+0x6fe/0xe50 [ 2963.229757][T12074] netdev_register_kobject+0xfd/0x230 [ 2963.235305][T12074] register_netdevice+0xbcf/0x1060 [ 2963.241004][T12074] ipvlan_link_new+0x2a2/0x5d0 [ 2963.245753][T12074] rtnl_newlink+0xda6/0x13b0 [ 2963.250625][T12074] ? _raw_spin_unlock_irq+0x22/0x40 [ 2963.256089][T12074] ? finish_task_switch+0xc0/0x2a0 [ 2963.261446][T12074] ? __schedule+0x3c1/0x580 [ 2963.266152][T12074] ? widen_string+0x3a/0x280 [ 2963.271177][T12074] ? aa_get_newest_label+0x74/0x250 [ 2963.277012][T12074] ? apparmor_capable+0xfe/0x160 [ 2963.282462][T12074] ? bpf_lsm_capable+0x5/0x10 [ 2963.287282][T12074] ? security_capable+0x91/0xa0 [ 2963.292216][T12074] ? __rcu_read_unlock+0x51/0x250 [ 2963.297559][T12074] ? ns_capable+0x79/0xa0 [ 2963.301955][T12074] ? rtnl_setlink+0x270/0x270 [ 2963.306738][T12074] rtnetlink_rcv_msg+0x723/0x7c0 [ 2963.312135][T12074] ? ___cache_free+0x3c/0x2f0 [ 2963.317211][T12074] ? ima_match_policy+0xa80/0xab0 [ 2963.324217][T12074] ? __kfree_skb+0xfe/0x150 [ 2963.329949][T12074] ? __kfree_skb+0xfe/0x150 [ 2963.334989][T12074] ? consume_skb+0x4b/0x160 [ 2963.340246][T12074] ? nlmon_xmit+0x47/0x50 [ 2963.346028][T12074] ? xmit_one+0x173/0x2e0 [ 2963.350532][T12074] ? local_bh_enable+0x1b/0x20 [ 2963.356036][T12074] ? __dev_queue_xmit+0xbf2/0x1500 [ 2963.361223][T12074] ? __skb_clone+0x2a9/0x2c0 [ 2963.366318][T12074] ? __rcu_read_unlock+0x51/0x250 [ 2963.371368][T12074] netlink_rcv_skb+0x13e/0x240 [ 2963.376118][T12074] ? rtnetlink_bind+0x60/0x60 [ 2963.380895][T12074] rtnetlink_rcv+0x18/0x20 [ 2963.385395][T12074] netlink_unicast+0x5df/0x6b0 [ 2963.390259][T12074] netlink_sendmsg+0x6f8/0x7c0 [ 2963.395139][T12074] ? netlink_getsockopt+0x720/0x720 [ 2963.400344][T12074] ____sys_sendmsg+0x352/0x4c0 [ 2963.405087][T12074] ? import_iovec+0xb8/0xd0 [ 2963.409617][T12074] __sys_sendmsg+0x1ed/0x270 [ 2963.414551][T12074] ? __fsnotify_parent+0x32f/0x430 [ 2963.419849][T12074] ? get_pid_task+0x90/0xc0 [ 2963.424425][T12074] ? vfs_write+0x54d/0x7c0 [ 2963.429057][T12074] ? __fget_light+0x219/0x260 [ 2963.434370][T12074] ? fput+0x2d/0x130 [ 2963.438785][T12074] ? ksys_write+0x157/0x180 [ 2963.443447][T12074] __x64_sys_sendmsg+0x42/0x50 [ 2963.448403][T12074] do_syscall_64+0x39/0x80 [ 2963.452936][T12074] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2963.459221][T12074] RIP: 0033:0x45e219 [ 2963.463109][T12074] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:50 executing program 0 (fault-call:14 fault-nth:78): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2963.483383][T12074] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2963.492084][T12074] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2963.500647][T12074] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2963.508715][T12074] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2963.516745][T12074] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004d [ 2963.524810][T12074] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2963.571376][T12076] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2963.582774][T12076] FAULT_INJECTION: forcing a failure. [ 2963.582774][T12076] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.600082][T12076] CPU: 0 PID: 12076 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2963.609793][T12076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2963.623993][T12076] Call Trace: [ 2963.628204][T12076] dump_stack+0x116/0x15d [ 2963.633596][T12076] should_fail+0x231/0x240 [ 2963.638903][T12076] ? __kernfs_new_node+0x71/0x350 [ 2963.646051][T12076] __should_failslab+0x81/0x90 [ 2963.651561][T12076] should_failslab+0x5/0x20 [ 2963.656949][T12076] kmem_cache_alloc+0x36/0x2e0 [ 2963.662632][T12076] __kernfs_new_node+0x71/0x350 [ 2963.668004][T12076] ? rb_insert_color+0x7e/0x2e0 [ 2963.674926][T12076] ? kernfs_link_sibling+0x21c/0x230 [ 2963.681526][T12076] ? kernfs_activate+0x2c5/0x2e0 [ 2963.689169][T12076] kernfs_new_node+0x5b/0xd0 [ 2963.694695][T12076] __kernfs_create_file+0x45/0x180 [ 2963.700181][T12076] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2963.705650][T12076] internal_create_group+0x2e4/0x850 [ 2963.711955][T12076] sysfs_create_groups+0x3d/0xf0 [ 2963.717286][T12076] device_add+0x6fe/0xe50 [ 2963.722693][T12076] netdev_register_kobject+0xfd/0x230 [ 2963.728781][T12076] register_netdevice+0xbcf/0x1060 [ 2963.734692][T12076] ipvlan_link_new+0x2a2/0x5d0 [ 2963.740139][T12076] rtnl_newlink+0xda6/0x13b0 [ 2963.745478][T12076] ? _raw_spin_unlock_irq+0x22/0x40 [ 2963.751220][T12076] ? finish_task_switch+0xc0/0x2a0 [ 2963.756670][T12076] ? __schedule+0x3c1/0x580 [ 2963.762013][T12076] ? widen_string+0x3a/0x280 [ 2963.767472][T12076] ? aa_get_newest_label+0x74/0x250 [ 2963.773741][T12076] ? apparmor_capable+0xfe/0x160 [ 2963.779079][T12076] ? bpf_lsm_capable+0x5/0x10 [ 2963.783776][T12076] ? security_capable+0x91/0xa0 [ 2963.788779][T12076] ? __rcu_read_unlock+0x51/0x250 [ 2963.793940][T12076] ? ns_capable+0x79/0xa0 [ 2963.798627][T12076] ? rtnl_setlink+0x270/0x270 [ 2963.803338][T12076] rtnetlink_rcv_msg+0x723/0x7c0 [ 2963.808288][T12076] ? ___cache_free+0x3c/0x2f0 [ 2963.812959][T12076] ? ima_match_policy+0xa80/0xab0 [ 2963.817969][T12076] ? __kfree_skb+0xfe/0x150 [ 2963.822461][T12076] ? __kfree_skb+0xfe/0x150 [ 2963.827009][T12076] ? consume_skb+0x4b/0x160 [ 2963.831607][T12076] ? nlmon_xmit+0x47/0x50 [ 2963.836026][T12076] ? xmit_one+0x173/0x2e0 [ 2963.840353][T12076] ? local_bh_enable+0x1b/0x20 [ 2963.845253][T12076] ? __dev_queue_xmit+0xbf2/0x1500 [ 2963.850423][T12076] ? __skb_clone+0x2a9/0x2c0 [ 2963.855431][T12076] ? __rcu_read_unlock+0x51/0x250 [ 2963.860621][T12076] netlink_rcv_skb+0x13e/0x240 [ 2963.865392][T12076] ? rtnetlink_bind+0x60/0x60 [ 2963.870326][T12076] rtnetlink_rcv+0x18/0x20 [ 2963.879768][T12076] netlink_unicast+0x5df/0x6b0 [ 2963.884576][T12076] netlink_sendmsg+0x6f8/0x7c0 [ 2963.889346][T12076] ? netlink_getsockopt+0x720/0x720 [ 2963.894532][T12076] ____sys_sendmsg+0x352/0x4c0 [ 2963.899357][T12076] ? import_iovec+0xb8/0xd0 [ 2963.904018][T12076] __sys_sendmsg+0x1ed/0x270 [ 2963.908741][T12076] ? __fsnotify_parent+0x32f/0x430 [ 2963.913991][T12076] ? get_pid_task+0x90/0xc0 [ 2963.918647][T12076] ? vfs_write+0x54d/0x7c0 [ 2963.923155][T12076] ? __fget_light+0x219/0x260 [ 2963.928396][T12076] ? fput+0x2d/0x130 [ 2963.932388][T12076] ? ksys_write+0x157/0x180 [ 2963.936880][T12076] __x64_sys_sendmsg+0x42/0x50 [ 2963.941768][T12076] do_syscall_64+0x39/0x80 [ 2963.946398][T12076] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2963.952474][T12076] RIP: 0033:0x45e219 [ 2963.956442][T12076] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2963.976590][T12076] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2963.985248][T12076] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2963.993535][T12076] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2964.001946][T12076] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2964.009916][T12076] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004e [ 2964.018844][T12076] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:50 executing program 0 (fault-call:14 fault-nth:79): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2964.029724][T10032] usb 6-1: device descriptor read/64, error 18 [ 2964.101814][T12078] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2964.116500][T12078] FAULT_INJECTION: forcing a failure. [ 2964.116500][T12078] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.135619][T12078] CPU: 1 PID: 12078 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2964.145789][T12078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.157273][T12078] Call Trace: [ 2964.160535][T12078] dump_stack+0x116/0x15d [ 2964.164953][T12078] should_fail+0x231/0x240 [ 2964.169352][T12078] ? __kernfs_new_node+0x71/0x350 [ 2964.174695][T12078] __should_failslab+0x81/0x90 [ 2964.179451][T12078] should_failslab+0x5/0x20 [ 2964.184075][T12078] kmem_cache_alloc+0x36/0x2e0 [ 2964.188842][T12078] __kernfs_new_node+0x71/0x350 [ 2964.193682][T12078] ? rb_insert_color+0x28d/0x2e0 [ 2964.198947][T12078] ? kernfs_link_sibling+0x21c/0x230 [ 2964.204287][T12078] ? kernfs_activate+0x2c5/0x2e0 [ 2964.209338][T12078] kernfs_new_node+0x5b/0xd0 [ 2964.213994][T12078] __kernfs_create_file+0x45/0x180 [ 2964.219712][T12078] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2964.225156][T12078] internal_create_group+0x2e4/0x850 [ 2964.230428][T12078] sysfs_create_groups+0x3d/0xf0 [ 2964.235469][T12078] device_add+0x6fe/0xe50 [ 2964.239786][T12078] netdev_register_kobject+0xfd/0x230 [ 2964.245196][T12078] register_netdevice+0xbcf/0x1060 [ 2964.250393][T12078] ipvlan_link_new+0x2a2/0x5d0 [ 2964.255211][T12078] rtnl_newlink+0xda6/0x13b0 [ 2964.260102][T12078] ? __schedule+0x3c1/0x580 [ 2964.264655][T12078] ? preempt_schedule_irq+0x43/0x80 [ 2964.269863][T12078] ? irqentry_exit_cond_resched+0x30/0x40 [ 2964.275660][T12078] ? irqentry_exit+0x2a/0x40 [ 2964.280269][T12078] ? widen_string+0x3a/0x280 [ 2964.285349][T12078] ? aa_get_newest_label+0x74/0x250 [ 2964.290709][T12078] ? apparmor_capable+0xfe/0x160 [ 2964.295788][T12078] ? bpf_lsm_capable+0x5/0x10 [ 2964.300627][T12078] ? security_capable+0x91/0xa0 [ 2964.305756][T12078] ? __rcu_read_unlock+0x51/0x250 [ 2964.311118][T12078] ? ns_capable+0x79/0xa0 [ 2964.315554][T12078] ? rtnl_setlink+0x270/0x270 [ 2964.320393][T12078] rtnetlink_rcv_msg+0x723/0x7c0 [ 2964.325745][T12078] ? ___cache_free+0x3c/0x2f0 [ 2964.330439][T12078] ? ima_match_policy+0xa80/0xab0 [ 2964.335816][T12078] ? __kfree_skb+0xfe/0x150 [ 2964.340557][T12078] ? __kfree_skb+0xfe/0x150 [ 2964.345331][T12078] ? consume_skb+0x4b/0x160 [ 2964.349832][T12078] ? nlmon_xmit+0x47/0x50 [ 2964.354332][T12078] ? xmit_one+0x173/0x2e0 [ 2964.358981][T12078] ? local_bh_enable+0x1b/0x20 [ 2964.363732][T12078] ? __dev_queue_xmit+0xbf2/0x1500 [ 2964.369963][T12078] ? __skb_clone+0x2a9/0x2c0 [ 2964.374639][T12078] ? __rcu_read_unlock+0x51/0x250 [ 2964.379650][T12078] netlink_rcv_skb+0x13e/0x240 [ 2964.384573][T12078] ? rtnetlink_bind+0x60/0x60 [ 2964.389396][T12078] rtnetlink_rcv+0x18/0x20 [ 2964.393789][T12078] netlink_unicast+0x5df/0x6b0 [ 2964.398619][T12078] netlink_sendmsg+0x6f8/0x7c0 [ 2964.403450][T12078] ? netlink_getsockopt+0x720/0x720 [ 2964.408888][T12078] ____sys_sendmsg+0x352/0x4c0 [ 2964.413711][T12078] ? import_iovec+0xb8/0xd0 [ 2964.418214][T12078] __sys_sendmsg+0x1ed/0x270 [ 2964.422795][T12078] ? __fsnotify_parent+0x32f/0x430 [ 2964.427916][T12078] ? get_pid_task+0x90/0xc0 [ 2964.432403][T12078] ? vfs_write+0x54d/0x7c0 [ 2964.436851][T12078] ? __fget_light+0x219/0x260 [ 2964.441540][T12078] ? fput+0x2d/0x130 [ 2964.445448][T12078] ? ksys_write+0x157/0x180 [ 2964.449945][T12078] __x64_sys_sendmsg+0x42/0x50 [ 2964.454845][T12078] do_syscall_64+0x39/0x80 [ 2964.459335][T12078] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2964.465230][T12078] RIP: 0033:0x45e219 [ 2964.469109][T12078] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2964.488946][T12078] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:51 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2964.497727][T12078] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2964.505771][T12078] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2964.513723][T12078] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2964.522583][T12078] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004f [ 2964.531008][T12078] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:51 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:51 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x46}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:51 executing program 5: sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100004143532041fc3650e8d50000090401d0753f8029de3cb9d867f1c14cdd58f8e7f34f69cf81f9ffcadfcdee344cf30dce7a6c451e038af798458b65a51a5972ed964c795dc4c34b67febb908b799e88bcf84d1d8283a05efcec4906eb0bfab1acad16551d94461a01895cb3de759ea99afe7dbc5d09eedc1ce4bd347ef68dcfc7c9"], 0x0) 17:15:51 executing program 0 (fault-call:14 fault-nth:80): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2964.661358][T12094] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2964.673584][T12094] FAULT_INJECTION: forcing a failure. [ 2964.673584][T12094] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.688695][T12094] CPU: 1 PID: 12094 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2964.698927][T12094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.709006][T12094] Call Trace: [ 2964.712719][T12094] dump_stack+0x116/0x15d [ 2964.718657][T12094] should_fail+0x231/0x240 [ 2964.723450][T12094] ? __kernfs_new_node+0x71/0x350 [ 2964.728575][T12094] __should_failslab+0x81/0x90 [ 2964.734581][T12094] should_failslab+0x5/0x20 [ 2964.740380][T12094] kmem_cache_alloc+0x36/0x2e0 [ 2964.746214][T12094] __kernfs_new_node+0x71/0x350 [ 2964.751336][T12094] ? make_kgid+0x10e/0x300 [ 2964.755764][T12094] ? net_ns_get_ownership+0xaa/0xc0 [ 2964.761514][T12094] ? net_namespace+0x20/0x20 [ 2964.767201][T12094] kernfs_create_dir_ns+0x5e/0x140 [ 2964.773336][T12094] internal_create_group+0x138/0x850 [ 2964.780378][T12094] ? internal_create_group+0x7c9/0x850 [ 2964.786596][T12094] sysfs_create_group+0x1b/0x20 [ 2964.791630][T12094] dpm_sysfs_add+0x43/0x1d0 [ 2964.796884][T12094] device_add+0x925/0xe50 [ 2964.801886][T12094] netdev_register_kobject+0xfd/0x230 [ 2964.808298][T12094] register_netdevice+0xbcf/0x1060 [ 2964.814864][T12094] ipvlan_link_new+0x2a2/0x5d0 [ 2964.820958][T12094] rtnl_newlink+0xda6/0x13b0 [ 2964.825787][T12094] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2964.832938][T12094] ? __perf_event_task_sched_in+0x565/0x590 [ 2964.839820][T12094] ? kvm_sched_clock_read+0x15/0x40 [ 2964.845827][T12094] ? sched_clock+0xf/0x20 [ 2964.851593][T12094] ? widen_string+0x3a/0x280 [ 2964.856396][T12094] ? aa_get_newest_label+0x74/0x250 [ 2964.861694][T12094] ? apparmor_capable+0xfe/0x160 [ 2964.866624][T12094] ? bpf_lsm_capable+0x5/0x10 [ 2964.871307][T12094] ? security_capable+0x91/0xa0 [ 2964.876386][T12094] ? __rcu_read_unlock+0x51/0x250 [ 2964.883163][T12094] ? ns_capable+0x79/0xa0 [ 2964.887529][T12094] ? rtnl_setlink+0x270/0x270 [ 2964.892208][T12094] rtnetlink_rcv_msg+0x723/0x7c0 [ 2964.897151][T12094] ? ___cache_free+0x3c/0x2f0 [ 2964.901924][T12094] ? ima_match_policy+0xa80/0xab0 [ 2964.906994][T12094] ? __kfree_skb+0xfe/0x150 [ 2964.911600][T12094] ? __kfree_skb+0xfe/0x150 [ 2964.916080][T12094] ? consume_skb+0x4b/0x160 [ 2964.920573][T12094] ? nlmon_xmit+0x47/0x50 [ 2964.925029][T12094] ? xmit_one+0x173/0x2e0 [ 2964.929516][T12094] ? local_bh_enable+0x1b/0x20 [ 2964.934302][T12094] ? __dev_queue_xmit+0xbf2/0x1500 [ 2964.939592][T12094] ? __skb_clone+0x2a9/0x2c0 [ 2964.944432][T12094] ? __rcu_read_unlock+0x51/0x250 [ 2964.949512][T12094] netlink_rcv_skb+0x13e/0x240 [ 2964.954261][T12094] ? rtnetlink_bind+0x60/0x60 [ 2964.958914][T12094] rtnetlink_rcv+0x18/0x20 [ 2964.963564][T12094] netlink_unicast+0x5df/0x6b0 [ 2964.968388][T12094] netlink_sendmsg+0x6f8/0x7c0 [ 2964.974005][T12094] ? netlink_getsockopt+0x720/0x720 [ 2964.979190][T12094] ____sys_sendmsg+0x352/0x4c0 [ 2964.983968][T12094] ? import_iovec+0xb8/0xd0 [ 2964.988447][T12094] __sys_sendmsg+0x1ed/0x270 [ 2964.993083][T12094] ? __fsnotify_parent+0x32f/0x430 [ 2964.998168][T12094] ? get_pid_task+0x90/0xc0 [ 2965.002647][T12094] ? vfs_write+0x54d/0x7c0 [ 2965.007838][T12094] ? __fget_light+0x219/0x260 [ 2965.012740][T12094] ? fput+0x2d/0x130 [ 2965.016610][T12094] ? ksys_write+0x157/0x180 [ 2965.021255][T12094] __x64_sys_sendmsg+0x42/0x50 [ 2965.026008][T12094] do_syscall_64+0x39/0x80 [ 2965.030441][T12094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2965.036310][T12094] RIP: 0033:0x45e219 [ 2965.040266][T12094] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:15:51 executing program 0 (fault-call:14 fault-nth:81): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2965.059853][T12094] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2965.068460][T12094] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2965.077054][T12094] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2965.085052][T12094] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.093113][T12094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000050 [ 2965.101078][T12094] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2965.164304][T12097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2965.176812][T12097] FAULT_INJECTION: forcing a failure. [ 2965.176812][T12097] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.193522][T12097] CPU: 1 PID: 12097 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2965.204973][T12097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.216555][T12097] Call Trace: [ 2965.220724][T12097] dump_stack+0x116/0x15d [ 2965.225595][T12097] should_fail+0x231/0x240 [ 2965.231039][T12097] ? __kernfs_new_node+0x71/0x350 [ 2965.236098][T12097] __should_failslab+0x81/0x90 [ 2965.241132][T12097] should_failslab+0x5/0x20 [ 2965.245919][T12097] kmem_cache_alloc+0x36/0x2e0 [ 2965.250793][T12097] ? idr_alloc_cyclic+0x249/0x2c0 [ 2965.255924][T12097] __kernfs_new_node+0x71/0x350 [ 2965.260785][T12097] ? bpf_lsm_kernfs_init_security+0x5/0x10 [ 2965.266658][T12097] ? rb_insert_color+0x28d/0x2e0 [ 2965.271615][T12097] ? rb_first+0x9/0x40 [ 2965.275664][T12097] ? kernfs_activate+0x2c5/0x2e0 [ 2965.280713][T12097] kernfs_new_node+0x5b/0xd0 [ 2965.285438][T12097] __kernfs_create_file+0x45/0x180 [ 2965.290529][T12097] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2965.296074][T12097] sysfs_merge_group+0xb5/0x190 [ 2965.302094][T12097] dpm_sysfs_add+0x9d/0x1d0 [ 2965.306673][T12097] device_add+0x925/0xe50 [ 2965.312093][T12097] netdev_register_kobject+0xfd/0x230 [ 2965.317879][T12097] register_netdevice+0xbcf/0x1060 [ 2965.323850][T12097] ipvlan_link_new+0x2a2/0x5d0 [ 2965.329045][T12097] rtnl_newlink+0xda6/0x13b0 [ 2965.333844][T12097] ? _raw_spin_unlock_irq+0x22/0x40 [ 2965.339151][T12097] ? finish_task_switch+0xc0/0x2a0 [ 2965.345112][T12097] ? __schedule+0x3c1/0x580 [ 2965.350571][T12097] ? widen_string+0x3a/0x280 [ 2965.355238][T12097] ? aa_get_newest_label+0x74/0x250 [ 2965.360436][T12097] ? apparmor_capable+0xfe/0x160 [ 2965.365437][T12097] ? bpf_lsm_capable+0x5/0x10 [ 2965.370187][T12097] ? security_capable+0x91/0xa0 [ 2965.375018][T12097] ? __rcu_read_unlock+0x51/0x250 [ 2965.381520][T12097] ? ns_capable+0x79/0xa0 [ 2965.386415][T12097] ? rtnl_setlink+0x270/0x270 [ 2965.391155][T12097] rtnetlink_rcv_msg+0x723/0x7c0 [ 2965.396117][T12097] ? ___cache_free+0x3c/0x2f0 [ 2965.400791][T12097] ? ima_match_policy+0xa80/0xab0 [ 2965.405905][T12097] ? __kfree_skb+0xfe/0x150 [ 2965.410603][T12097] ? __kfree_skb+0xfe/0x150 [ 2965.415104][T12097] ? consume_skb+0x4b/0x160 [ 2965.419605][T12097] ? nlmon_xmit+0x47/0x50 [ 2965.424664][T12097] ? xmit_one+0x173/0x2e0 [ 2965.428984][T12097] ? local_bh_enable+0x1b/0x20 [ 2965.433735][T12097] ? __dev_queue_xmit+0xbf2/0x1500 [ 2965.438935][T12097] ? __skb_clone+0x2a9/0x2c0 [ 2965.444184][T12097] ? __rcu_read_unlock+0x51/0x250 [ 2965.449201][T12097] netlink_rcv_skb+0x13e/0x240 [ 2965.454013][T12097] ? rtnetlink_bind+0x60/0x60 [ 2965.458840][T12097] rtnetlink_rcv+0x18/0x20 [ 2965.463399][T12097] netlink_unicast+0x5df/0x6b0 [ 2965.468309][T12097] netlink_sendmsg+0x6f8/0x7c0 [ 2965.473064][T12097] ? netlink_getsockopt+0x720/0x720 [ 2965.478372][T12097] ____sys_sendmsg+0x352/0x4c0 [ 2965.483314][T12097] ? import_iovec+0xb8/0xd0 [ 2965.488150][T12097] __sys_sendmsg+0x1ed/0x270 [ 2965.493022][T12097] ? __fsnotify_parent+0x32f/0x430 [ 2965.498298][T12097] ? get_pid_task+0x90/0xc0 [ 2965.502809][T12097] ? vfs_write+0x54d/0x7c0 [ 2965.507330][T12097] ? __fget_light+0x219/0x260 [ 2965.512014][T12097] ? fput+0x2d/0x130 [ 2965.517701][T12097] ? ksys_write+0x157/0x180 [ 2965.522387][T12097] __x64_sys_sendmsg+0x42/0x50 [ 2965.528772][T12097] do_syscall_64+0x39/0x80 [ 2965.533377][T12097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2965.539387][T12097] RIP: 0033:0x45e219 [ 2965.543445][T12097] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2965.566416][T12097] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2965.575292][T12097] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2965.584049][T12097] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2965.593742][T12097] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.605171][T12097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000051 17:15:52 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:52 executing program 0 (fault-call:14 fault-nth:82): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2965.615382][T12097] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2965.675144][T12102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2965.687411][T12102] FAULT_INJECTION: forcing a failure. [ 2965.687411][T12102] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.700737][T10032] usb 6-1: new high-speed USB device number 109 using dummy_hcd [ 2965.709126][T12102] CPU: 1 PID: 12102 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2965.719698][T12102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.731386][T12102] Call Trace: [ 2965.736524][T12102] dump_stack+0x116/0x15d [ 2965.742735][T12102] should_fail+0x231/0x240 [ 2965.748394][T12102] ? __kernfs_new_node+0x71/0x350 [ 2965.754724][T12102] __should_failslab+0x81/0x90 [ 2965.760691][T12102] should_failslab+0x5/0x20 [ 2965.765335][T12102] kmem_cache_alloc+0x36/0x2e0 [ 2965.771720][T12102] __kernfs_new_node+0x71/0x350 [ 2965.777022][T12102] ? rb_insert_color+0x2c9/0x2e0 [ 2965.782950][T12102] ? kernfs_link_sibling+0x21c/0x230 [ 2965.789885][T12102] ? kernfs_activate+0x2c5/0x2e0 [ 2965.796938][T12102] kernfs_new_node+0x5b/0xd0 [ 2965.803535][T12102] __kernfs_create_file+0x45/0x180 [ 2965.809597][T12102] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2965.816833][T12102] sysfs_merge_group+0xb5/0x190 [ 2965.824639][T12102] dpm_sysfs_add+0x9d/0x1d0 [ 2965.829171][T12102] device_add+0x925/0xe50 [ 2965.834822][T12102] netdev_register_kobject+0xfd/0x230 [ 2965.840543][T12102] register_netdevice+0xbcf/0x1060 [ 2965.845908][T12102] ipvlan_link_new+0x2a2/0x5d0 [ 2965.851865][T12102] rtnl_newlink+0xda6/0x13b0 [ 2965.856548][T12102] ? kvm_sched_clock_read+0x15/0x40 [ 2965.862969][T12102] ? sched_clock+0xf/0x20 [ 2965.867694][T12102] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2965.873828][T12102] ? __switch_to+0x14e/0x4c0 [ 2965.880061][T12102] ? __perf_event_task_sched_in+0x565/0x590 [ 2965.886851][T12102] ? kvm_sched_clock_read+0x15/0x40 [ 2965.892999][T12102] ? sched_clock+0xf/0x20 [ 2965.898750][T12102] ? widen_string+0x3a/0x280 [ 2965.904105][T12102] ? aa_get_newest_label+0x74/0x250 [ 2965.910758][T12102] ? apparmor_capable+0xfe/0x160 [ 2965.916165][T12102] ? bpf_lsm_capable+0x5/0x10 [ 2965.920914][T12102] ? security_capable+0x91/0xa0 [ 2965.925825][T12102] ? __rcu_read_unlock+0x51/0x250 [ 2965.930982][T12102] ? ns_capable+0x79/0xa0 [ 2965.935296][T12102] ? rtnl_setlink+0x270/0x270 [ 2965.939983][T12102] rtnetlink_rcv_msg+0x723/0x7c0 [ 2965.946055][T12102] ? ___cache_free+0x3c/0x2f0 [ 2965.950949][T12102] ? ima_match_policy+0xa80/0xab0 [ 2965.957121][T12102] ? __kfree_skb+0xfe/0x150 [ 2965.962933][T12102] ? __kfree_skb+0xfe/0x150 [ 2965.968360][T12102] ? consume_skb+0x4b/0x160 [ 2965.974439][T12102] ? nlmon_xmit+0x47/0x50 [ 2965.982708][T12102] ? xmit_one+0x173/0x2e0 [ 2965.988494][T12102] ? local_bh_enable+0x1b/0x20 [ 2965.993440][T12102] ? __dev_queue_xmit+0xbf2/0x1500 [ 2965.999082][T12102] ? __skb_clone+0x2a9/0x2c0 [ 2966.004358][T12102] ? __rcu_read_unlock+0x51/0x250 [ 2966.010270][T12102] netlink_rcv_skb+0x13e/0x240 [ 2966.015427][T12102] ? rtnetlink_bind+0x60/0x60 [ 2966.020318][T12102] rtnetlink_rcv+0x18/0x20 [ 2966.026828][T12102] netlink_unicast+0x5df/0x6b0 [ 2966.034776][T12102] netlink_sendmsg+0x6f8/0x7c0 [ 2966.039828][T12102] ? netlink_getsockopt+0x720/0x720 [ 2966.045932][T12102] ____sys_sendmsg+0x352/0x4c0 [ 2966.050946][T12102] ? import_iovec+0xb8/0xd0 [ 2966.055437][T12102] __sys_sendmsg+0x1ed/0x270 [ 2966.060128][T12102] ? __fsnotify_parent+0x32f/0x430 [ 2966.065451][T12102] ? get_pid_task+0x90/0xc0 [ 2966.070575][T12102] ? vfs_write+0x54d/0x7c0 [ 2966.075133][T12102] ? __fget_light+0x219/0x260 [ 2966.079802][T12102] ? fput+0x2d/0x130 [ 2966.083786][T12102] ? ksys_write+0x157/0x180 [ 2966.089356][T12102] __x64_sys_sendmsg+0x42/0x50 [ 2966.094175][T12102] do_syscall_64+0x39/0x80 [ 2966.098658][T12102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2966.104665][T12102] RIP: 0033:0x45e219 17:15:52 executing program 0 (fault-call:14 fault-nth:83): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2966.109519][T12102] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2966.129469][T12102] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2966.137908][T12102] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2966.145878][T12102] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2966.153948][T12102] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2966.161933][T12102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000052 [ 2966.170141][T12102] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2966.245977][T12104] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2966.257790][T12104] FAULT_INJECTION: forcing a failure. [ 2966.257790][T12104] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.270854][T12104] CPU: 1 PID: 12104 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2966.279720][T12104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.290284][T12104] Call Trace: [ 2966.293761][T12104] dump_stack+0x116/0x15d [ 2966.299960][T12104] should_fail+0x231/0x240 [ 2966.306403][T12104] ? __kernfs_new_node+0x71/0x350 [ 2966.311437][T12104] __should_failslab+0x81/0x90 [ 2966.316828][T12104] should_failslab+0x5/0x20 [ 2966.321589][T12104] kmem_cache_alloc+0x36/0x2e0 [ 2966.327406][T12104] __kernfs_new_node+0x71/0x350 [ 2966.332356][T12104] ? rb_insert_color+0x7e/0x2e0 [ 2966.337519][T12104] ? kernfs_link_sibling+0x21c/0x230 [ 2966.342977][T12104] ? kernfs_activate+0x2c5/0x2e0 [ 2966.348868][T12104] kernfs_new_node+0x5b/0xd0 [ 2966.353497][T12104] __kernfs_create_file+0x45/0x180 [ 2966.359585][T12104] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2966.364948][T12104] sysfs_merge_group+0xb5/0x190 [ 2966.369917][T12104] dpm_sysfs_add+0x9d/0x1d0 [ 2966.374431][T12104] device_add+0x925/0xe50 [ 2966.378745][T12104] netdev_register_kobject+0xfd/0x230 [ 2966.384195][T12104] register_netdevice+0xbcf/0x1060 [ 2966.389303][T12104] ipvlan_link_new+0x2a2/0x5d0 [ 2966.394222][T12104] rtnl_newlink+0xda6/0x13b0 [ 2966.398810][T12104] ? prandom_u32_state+0x9/0x80 [ 2966.403651][T12104] ? widen_string+0x3a/0x280 [ 2966.408221][T12104] ? aa_get_newest_label+0x74/0x250 [ 2966.413438][T12104] ? apparmor_capable+0xfe/0x160 [ 2966.418457][T12104] ? bpf_lsm_capable+0x5/0x10 [ 2966.423117][T12104] ? security_capable+0x91/0xa0 [ 2966.427957][T12104] ? __rcu_read_unlock+0x51/0x250 [ 2966.432983][T12104] ? ns_capable+0x79/0xa0 [ 2966.437315][T12104] ? rtnl_setlink+0x270/0x270 [ 2966.442095][T12104] rtnetlink_rcv_msg+0x723/0x7c0 [ 2966.447028][T12104] ? ___cache_free+0x3c/0x2f0 [ 2966.451868][T12104] ? ima_match_policy+0xa80/0xab0 [ 2966.457489][T12104] ? __kfree_skb+0xfe/0x150 [ 2966.462209][T12104] ? __kfree_skb+0xfe/0x150 [ 2966.466913][T12104] ? consume_skb+0x4b/0x160 [ 2966.471765][T12104] ? nlmon_xmit+0x47/0x50 [ 2966.476195][T12104] ? xmit_one+0x173/0x2e0 [ 2966.480763][T12104] ? local_bh_enable+0x1b/0x20 [ 2966.485661][T12104] ? __dev_queue_xmit+0xbf2/0x1500 [ 2966.490863][T12104] ? __skb_clone+0x2a9/0x2c0 [ 2966.495661][T12104] ? __rcu_read_unlock+0x51/0x250 [ 2966.500985][T12104] netlink_rcv_skb+0x13e/0x240 [ 2966.505908][T12104] ? rtnetlink_bind+0x60/0x60 [ 2966.510840][T12104] rtnetlink_rcv+0x18/0x20 [ 2966.515451][T12104] netlink_unicast+0x5df/0x6b0 [ 2966.520370][T12104] netlink_sendmsg+0x6f8/0x7c0 [ 2966.525135][T12104] ? netlink_getsockopt+0x720/0x720 [ 2966.530319][T12104] ____sys_sendmsg+0x352/0x4c0 [ 2966.535078][T12104] ? import_iovec+0xb8/0xd0 [ 2966.539582][T12104] __sys_sendmsg+0x1ed/0x270 [ 2966.544261][T12104] ? __fsnotify_parent+0x32f/0x430 [ 2966.549445][T12104] ? get_pid_task+0x90/0xc0 [ 2966.553943][T12104] ? vfs_write+0x54d/0x7c0 [ 2966.558492][T12104] ? __fget_light+0x219/0x260 [ 2966.563822][T12104] ? fput+0x2d/0x130 [ 2966.571942][T12104] ? ksys_write+0x157/0x180 [ 2966.576615][T12104] __x64_sys_sendmsg+0x42/0x50 [ 2966.582010][T12104] do_syscall_64+0x39/0x80 [ 2966.586435][T12104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2966.592583][T12104] RIP: 0033:0x45e219 [ 2966.596549][T12104] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2966.617251][T12104] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2966.625837][T12104] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2966.634101][T12104] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:53 executing program 0 (fault-call:14 fault-nth:84): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2966.642423][T12104] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2966.650622][T12104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000053 [ 2966.658590][T12104] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2966.723921][T12106] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2966.735585][T12106] FAULT_INJECTION: forcing a failure. [ 2966.735585][T12106] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.752436][T12106] CPU: 1 PID: 12106 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2966.763156][T12106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.773432][T12106] Call Trace: [ 2966.777231][T12106] dump_stack+0x116/0x15d [ 2966.783203][T12106] should_fail+0x231/0x240 [ 2966.789321][T12106] ? __kernfs_new_node+0x71/0x350 [ 2966.794571][T12106] __should_failslab+0x81/0x90 [ 2966.800029][T12106] should_failslab+0x5/0x20 [ 2966.805148][T12106] kmem_cache_alloc+0x36/0x2e0 [ 2966.809935][T12106] __kernfs_new_node+0x71/0x350 [ 2966.816163][T12106] ? rb_insert_color+0x29f/0x2e0 [ 2966.822647][T12106] ? kernfs_link_sibling+0x21c/0x230 [ 2966.829278][T12106] ? kernfs_activate+0x2c5/0x2e0 [ 2966.834430][T12106] kernfs_new_node+0x5b/0xd0 [ 2966.839112][T12106] __kernfs_create_file+0x45/0x180 [ 2966.846289][T12106] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2966.852666][T12106] sysfs_merge_group+0xb5/0x190 [ 2966.860032][T12106] dpm_sysfs_add+0x9d/0x1d0 [ 2966.865504][T12106] device_add+0x925/0xe50 [ 2966.871105][T12106] netdev_register_kobject+0xfd/0x230 [ 2966.876932][T12106] register_netdevice+0xbcf/0x1060 [ 2966.884325][T12106] ipvlan_link_new+0x2a2/0x5d0 [ 2966.890245][T12106] rtnl_newlink+0xda6/0x13b0 [ 2966.895175][T12106] ? __schedule+0x3c1/0x580 [ 2966.900664][T12106] ? preempt_schedule_irq+0x43/0x80 [ 2966.905919][T12106] ? irqentry_exit_cond_resched+0x30/0x40 [ 2966.913337][T12106] ? aa_get_newest_label+0x74/0x250 [ 2966.919635][T12106] ? apparmor_capable+0xfe/0x160 [ 2966.924566][T12106] ? bpf_lsm_capable+0x5/0x10 [ 2966.929931][T12106] ? security_capable+0x91/0xa0 [ 2966.934972][T12106] ? __rcu_read_unlock+0x51/0x250 [ 2966.940008][T12106] ? ns_capable+0x79/0xa0 [ 2966.944400][T12106] ? rtnl_setlink+0x270/0x270 [ 2966.949173][T12106] rtnetlink_rcv_msg+0x723/0x7c0 [ 2966.954263][T12106] ? ___cache_free+0x3c/0x2f0 [ 2966.959020][T12106] ? ima_match_policy+0xa80/0xab0 [ 2966.964035][T12106] ? __kfree_skb+0xfe/0x150 [ 2966.968743][T12106] ? __kfree_skb+0xfe/0x150 [ 2966.973241][T12106] ? consume_skb+0x4b/0x160 [ 2966.977964][T12106] ? nlmon_xmit+0x47/0x50 [ 2966.982308][T12106] ? xmit_one+0x173/0x2e0 [ 2966.986793][T12106] ? local_bh_enable+0x1b/0x20 [ 2966.991541][T12106] ? __dev_queue_xmit+0xbf2/0x1500 [ 2966.996649][T12106] ? __skb_clone+0x2a9/0x2c0 [ 2967.001223][T12106] ? __rcu_read_unlock+0x51/0x250 [ 2967.006415][T12106] netlink_rcv_skb+0x13e/0x240 [ 2967.011522][T12106] ? rtnetlink_bind+0x60/0x60 [ 2967.016256][T12106] rtnetlink_rcv+0x18/0x20 [ 2967.020651][T12106] netlink_unicast+0x5df/0x6b0 [ 2967.025416][T12106] netlink_sendmsg+0x6f8/0x7c0 [ 2967.030156][T12106] ? netlink_getsockopt+0x720/0x720 [ 2967.035380][T12106] ____sys_sendmsg+0x352/0x4c0 [ 2967.040124][T12106] ? import_iovec+0xb8/0xd0 [ 2967.044645][T12106] __sys_sendmsg+0x1ed/0x270 [ 2967.049263][T12106] ? __fsnotify_parent+0x32f/0x430 [ 2967.054375][T12106] ? get_pid_task+0x90/0xc0 [ 2967.058908][T12106] ? vfs_write+0x54d/0x7c0 [ 2967.063319][T12106] ? __fget_light+0x219/0x260 [ 2967.068010][T12106] ? fput+0x2d/0x130 [ 2967.071959][T12106] ? ksys_write+0x157/0x180 [ 2967.076475][T12106] __x64_sys_sendmsg+0x42/0x50 [ 2967.081531][T12106] do_syscall_64+0x39/0x80 [ 2967.085931][T12106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2967.091803][T12106] RIP: 0033:0x45e219 [ 2967.095867][T12106] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2967.115639][T12106] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:15:53 executing program 0 (fault-call:14 fault-nth:85): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2967.124257][T12106] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2967.132574][T12106] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2967.140710][T12106] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2967.149097][T12106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000054 [ 2967.157061][T12106] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2967.209525][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2967.246452][T12108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2967.258882][T12108] FAULT_INJECTION: forcing a failure. [ 2967.258882][T12108] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.276517][T12108] CPU: 1 PID: 12108 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2967.286590][T12108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.296692][T12108] Call Trace: [ 2967.299967][T12108] dump_stack+0x116/0x15d [ 2967.304320][T12108] should_fail+0x231/0x240 [ 2967.308728][T12108] ? __kernfs_new_node+0x71/0x350 [ 2967.313855][T12108] __should_failslab+0x81/0x90 [ 2967.318735][T12108] should_failslab+0x5/0x20 [ 2967.323579][T12108] kmem_cache_alloc+0x36/0x2e0 [ 2967.328601][T12108] __kernfs_new_node+0x71/0x350 [ 2967.333439][T12108] ? rb_insert_color+0x2c9/0x2e0 [ 2967.338367][T12108] ? kernfs_link_sibling+0x21c/0x230 [ 2967.343640][T12108] ? kernfs_activate+0x2c5/0x2e0 [ 2967.348929][T12108] kernfs_new_node+0x5b/0xd0 [ 2967.353885][T12108] __kernfs_create_file+0x45/0x180 [ 2967.359533][T12108] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2967.364909][T12108] sysfs_merge_group+0xb5/0x190 [ 2967.369745][T12108] dpm_sysfs_add+0x9d/0x1d0 [ 2967.374259][T12108] device_add+0x925/0xe50 [ 2967.378646][T12108] netdev_register_kobject+0xfd/0x230 [ 2967.384091][T12108] register_netdevice+0xbcf/0x1060 [ 2967.389370][T12108] ipvlan_link_new+0x2a2/0x5d0 [ 2967.394144][T12108] rtnl_newlink+0xda6/0x13b0 [ 2967.398774][T12108] ? irqentry_exit+0x2a/0x40 [ 2967.403368][T12108] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2967.409283][T12108] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2967.415436][T12108] ? widen_string+0x3a/0x280 [ 2967.420184][T12108] ? aa_get_newest_label+0x74/0x250 [ 2967.425457][T12108] ? apparmor_capable+0xfe/0x160 [ 2967.430410][T12108] ? bpf_lsm_capable+0x5/0x10 [ 2967.435097][T12108] ? security_capable+0x91/0xa0 [ 2967.439965][T12108] ? __rcu_read_unlock+0x51/0x250 [ 2967.445078][T12108] ? ns_capable+0x79/0xa0 [ 2967.449438][T12108] ? rtnl_setlink+0x270/0x270 [ 2967.454183][T12108] rtnetlink_rcv_msg+0x723/0x7c0 [ 2967.460180][T12108] ? ___cache_free+0x3c/0x2f0 [ 2967.464923][T12108] ? ima_match_policy+0xa80/0xab0 [ 2967.470257][T12108] ? __kfree_skb+0xfe/0x150 [ 2967.474757][T12108] ? __kfree_skb+0xfe/0x150 [ 2967.479448][T12108] ? consume_skb+0x4b/0x160 [ 2967.484037][T12108] ? nlmon_xmit+0x47/0x50 [ 2967.488541][T12108] ? xmit_one+0x173/0x2e0 [ 2967.493099][T12108] ? local_bh_enable+0x1b/0x20 [ 2967.498175][T12108] ? __dev_queue_xmit+0xbf2/0x1500 [ 2967.503509][T12108] ? __skb_clone+0x2a9/0x2c0 [ 2967.508113][T12108] ? __rcu_read_unlock+0x51/0x250 [ 2967.513121][T12108] netlink_rcv_skb+0x13e/0x240 [ 2967.518007][T12108] ? rtnetlink_bind+0x60/0x60 [ 2967.522677][T12108] rtnetlink_rcv+0x18/0x20 [ 2967.528343][T12108] netlink_unicast+0x5df/0x6b0 [ 2967.533265][T12108] netlink_sendmsg+0x6f8/0x7c0 [ 2967.538083][T12108] ? netlink_getsockopt+0x720/0x720 [ 2967.543283][T12108] ____sys_sendmsg+0x352/0x4c0 [ 2967.548039][T12108] ? import_iovec+0xb8/0xd0 [ 2967.552744][T12108] __sys_sendmsg+0x1ed/0x270 [ 2967.557384][T12108] ? __fsnotify_parent+0x32f/0x430 [ 2967.562624][T12108] ? get_pid_task+0x90/0xc0 [ 2967.567198][T12108] ? vfs_write+0x54d/0x7c0 [ 2967.571616][T12108] ? __fget_light+0x219/0x260 [ 2967.576291][T12108] ? fput+0x2d/0x130 [ 2967.580186][T12108] ? ksys_write+0x157/0x180 [ 2967.584858][T12108] __x64_sys_sendmsg+0x42/0x50 [ 2967.589616][T12108] do_syscall_64+0x39/0x80 [ 2967.594023][T12108] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2967.600032][T12108] RIP: 0033:0x45e219 [ 2967.603945][T12108] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2967.624426][T12108] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2967.633248][T12108] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2967.641291][T12108] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2967.649669][T12108] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2967.657706][T12108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000055 [ 2967.665729][T12108] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:54 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x73}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x20}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xd, 0x20}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netpci0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x0) 17:15:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:54 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:54 executing program 0 (fault-call:14 fault-nth:86): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:15:54 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000305) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000680), &(0x7f00000006c0)=0x4) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r2 = syz_mount_image$zonefs(&(0x7f0000000000)='zonefs\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000080)="61a0271761b30af9659dc16e5f8e7b85fd392129d64fa158ba1d2928c7a8623377de0b56509c7743d5d10e0fac507b54cdb6551eca41a9ed6606ef17199570b55583a983c820e34dee794137e47cea5da403dfc3e01a05ef5104f574c683f6670370288afd67dab7d25c0a0d7c6d5251299a45f0cdeae91521da1998161e44721884575724818ba7ba789a4cb073f9b8818e99f1a4d275ad1167f2b4f17636a6acfd970e047e34a35d83e2bd62be", 0xae, 0x100000000}, {&(0x7f0000000180)="5fcdb568cccdc7d3961a5483665e65f8413977027c3c60784641333c73da1caeb980643ac21e3f3fe1018f6b8381c53557194debdccb57eeaf3169a5da99f7d34fbc70558f8875f81898a9991755675e7d73422958c9ad4faca2164ba530b26774cd5624deae2243e6286f464b5f83fcb6751ff73e0d16ffaee8c7c4013d4136e2169273bd", 0x85}, {&(0x7f0000000240)="e3452f4773971cb50d6daa10fdd7582e7cd395dc68abfdc1c43618d60ff732a3610110e3ad12ef7789a9bd4568632822b4b57e83523ebc4e49ef36641bdbb0476c4006ae706d81de73aff415d61053c4d6e465de6ae51d477b7b64", 0x5b, 0xffffffff}, {&(0x7f00000002c0)="def9773702702c18ff985c116c068f7744456b685928d2da6dcb33b8527b93dff73b02313ba9af4ecb0f7284ec9acbc055d05e48c6a46dc44f42553a3b6922e3b41074469bd0824c291504ca00b59e59381643102f3f120b602dff25ed4110618d7b3367c418eed6990d3da76d4c222036513314e9294c0d909e275770c2d2c0142dbeca2d9c4ce1e49ad2cb5e6f46dd57e0e8a366990c67e1", 0x99, 0x100000001}, {&(0x7f0000000380)="a6ac1f5b90410c809846f6ff3b5c16a0e2ae6919e358729eff6f902fdd8f41066d6c2152b29ed349195b79b0a3699dcb3b183e320cf1bc476e7e72502cc159234ccbfb996a8a31d131cf12aeeaf315775c98f8081fa96a59b9d78cf6c8b3cde326552cf765c1912dafc8b7180e3beae2efebfd8566931c6fc1e60fd3e0474aa15079e5c77a2303071024853c64a901d2559a485aed22674f66c9a86d25727acd6aabf83a9d2546dddb46de0edfcff51c022838110628f927ad13ce7eea41b7bcf90072ed26617a788211c6", 0xcb, 0xf6}, {&(0x7f0000000480), 0x0, 0x247c}], 0x2000000, &(0x7f0000000580)={[{@errors_zone_ro='errors=zone-ro'}, {@errors_zone_offline='errors=zone-offline'}, {@explicit_open='explicit-open'}, {@errors_repair='errors=repair'}, {@errors_repair='errors=repair'}, {@errors_repair='errors=repair'}, {@errors_zone_offline='errors=zone-offline'}, {@errors_zone_ro='errors=zone-ro'}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) faccessat2(r2, &(0x7f0000000640)='./file0\x00', 0x80, 0x1000) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000480)={0x0, 0x4}, 0x8) [ 2967.780468][T10032] usb 6-1: unable to read config index 0 descriptor/start: -71 [ 2967.790051][T10032] usb 6-1: can't read configurations, error -71 [ 2967.798917][T12117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2967.804915][T10032] usb usb6-port1: attempt power cycle [ 2967.817043][T12117] FAULT_INJECTION: forcing a failure. [ 2967.817043][T12117] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.867285][T12117] CPU: 0 PID: 12117 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2967.876542][T12117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.887220][T12117] Call Trace: [ 2967.891098][T12117] dump_stack+0x116/0x15d [ 2967.896150][T12117] should_fail+0x231/0x240 [ 2967.901580][T12117] __should_failslab+0x81/0x90 [ 2967.907122][T12117] ? kobject_uevent_env+0x197/0xc10 [ 2967.912856][T12117] should_failslab+0x5/0x20 [ 2967.918322][T12117] kmem_cache_alloc_trace+0x39/0x320 [ 2967.923715][T12117] ? __kernfs_create_file+0x165/0x180 [ 2967.929376][T12117] ? dev_uevent_filter+0x70/0x70 [ 2967.935302][T12117] kobject_uevent_env+0x197/0xc10 [ 2967.940879][T12117] ? _raw_spin_unlock_irq+0x22/0x40 [ 2967.946596][T12117] ? device_pm_check_callbacks+0x633/0x650 [ 2967.952672][T12117] ? __list_add_valid+0x28/0x90 [ 2967.958067][T12117] kobject_uevent+0x18/0x20 [ 2967.963338][T12117] device_add+0xb2a/0xe50 [ 2967.968428][T12117] netdev_register_kobject+0xfd/0x230 [ 2967.973854][T12117] register_netdevice+0xbcf/0x1060 [ 2967.979416][T12117] ipvlan_link_new+0x2a2/0x5d0 [ 2967.984328][T12117] rtnl_newlink+0xda6/0x13b0 [ 2967.990005][T12117] ? number+0xa03/0xb50 [ 2967.995066][T12117] ? format_decode+0x1d3/0x840 [ 2968.000916][T12117] ? widen_string+0x3a/0x280 [ 2968.006305][T12117] ? widen_string+0x3a/0x280 [ 2968.012074][T12117] ? aa_get_newest_label+0x74/0x250 [ 2968.018643][T12117] ? apparmor_capable+0xfe/0x160 [ 2968.024198][T12117] ? bpf_lsm_capable+0x5/0x10 [ 2968.029261][T12117] ? security_capable+0x91/0xa0 [ 2968.034447][T12117] ? __rcu_read_unlock+0x51/0x250 [ 2968.040244][T12117] ? ns_capable+0x79/0xa0 [ 2968.045436][T12117] ? rtnl_setlink+0x270/0x270 [ 2968.050141][T12117] rtnetlink_rcv_msg+0x723/0x7c0 [ 2968.056323][T12117] ? ___cache_free+0x3c/0x2f0 [ 2968.061575][T12117] ? ima_match_policy+0xa80/0xab0 [ 2968.068099][T12117] ? __kfree_skb+0xfe/0x150 [ 2968.074613][T12117] ? __kfree_skb+0xfe/0x150 [ 2968.079903][T12117] ? consume_skb+0x4b/0x160 [ 2968.086576][T12117] ? nlmon_xmit+0x47/0x50 [ 2968.092914][T12117] ? xmit_one+0x173/0x2e0 [ 2968.100149][T12117] ? local_bh_enable+0x1b/0x20 [ 2968.105452][T12117] ? __dev_queue_xmit+0xbf2/0x1500 [ 2968.112188][T12117] ? __skb_clone+0x2a9/0x2c0 [ 2968.120074][T12117] ? __rcu_read_unlock+0x51/0x250 [ 2968.127132][T12117] netlink_rcv_skb+0x13e/0x240 [ 2968.132178][T12117] ? rtnetlink_bind+0x60/0x60 [ 2968.136953][T12117] rtnetlink_rcv+0x18/0x20 [ 2968.141739][T12117] netlink_unicast+0x5df/0x6b0 [ 2968.147113][T12117] netlink_sendmsg+0x6f8/0x7c0 [ 2968.152162][T12117] ? netlink_getsockopt+0x720/0x720 [ 2968.161552][T12117] ____sys_sendmsg+0x352/0x4c0 [ 2968.169946][T12117] ? import_iovec+0xb8/0xd0 [ 2968.175128][T12117] __sys_sendmsg+0x1ed/0x270 [ 2968.181824][T12117] ? vfs_write+0x54d/0x7c0 [ 2968.191512][T12117] ? __fget_light+0x219/0x260 [ 2968.200553][T12117] ? fput+0x2d/0x130 [ 2968.205129][T12117] ? ksys_write+0x157/0x180 [ 2968.210139][T12117] __x64_sys_sendmsg+0x42/0x50 [ 2968.215855][T12117] do_syscall_64+0x39/0x80 [ 2968.220948][T12117] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2968.230164][T12117] RIP: 0033:0x45e219 [ 2968.234999][T12117] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2968.272228][T12117] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2968.283142][T12117] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2968.296561][T12117] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2968.307751][T12117] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2968.322211][T12117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000056 [ 2968.334910][T12117] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2968.351625][T12117] device ipvlan20 entered promiscuous mode [ 2968.362274][T12117] 8021q: adding VLAN 0 to HW filter on device ipvlan20 17:15:55 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:55 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:55 executing program 0 (fault-call:14 fault-nth:87): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2968.674019][T12136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2968.685978][T12136] FAULT_INJECTION: forcing a failure. [ 2968.685978][T12136] name failslab, interval 1, probability 0, space 0, times 0 [ 2968.705472][T12136] CPU: 0 PID: 12136 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2968.715081][T12136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2968.727174][T12136] Call Trace: [ 2968.730462][T12136] dump_stack+0x116/0x15d [ 2968.734898][T12136] should_fail+0x231/0x240 [ 2968.739325][T12136] ? alloc_uevent_skb+0x5b/0x120 [ 2968.744254][T12136] __should_failslab+0x81/0x90 [ 2968.749890][T12136] should_failslab+0x5/0x20 [ 2968.755857][T12136] kmem_cache_alloc_node_trace+0x4b/0x2e0 [ 2968.761889][T12136] ? __kmalloc_node_track_caller+0x30/0x40 [ 2968.768045][T12136] ? alloc_uevent_skb+0x5b/0x120 [ 2968.773311][T12136] __kmalloc_node_track_caller+0x30/0x40 [ 2968.779024][T12136] __alloc_skb+0xd2/0x2f0 [ 2968.783626][T12136] alloc_uevent_skb+0x5b/0x120 [ 2968.788394][T12136] kobject_uevent_env+0x6f4/0xc10 [ 2968.793718][T12136] ? _raw_spin_unlock_irq+0x22/0x40 [ 2968.799212][T12136] ? device_pm_check_callbacks+0x633/0x650 [ 2968.805653][T12136] ? __list_add_valid+0x28/0x90 [ 2968.810964][T12136] kobject_uevent+0x18/0x20 [ 2968.816511][T12136] device_add+0xb2a/0xe50 [ 2968.821004][T12136] netdev_register_kobject+0xfd/0x230 [ 2968.826462][T12136] register_netdevice+0xbcf/0x1060 [ 2968.832285][T12136] ipvlan_link_new+0x2a2/0x5d0 [ 2968.837860][T12136] rtnl_newlink+0xda6/0x13b0 [ 2968.843216][T12136] ? _raw_spin_unlock_irq+0x22/0x40 [ 2968.848507][T12136] ? finish_task_switch+0xc0/0x2a0 [ 2968.853890][T12136] ? __schedule+0x3c1/0x580 [ 2968.858448][T12136] ? widen_string+0x3a/0x280 [ 2968.863124][T12136] ? aa_get_newest_label+0x74/0x250 [ 2968.868591][T12136] ? apparmor_capable+0xfe/0x160 [ 2968.873782][T12136] ? bpf_lsm_capable+0x5/0x10 [ 2968.878866][T12136] ? security_capable+0x91/0xa0 [ 2968.883737][T12136] ? __rcu_read_unlock+0x51/0x250 [ 2968.888961][T12136] ? ns_capable+0x79/0xa0 [ 2968.893280][T12136] ? rtnl_setlink+0x270/0x270 [ 2968.898008][T12136] rtnetlink_rcv_msg+0x723/0x7c0 [ 2968.903371][T12136] ? ___cache_free+0x3c/0x2f0 [ 2968.908047][T12136] ? ima_match_policy+0xa80/0xab0 [ 2968.914708][T12136] ? __kfree_skb+0xfe/0x150 [ 2968.919300][T12136] ? __kfree_skb+0xfe/0x150 [ 2968.923897][T12136] ? consume_skb+0x4b/0x160 [ 2968.928397][T12136] ? nlmon_xmit+0x47/0x50 [ 2968.932927][T12136] ? xmit_one+0x173/0x2e0 [ 2968.937286][T12136] ? local_bh_enable+0x1b/0x20 [ 2968.942047][T12136] ? __dev_queue_xmit+0xbf2/0x1500 [ 2968.947195][T12136] ? __skb_clone+0x2a9/0x2c0 [ 2968.951786][T12136] ? __rcu_read_unlock+0x51/0x250 [ 2968.956827][T12136] netlink_rcv_skb+0x13e/0x240 [ 2968.961651][T12136] ? rtnetlink_bind+0x60/0x60 [ 2968.966323][T12136] rtnetlink_rcv+0x18/0x20 [ 2968.970736][T12136] netlink_unicast+0x5df/0x6b0 [ 2968.975795][T12136] netlink_sendmsg+0x6f8/0x7c0 [ 2968.980919][T12136] ? netlink_getsockopt+0x720/0x720 [ 2968.986483][T12136] ____sys_sendmsg+0x352/0x4c0 [ 2968.991295][T12136] ? import_iovec+0xb8/0xd0 [ 2968.995870][T12136] __sys_sendmsg+0x1ed/0x270 [ 2969.000602][T12136] ? __fsnotify_parent+0x32f/0x430 [ 2969.005761][T12136] ? get_pid_task+0x90/0xc0 [ 2969.010361][T12136] ? vfs_write+0x54d/0x7c0 [ 2969.014783][T12136] ? __fget_light+0x219/0x260 [ 2969.019568][T12136] ? fput+0x2d/0x130 [ 2969.023810][T12136] ? ksys_write+0x157/0x180 [ 2969.028539][T12136] __x64_sys_sendmsg+0x42/0x50 [ 2969.033483][T12136] do_syscall_64+0x39/0x80 [ 2969.037971][T12136] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2969.044011][T12136] RIP: 0033:0x45e219 [ 2969.048392][T12136] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2969.069653][T12136] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2969.078069][T12136] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2969.086026][T12136] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2969.093985][T12136] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2969.101961][T12136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000057 [ 2969.109926][T12136] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:55 executing program 0 (fault-call:14 fault-nth:88): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2969.183235][T12136] device ipvlan21 entered promiscuous mode [ 2969.190573][T12136] 8021q: adding VLAN 0 to HW filter on device ipvlan21 [ 2969.199720][T10032] usb 6-1: new high-speed USB device number 110 using dummy_hcd [ 2969.290182][T12146] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2969.302651][T12146] FAULT_INJECTION: forcing a failure. [ 2969.302651][T12146] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.318108][T12146] CPU: 1 PID: 12146 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2969.328377][T12146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.338959][T12146] Call Trace: [ 2969.342405][T12146] dump_stack+0x116/0x15d [ 2969.346894][T12146] should_fail+0x231/0x240 [ 2969.351403][T12146] ? alloc_uevent_skb+0x5b/0x120 [ 2969.356515][T12146] __should_failslab+0x81/0x90 [ 2969.361481][T12146] should_failslab+0x5/0x20 [ 2969.366284][T12146] kmem_cache_alloc_node_trace+0x4b/0x2e0 [ 2969.373545][T12146] ? __kmalloc_node_track_caller+0x30/0x40 [ 2969.379591][T12146] ? alloc_uevent_skb+0x5b/0x120 [ 2969.384518][T12146] __kmalloc_node_track_caller+0x30/0x40 [ 2969.390257][T12146] __alloc_skb+0xd2/0x2f0 [ 2969.394655][T12146] alloc_uevent_skb+0x5b/0x120 [ 2969.399848][T12146] kobject_uevent_env+0x6f4/0xc10 [ 2969.404871][T12146] ? _raw_spin_unlock_irq+0x22/0x40 [ 2969.410056][T12146] ? device_pm_check_callbacks+0x633/0x650 [ 2969.416239][T12146] ? __list_add_valid+0x28/0x90 [ 2969.421073][T12146] kobject_uevent+0x18/0x20 [ 2969.425560][T12146] device_add+0xb2a/0xe50 [ 2969.430927][T12146] netdev_register_kobject+0xfd/0x230 [ 2969.436348][T12146] register_netdevice+0xbcf/0x1060 [ 2969.441441][T12146] ipvlan_link_new+0x2a2/0x5d0 [ 2969.446385][T12146] rtnl_newlink+0xda6/0x13b0 [ 2969.451213][T12146] ? __schedule+0x3c1/0x580 [ 2969.456223][T12146] ? __schedule+0x3c1/0x580 [ 2969.460896][T12146] ? preempt_schedule_irq+0x43/0x80 [ 2969.466093][T12146] ? aa_get_newest_label+0x74/0x250 [ 2969.471380][T12146] ? apparmor_capable+0xfe/0x160 [ 2969.476314][T12146] ? bpf_lsm_capable+0x5/0x10 [ 2969.481211][T12146] ? security_capable+0x91/0xa0 [ 2969.486741][T12146] ? __rcu_read_unlock+0x51/0x250 [ 2969.492116][T12146] ? ns_capable+0x79/0xa0 [ 2969.496526][T12146] ? rtnl_setlink+0x270/0x270 [ 2969.501398][T12146] rtnetlink_rcv_msg+0x723/0x7c0 [ 2969.506421][T12146] ? ___cache_free+0x3c/0x2f0 [ 2969.511180][T12146] ? ima_match_policy+0xa80/0xab0 [ 2969.516353][T12146] ? __kfree_skb+0xfe/0x150 [ 2969.520858][T12146] ? __kfree_skb+0xfe/0x150 [ 2969.525728][T12146] ? consume_skb+0x4b/0x160 [ 2969.530733][T12146] ? nlmon_xmit+0x47/0x50 [ 2969.535086][T12146] ? xmit_one+0x173/0x2e0 [ 2969.539485][T12146] ? local_bh_enable+0x1b/0x20 [ 2969.544240][T12146] ? __dev_queue_xmit+0xbf2/0x1500 [ 2969.549350][T12146] ? __skb_clone+0x2a9/0x2c0 [ 2969.554066][T12146] ? __rcu_read_unlock+0x51/0x250 [ 2969.559478][T12146] netlink_rcv_skb+0x13e/0x240 [ 2969.564238][T12146] ? rtnetlink_bind+0x60/0x60 [ 2969.569872][T12146] rtnetlink_rcv+0x18/0x20 [ 2969.575781][T12146] netlink_unicast+0x5df/0x6b0 [ 2969.580623][T12146] netlink_sendmsg+0x6f8/0x7c0 [ 2969.585623][T12146] ? netlink_getsockopt+0x720/0x720 [ 2969.591006][T12146] ____sys_sendmsg+0x352/0x4c0 [ 2969.595990][T12146] ? import_iovec+0xb8/0xd0 [ 2969.601147][T12146] __sys_sendmsg+0x1ed/0x270 [ 2969.607019][T12146] ? __fsnotify_parent+0x32f/0x430 [ 2969.612462][T12146] ? get_pid_task+0x90/0xc0 [ 2969.617059][T12146] ? vfs_write+0x54d/0x7c0 [ 2969.621765][T12146] ? __fget_light+0x219/0x260 [ 2969.628060][T12146] ? fput+0x2d/0x130 [ 2969.632010][T12146] ? ksys_write+0x157/0x180 [ 2969.636603][T12146] __x64_sys_sendmsg+0x42/0x50 [ 2969.641547][T12146] do_syscall_64+0x39/0x80 [ 2969.645954][T12146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2969.651856][T12146] RIP: 0033:0x45e219 [ 2969.656262][T12146] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2969.676349][T12146] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2969.684831][T12146] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2969.692966][T12146] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2969.701469][T12146] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2969.709534][T12146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000058 [ 2969.717701][T12146] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2969.728102][T10032] usb 6-1: Using ep0 maxpacket: 32 17:15:56 executing program 0 (fault-call:14 fault-nth:89): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2969.738459][T12146] device ipvlan22 entered promiscuous mode [ 2969.749603][T12146] 8021q: adding VLAN 0 to HW filter on device ipvlan22 [ 2969.819756][T12150] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2969.832200][T12150] FAULT_INJECTION: forcing a failure. [ 2969.832200][T12150] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.856331][T12150] CPU: 1 PID: 12150 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2969.868646][T12150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.881204][T12150] Call Trace: [ 2969.885532][T12150] dump_stack+0x116/0x15d [ 2969.890738][T12150] should_fail+0x231/0x240 [ 2969.895330][T12150] __should_failslab+0x81/0x90 [ 2969.900458][T12150] ? kset_create_and_add+0x3a/0x170 [ 2969.907825][T12150] should_failslab+0x5/0x20 [ 2969.913404][T12150] kmem_cache_alloc_trace+0x39/0x320 [ 2969.920268][T12150] ? device_add+0xa45/0xe50 [ 2969.925873][T12150] kset_create_and_add+0x3a/0x170 [ 2969.932303][T12150] netdev_register_kobject+0x127/0x230 [ 2969.939360][T12150] register_netdevice+0xbcf/0x1060 [ 2969.945176][T12150] ipvlan_link_new+0x2a2/0x5d0 [ 2969.949959][T12150] rtnl_newlink+0xda6/0x13b0 [ 2969.955243][T12150] ? _raw_spin_unlock_irq+0x22/0x40 [ 2969.962188][T12150] ? finish_task_switch+0xc0/0x2a0 [ 2969.969366][T12150] ? __schedule+0x3c1/0x580 [ 2969.974156][T12150] ? widen_string+0x3a/0x280 [ 2969.979633][T12150] ? aa_get_newest_label+0x74/0x250 [ 2969.984914][T12150] ? apparmor_capable+0xfe/0x160 [ 2969.989941][T12150] ? bpf_lsm_capable+0x5/0x10 [ 2969.994606][T12150] ? security_capable+0x91/0xa0 [ 2969.999454][T12150] ? __rcu_read_unlock+0x51/0x250 [ 2970.004633][T12150] ? ns_capable+0x79/0xa0 [ 2970.008955][T12150] ? rtnl_setlink+0x270/0x270 [ 2970.013620][T12150] rtnetlink_rcv_msg+0x723/0x7c0 [ 2970.019418][T12150] ? ___cache_free+0x3c/0x2f0 [ 2970.024077][T12150] ? ima_match_policy+0xa80/0xab0 [ 2970.029103][T12150] ? __kfree_skb+0xfe/0x150 [ 2970.033605][T12150] ? __kfree_skb+0xfe/0x150 [ 2970.038101][T12150] ? consume_skb+0x4b/0x160 [ 2970.042907][T12150] ? nlmon_xmit+0x47/0x50 [ 2970.047223][T12150] ? xmit_one+0x173/0x2e0 [ 2970.051606][T12150] ? local_bh_enable+0x1b/0x20 [ 2970.056355][T12150] ? __dev_queue_xmit+0xbf2/0x1500 [ 2970.061454][T12150] ? __skb_clone+0x2a9/0x2c0 [ 2970.066214][T12150] ? __rcu_read_unlock+0x51/0x250 [ 2970.071418][T12150] netlink_rcv_skb+0x13e/0x240 [ 2970.076184][T12150] ? rtnetlink_bind+0x60/0x60 [ 2970.080854][T12150] rtnetlink_rcv+0x18/0x20 [ 2970.085249][T12150] netlink_unicast+0x5df/0x6b0 [ 2970.090012][T12150] netlink_sendmsg+0x6f8/0x7c0 [ 2970.094771][T12150] ? netlink_getsockopt+0x720/0x720 [ 2970.100049][T12150] ____sys_sendmsg+0x352/0x4c0 [ 2970.104913][T12150] ? import_iovec+0xb8/0xd0 [ 2970.109404][T12150] __sys_sendmsg+0x1ed/0x270 [ 2970.113996][T12150] ? __fsnotify_parent+0x32f/0x430 [ 2970.119921][T12150] ? get_pid_task+0x90/0xc0 [ 2970.124696][T12150] ? vfs_write+0x54d/0x7c0 [ 2970.129110][T12150] ? __fget_light+0x219/0x260 [ 2970.133783][T12150] ? fput+0x2d/0x130 [ 2970.137658][T12150] ? ksys_write+0x157/0x180 [ 2970.142146][T12150] __x64_sys_sendmsg+0x42/0x50 [ 2970.147966][T12150] do_syscall_64+0x39/0x80 [ 2970.152440][T12150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2970.158374][T12150] RIP: 0033:0x45e219 [ 2970.162462][T12150] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2970.182481][T12150] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2970.190902][T12150] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2970.198867][T12150] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2970.206962][T12150] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2970.215212][T12150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000059 [ 2970.223179][T12150] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2970.241766][T10032] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2970.250289][T10032] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2970.261933][T10032] usb 6-1: config 0 has no interface number 0 [ 2970.268971][T10032] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2970.278214][T10032] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2970.288612][T10032] usb 6-1: config 0 descriptor?? [ 2970.351360][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2970.579153][T10032] snd_usb_pod 6-1:0.1: set_interface failed [ 2970.585950][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2970.594883][T10032] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2970.605393][T10032] usb 6-1: USB disconnect, device number 110 17:15:57 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:57 executing program 0 (fault-call:14 fault-nth:90): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2970.745065][T12163] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2970.755571][T12163] FAULT_INJECTION: forcing a failure. [ 2970.755571][T12163] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.771554][T12163] CPU: 1 PID: 12163 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2970.781484][T12163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.791673][T12163] Call Trace: [ 2970.794941][T12163] dump_stack+0x116/0x15d [ 2970.799262][T12163] should_fail+0x231/0x240 [ 2970.803688][T12163] __should_failslab+0x81/0x90 [ 2970.808467][T12163] ? kvasprintf_const+0x59/0xf0 [ 2970.813565][T12163] should_failslab+0x5/0x20 [ 2970.818167][T12163] __kmalloc_track_caller+0x57/0x360 [ 2970.823503][T12163] kvasprintf+0x70/0xf0 [ 2970.827719][T12163] ? rb_first+0x9/0x40 [ 2970.831772][T12163] kvasprintf_const+0x59/0xf0 [ 2970.836549][T12163] kobject_set_name_vargs+0x43/0xe0 [ 2970.841738][T12163] kobject_init_and_add+0x121/0x200 [ 2970.847043][T12163] ? dev_uevent_filter+0x24/0x70 [ 2970.851979][T12163] ? kobject_uevent_env+0x1f5/0xc10 [ 2970.857556][T12163] ? sysfs_create_groups+0x72/0xf0 [ 2970.862857][T12163] ? kernfs_get+0x2b/0x50 [ 2970.867578][T12163] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2970.873457][T12163] netdev_register_kobject+0x17e/0x230 [ 2970.878998][T12163] register_netdevice+0xbcf/0x1060 [ 2970.884109][T12163] ipvlan_link_new+0x2a2/0x5d0 [ 2970.889014][T12163] rtnl_newlink+0xda6/0x13b0 [ 2970.894091][T12163] ? kvm_sched_clock_read+0x15/0x40 [ 2970.899276][T12163] ? sched_clock+0xf/0x20 [ 2970.903601][T12163] ? sched_clock_cpu+0x11/0x1a0 [ 2970.908481][T12163] ? __perf_event_task_sched_in+0x565/0x590 [ 2970.914511][T12163] ? kvm_sched_clock_read+0x15/0x40 [ 2970.920264][T12163] ? sched_clock+0xf/0x20 [ 2970.924671][T12163] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2970.930131][T12163] ? widen_string+0x3a/0x280 [ 2970.934709][T12163] ? aa_get_newest_label+0x74/0x250 [ 2970.939902][T12163] ? apparmor_capable+0xfe/0x160 [ 2970.944898][T12163] ? bpf_lsm_capable+0x5/0x10 [ 2970.949686][T12163] ? security_capable+0x91/0xa0 [ 2970.954529][T12163] ? __rcu_read_unlock+0x51/0x250 [ 2970.959653][T12163] ? ns_capable+0x79/0xa0 [ 2970.963970][T12163] ? rtnl_setlink+0x270/0x270 [ 2970.968629][T12163] rtnetlink_rcv_msg+0x723/0x7c0 [ 2970.973592][T12163] ? ___cache_free+0x3c/0x2f0 [ 2970.978434][T12163] ? ima_match_policy+0xa80/0xab0 [ 2970.983593][T12163] ? __kfree_skb+0xfe/0x150 [ 2970.988372][T12163] ? __kfree_skb+0xfe/0x150 [ 2970.992940][T12163] ? consume_skb+0x4b/0x160 [ 2970.997486][T12163] ? nlmon_xmit+0x47/0x50 [ 2971.002110][T12163] ? xmit_one+0x173/0x2e0 [ 2971.006430][T12163] ? local_bh_enable+0x1b/0x20 [ 2971.011265][T12163] ? __dev_queue_xmit+0xbf2/0x1500 [ 2971.016421][T12163] ? __skb_clone+0x2a9/0x2c0 [ 2971.021248][T12163] ? __rcu_read_unlock+0x51/0x250 [ 2971.026435][T12163] netlink_rcv_skb+0x13e/0x240 [ 2971.031278][T12163] ? rtnetlink_bind+0x60/0x60 [ 2971.035990][T12163] rtnetlink_rcv+0x18/0x20 [ 2971.040640][T12163] netlink_unicast+0x5df/0x6b0 [ 2971.045518][T12163] netlink_sendmsg+0x6f8/0x7c0 [ 2971.050346][T12163] ? netlink_getsockopt+0x720/0x720 [ 2971.055568][T12163] ____sys_sendmsg+0x352/0x4c0 [ 2971.060318][T12163] ? import_iovec+0xb8/0xd0 [ 2971.064823][T12163] __sys_sendmsg+0x1ed/0x270 [ 2971.069441][T12163] ? __fsnotify_parent+0x32f/0x430 [ 2971.074824][T12163] ? get_pid_task+0x90/0xc0 [ 2971.079340][T12163] ? vfs_write+0x54d/0x7c0 [ 2971.083780][T12163] ? __fget_light+0x219/0x260 [ 2971.088450][T12163] ? fput+0x2d/0x130 [ 2971.092328][T12163] ? ksys_write+0x157/0x180 [ 2971.097056][T12163] __x64_sys_sendmsg+0x42/0x50 [ 2971.101840][T12163] do_syscall_64+0x39/0x80 [ 2971.106256][T12163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2971.112222][T12163] RIP: 0033:0x45e219 [ 2971.116155][T12163] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2971.138896][T12163] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2971.147298][T12163] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2971.155329][T12163] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2971.163302][T12163] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2971.171660][T12163] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005a [ 2971.179662][T12163] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:57 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:57 executing program 0 (fault-call:14 fault-nth:91): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2971.194560][T12163] kobject: can not set name properly! [ 2971.241179][T12174] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2971.252314][T12174] FAULT_INJECTION: forcing a failure. [ 2971.252314][T12174] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.270145][T12174] CPU: 1 PID: 12174 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2971.279675][T12174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.290433][T12174] Call Trace: [ 2971.294265][T12174] dump_stack+0x116/0x15d [ 2971.299670][T12174] should_fail+0x231/0x240 [ 2971.304605][T12174] __should_failslab+0x81/0x90 [ 2971.309525][T12174] ? kvasprintf_const+0x59/0xf0 [ 2971.314457][T12174] should_failslab+0x5/0x20 [ 2971.319410][T12174] __kmalloc_track_caller+0x57/0x360 [ 2971.324997][T12174] kvasprintf+0x70/0xf0 [ 2971.330973][T12174] ? rb_first+0x9/0x40 [ 2971.335574][T12174] kvasprintf_const+0x59/0xf0 [ 2971.341396][T12174] kobject_set_name_vargs+0x43/0xe0 [ 2971.347027][T12174] kobject_init_and_add+0x121/0x200 [ 2971.354136][T12174] ? dev_uevent_filter+0x24/0x70 [ 2971.359965][T12174] ? kobject_uevent_env+0x1f5/0xc10 [ 2971.366196][T12174] ? sysfs_create_groups+0x72/0xf0 [ 2971.372443][T12174] ? kernfs_get+0x2b/0x50 [ 2971.378383][T12174] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2971.384894][T12174] netdev_register_kobject+0x17e/0x230 [ 2971.391580][T12174] register_netdevice+0xbcf/0x1060 [ 2971.397306][T12174] ipvlan_link_new+0x2a2/0x5d0 [ 2971.403450][T12174] rtnl_newlink+0xda6/0x13b0 [ 2971.409641][T12174] ? number+0xa03/0xb50 [ 2971.414407][T12174] ? __perf_event_task_sched_in+0x565/0x590 [ 2971.421022][T12174] ? kvm_sched_clock_read+0x15/0x40 [ 2971.427181][T12174] ? sched_clock+0xf/0x20 [ 2971.432319][T12174] ? widen_string+0x3a/0x280 [ 2971.438112][T12174] ? aa_get_newest_label+0x74/0x250 [ 2971.443788][T12174] ? apparmor_capable+0xfe/0x160 [ 2971.449887][T12174] ? bpf_lsm_capable+0x5/0x10 [ 2971.455184][T12174] ? security_capable+0x91/0xa0 [ 2971.460583][T12174] ? __rcu_read_unlock+0x51/0x250 [ 2971.466344][T12174] ? ns_capable+0x79/0xa0 [ 2971.472650][T12174] ? rtnl_setlink+0x270/0x270 [ 2971.477759][T12174] rtnetlink_rcv_msg+0x723/0x7c0 [ 2971.482947][T12174] ? ___cache_free+0x3c/0x2f0 [ 2971.487833][T12174] ? kvm_sched_clock_read+0x15/0x40 [ 2971.493091][T12174] ? sched_clock+0xf/0x20 [ 2971.498146][T12174] ? __kfree_skb+0xfe/0x150 [ 2971.504433][T12174] ? __kfree_skb+0xfe/0x150 [ 2971.510083][T12174] ? consume_skb+0x4b/0x160 [ 2971.515228][T12174] ? nlmon_xmit+0x47/0x50 [ 2971.521520][T12174] ? xmit_one+0x173/0x2e0 [ 2971.527597][T12174] ? local_bh_enable+0x1b/0x20 [ 2971.533372][T12174] ? __dev_queue_xmit+0xbf2/0x1500 [ 2971.539488][T12174] ? __skb_clone+0x2a9/0x2c0 [ 2971.544716][T12174] ? __rcu_read_unlock+0x51/0x250 [ 2971.550929][T12174] netlink_rcv_skb+0x13e/0x240 [ 2971.556054][T12174] ? rtnetlink_bind+0x60/0x60 [ 2971.562121][T12174] rtnetlink_rcv+0x18/0x20 [ 2971.567240][T12174] netlink_unicast+0x5df/0x6b0 [ 2971.572266][T12174] netlink_sendmsg+0x6f8/0x7c0 [ 2971.577164][T12174] ? netlink_getsockopt+0x720/0x720 [ 2971.583032][T12174] ____sys_sendmsg+0x352/0x4c0 [ 2971.587990][T12174] ? import_iovec+0xb8/0xd0 [ 2971.592486][T12174] __sys_sendmsg+0x1ed/0x270 [ 2971.597337][T12174] ? __fsnotify_parent+0x32f/0x430 [ 2971.602524][T12174] ? get_pid_task+0x90/0xc0 [ 2971.607124][T12174] ? vfs_write+0x54d/0x7c0 [ 2971.611978][T12174] ? __fget_light+0x219/0x260 [ 2971.616658][T12174] ? fput+0x2d/0x130 [ 2971.620542][T12174] ? ksys_write+0x157/0x180 [ 2971.625221][T12174] __x64_sys_sendmsg+0x42/0x50 [ 2971.629995][T12174] do_syscall_64+0x39/0x80 [ 2971.634572][T12174] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2971.640569][T12174] RIP: 0033:0x45e219 [ 2971.644741][T12174] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2971.665628][T12174] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2971.674799][T12174] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2971.683387][T12174] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:15:58 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2971.691585][T12174] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2971.699781][T12174] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005b [ 2971.707750][T12174] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:58 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:15:58 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x4f, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:15:58 executing program 0 (fault-call:14 fault-nth:92): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2971.810647][T12174] kobject: can not set name properly! [ 2971.858724][T12188] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2971.868826][T12188] FAULT_INJECTION: forcing a failure. [ 2971.868826][T12188] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.882317][T12188] CPU: 1 PID: 12188 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2971.892476][T12188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.903067][T12188] Call Trace: [ 2971.906337][T12188] dump_stack+0x116/0x15d [ 2971.910779][T12188] should_fail+0x231/0x240 [ 2971.915403][T12188] __should_failslab+0x81/0x90 [ 2971.920594][T12188] ? __kernfs_new_node+0x44/0x350 [ 2971.925788][T12188] should_failslab+0x5/0x20 [ 2971.930280][T12188] __kmalloc_track_caller+0x57/0x360 [ 2971.935735][T12188] ? delete_node+0x42e/0x470 [ 2971.940606][T12188] ? ___cache_free+0x3c/0x2f0 [ 2971.945815][T12188] kstrdup_const+0x51/0x90 [ 2971.950274][T12188] __kernfs_new_node+0x44/0x350 [ 2971.955805][T12188] ? make_kgid+0x10e/0x300 [ 2971.960642][T12188] kernfs_create_dir_ns+0x5e/0x140 [ 2971.966149][T12188] sysfs_create_dir_ns+0x94/0x190 [ 2971.971602][T12188] kobject_add_internal+0x456/0x820 [ 2971.977165][T12188] kobject_init_and_add+0x14e/0x200 [ 2971.983699][T12188] ? dev_uevent_filter+0x24/0x70 [ 2971.988726][T12188] ? kobject_uevent_env+0x1f5/0xc10 [ 2971.994032][T12188] ? sysfs_create_groups+0x72/0xf0 [ 2971.999228][T12188] ? kernfs_get+0x2b/0x50 [ 2972.003643][T12188] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2972.009810][T12188] netdev_register_kobject+0x17e/0x230 [ 2972.015557][T12188] register_netdevice+0xbcf/0x1060 [ 2972.020663][T12188] ipvlan_link_new+0x2a2/0x5d0 [ 2972.025510][T12188] rtnl_newlink+0xda6/0x13b0 [ 2972.030188][T12188] ? _raw_spin_unlock_irq+0x22/0x40 [ 2972.035391][T12188] ? finish_task_switch+0xc0/0x2a0 [ 2972.040492][T12188] ? __schedule+0x3c1/0x580 [ 2972.045013][T12188] ? widen_string+0x3a/0x280 [ 2972.049610][T12188] ? widen_string+0x3a/0x280 [ 2972.054184][T12188] ? aa_get_newest_label+0x74/0x250 [ 2972.059647][T12188] ? apparmor_capable+0xfe/0x160 [ 2972.064638][T12188] ? bpf_lsm_capable+0x5/0x10 [ 2972.069341][T12188] ? security_capable+0x91/0xa0 [ 2972.074258][T12188] ? __rcu_read_unlock+0x51/0x250 [ 2972.079271][T12188] ? ns_capable+0x79/0xa0 [ 2972.083625][T12188] ? rtnl_setlink+0x270/0x270 [ 2972.088298][T12188] rtnetlink_rcv_msg+0x723/0x7c0 [ 2972.093256][T12188] ? ___cache_free+0x3c/0x2f0 [ 2972.097915][T12188] ? ima_match_policy+0xa80/0xab0 [ 2972.102925][T12188] ? __kfree_skb+0xfe/0x150 [ 2972.107410][T12188] ? __kfree_skb+0xfe/0x150 [ 2972.112791][T12188] ? consume_skb+0x4b/0x160 [ 2972.117398][T12188] ? nlmon_xmit+0x47/0x50 [ 2972.121870][T12188] ? xmit_one+0x173/0x2e0 [ 2972.126850][T12188] ? local_bh_enable+0x1b/0x20 [ 2972.131607][T12188] ? __dev_queue_xmit+0xbf2/0x1500 [ 2972.136705][T12188] ? __skb_clone+0x2a9/0x2c0 [ 2972.141280][T12188] ? __rcu_read_unlock+0x51/0x250 [ 2972.146458][T12188] netlink_rcv_skb+0x13e/0x240 [ 2972.151232][T12188] ? rtnetlink_bind+0x60/0x60 [ 2972.155910][T12188] rtnetlink_rcv+0x18/0x20 [ 2972.160313][T12188] netlink_unicast+0x5df/0x6b0 [ 2972.165139][T12188] netlink_sendmsg+0x6f8/0x7c0 [ 2972.169882][T12188] ? netlink_getsockopt+0x720/0x720 [ 2972.175059][T12188] ____sys_sendmsg+0x352/0x4c0 [ 2972.179982][T12188] ? import_iovec+0xb8/0xd0 [ 2972.185087][T12188] __sys_sendmsg+0x1ed/0x270 [ 2972.189679][T12188] ? __fsnotify_parent+0x32f/0x430 [ 2972.194775][T12188] ? get_pid_task+0x90/0xc0 [ 2972.199275][T12188] ? vfs_write+0x54d/0x7c0 [ 2972.203687][T12188] ? __fget_light+0x219/0x260 [ 2972.208443][T12188] ? fput+0x2d/0x130 [ 2972.212318][T12188] ? ksys_write+0x157/0x180 [ 2972.216935][T12188] __x64_sys_sendmsg+0x42/0x50 [ 2972.221974][T12188] do_syscall_64+0x39/0x80 [ 2972.226376][T12188] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2972.232252][T12188] RIP: 0033:0x45e219 [ 2972.236149][T12188] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2972.256133][T12188] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2972.267637][T12188] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2972.275601][T12188] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2972.283557][T12188] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2972.291658][T12188] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005c [ 2972.299754][T12188] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:59 executing program 0 (fault-call:14 fault-nth:93): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2972.310060][T12188] kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 2972.373831][T12190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2972.387111][T12190] FAULT_INJECTION: forcing a failure. [ 2972.387111][T12190] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.405090][T12190] CPU: 0 PID: 12190 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2972.414349][T12190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.424651][T12190] Call Trace: [ 2972.429540][T12190] dump_stack+0x116/0x15d [ 2972.435712][T12190] should_fail+0x231/0x240 [ 2972.441662][T12190] ? __kernfs_new_node+0x71/0x350 [ 2972.448544][T12190] __should_failslab+0x81/0x90 [ 2972.453466][T12190] should_failslab+0x5/0x20 [ 2972.459173][T12190] kmem_cache_alloc+0x36/0x2e0 [ 2972.464763][T12190] __kernfs_new_node+0x71/0x350 [ 2972.470563][T12190] ? make_kgid+0x10e/0x300 [ 2972.476462][T12190] kernfs_create_dir_ns+0x5e/0x140 [ 2972.482176][T12190] sysfs_create_dir_ns+0x94/0x190 [ 2972.488648][T12190] kobject_add_internal+0x456/0x820 [ 2972.494514][T12190] kobject_init_and_add+0x14e/0x200 [ 2972.501724][T12190] ? dev_uevent_filter+0x24/0x70 [ 2972.507919][T12190] ? kobject_uevent_env+0x1f5/0xc10 [ 2972.513611][T12190] ? sysfs_create_groups+0x72/0xf0 [ 2972.520348][T12190] ? kernfs_get+0x2b/0x50 [ 2972.526749][T12190] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2972.533196][T12190] netdev_register_kobject+0x17e/0x230 [ 2972.540304][T12190] register_netdevice+0xbcf/0x1060 [ 2972.547092][T12190] ipvlan_link_new+0x2a2/0x5d0 [ 2972.554341][T12190] rtnl_newlink+0xda6/0x13b0 [ 2972.560227][T12190] ? __schedule+0x3c1/0x580 [ 2972.565241][T12190] ? __perf_event_task_sched_in+0x565/0x590 [ 2972.571518][T12190] ? kvm_sched_clock_read+0x15/0x40 [ 2972.576759][T12190] ? sched_clock+0xf/0x20 [ 2972.581191][T12190] ? widen_string+0x3a/0x280 [ 2972.586104][T12190] ? aa_get_newest_label+0x74/0x250 [ 2972.591636][T12190] ? apparmor_capable+0xfe/0x160 [ 2972.596949][T12190] ? bpf_lsm_capable+0x5/0x10 [ 2972.601766][T12190] ? security_capable+0x91/0xa0 [ 2972.606706][T12190] ? __rcu_read_unlock+0x51/0x250 [ 2972.612007][T12190] ? ns_capable+0x79/0xa0 [ 2972.616327][T12190] ? rtnl_setlink+0x270/0x270 [ 2972.621139][T12190] rtnetlink_rcv_msg+0x723/0x7c0 [ 2972.626082][T12190] ? ___cache_free+0x3c/0x2f0 [ 2972.631374][T12190] ? ima_match_policy+0xa80/0xab0 [ 2972.636385][T12190] ? __kfree_skb+0xfe/0x150 [ 2972.641159][T12190] ? __kfree_skb+0xfe/0x150 [ 2972.645647][T12190] ? consume_skb+0x4b/0x160 [ 2972.650212][T12190] ? nlmon_xmit+0x47/0x50 [ 2972.654691][T12190] ? xmit_one+0x173/0x2e0 [ 2972.659069][T12190] ? local_bh_enable+0x1b/0x20 [ 2972.664168][T12190] ? __dev_queue_xmit+0xbf2/0x1500 [ 2972.670037][T12190] ? __skb_clone+0x2a9/0x2c0 [ 2972.674618][T12190] ? __rcu_read_unlock+0x51/0x250 [ 2972.679876][T12190] netlink_rcv_skb+0x13e/0x240 [ 2972.684676][T12190] ? rtnetlink_bind+0x60/0x60 [ 2972.690301][T12190] rtnetlink_rcv+0x18/0x20 [ 2972.694876][T12190] netlink_unicast+0x5df/0x6b0 [ 2972.699881][T12190] netlink_sendmsg+0x6f8/0x7c0 [ 2972.704862][T12190] ? netlink_getsockopt+0x720/0x720 [ 2972.711036][T12190] ____sys_sendmsg+0x352/0x4c0 [ 2972.718434][T12190] ? import_iovec+0xb8/0xd0 [ 2972.724711][T12190] __sys_sendmsg+0x1ed/0x270 [ 2972.729886][T12190] ? __fsnotify_parent+0x32f/0x430 [ 2972.735625][T12190] ? get_pid_task+0x90/0xc0 [ 2972.741050][T12190] ? vfs_write+0x54d/0x7c0 [ 2972.745704][T12190] ? __fget_light+0x219/0x260 [ 2972.751079][T12190] ? fput+0x2d/0x130 [ 2972.755004][T12190] ? ksys_write+0x157/0x180 [ 2972.759834][T12190] __x64_sys_sendmsg+0x42/0x50 [ 2972.767414][T12190] do_syscall_64+0x39/0x80 [ 2972.772715][T12190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2972.778888][T12190] RIP: 0033:0x45e219 [ 2972.782780][T12190] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2972.806548][T12190] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2972.816996][T12190] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2972.826496][T12190] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2972.835515][T12190] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2972.844116][T12190] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005d [ 2972.853968][T12190] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:15:59 executing program 0 (fault-call:14 fault-nth:94): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2972.868152][T12190] kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 2972.924799][T12192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2972.937433][T12192] FAULT_INJECTION: forcing a failure. [ 2972.937433][T12192] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.939433][T10032] usb 6-1: new high-speed USB device number 111 using dummy_hcd [ 2972.951540][T12192] CPU: 0 PID: 12192 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2972.967890][T12192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.979313][T12192] Call Trace: [ 2972.983191][T12192] dump_stack+0x116/0x15d [ 2972.988976][T12192] should_fail+0x231/0x240 [ 2972.994270][T12192] ? __kernfs_new_node+0x71/0x350 [ 2973.000219][T12192] __should_failslab+0x81/0x90 [ 2973.006948][T12192] should_failslab+0x5/0x20 [ 2973.011874][T12192] kmem_cache_alloc+0x36/0x2e0 [ 2973.016760][T12192] ? delete_node+0x42e/0x470 [ 2973.025601][T12192] __kernfs_new_node+0x71/0x350 [ 2973.030809][T12192] ? radix_tree_iter_tag_clear+0xe6/0x150 [ 2973.037482][T12192] kernfs_new_node+0x5b/0xd0 [ 2973.042555][T12192] __kernfs_create_file+0x45/0x180 [ 2973.048372][T12192] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2973.056557][T12192] internal_create_group+0x2e4/0x850 [ 2973.063373][T12192] sysfs_create_groups+0x3d/0xf0 [ 2973.070102][T12192] kobject_add_internal+0x565/0x820 [ 2973.076058][T12192] kobject_init_and_add+0x14e/0x200 [ 2973.081532][T12192] ? dev_uevent_filter+0x24/0x70 [ 2973.086817][T12192] ? kobject_uevent_env+0x1f5/0xc10 [ 2973.092174][T12192] ? sysfs_create_groups+0x72/0xf0 [ 2973.097790][T12192] ? kernfs_get+0x2b/0x50 [ 2973.102203][T12192] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2973.108172][T12192] netdev_register_kobject+0x17e/0x230 [ 2973.114512][T12192] register_netdevice+0xbcf/0x1060 [ 2973.119768][T12192] ipvlan_link_new+0x2a2/0x5d0 [ 2973.124516][T12192] rtnl_newlink+0xda6/0x13b0 [ 2973.129354][T12192] ? __schedule+0x3c1/0x580 [ 2973.133848][T12192] ? preempt_schedule_irq+0x43/0x80 [ 2973.139042][T12192] ? irqentry_exit_cond_resched+0x30/0x40 [ 2973.144758][T12192] ? aa_get_newest_label+0x74/0x250 [ 2973.150021][T12192] ? apparmor_capable+0xfe/0x160 [ 2973.155386][T12192] ? bpf_lsm_capable+0x5/0x10 [ 2973.160075][T12192] ? security_capable+0x91/0xa0 [ 2973.164946][T12192] ? __rcu_read_unlock+0x51/0x250 [ 2973.170043][T12192] ? ns_capable+0x79/0xa0 [ 2973.174359][T12192] ? rtnl_setlink+0x270/0x270 [ 2973.179140][T12192] rtnetlink_rcv_msg+0x723/0x7c0 [ 2973.184075][T12192] ? ___cache_free+0x3c/0x2f0 [ 2973.188767][T12192] ? ima_match_policy+0xa80/0xab0 [ 2973.193769][T12192] ? __kfree_skb+0xfe/0x150 [ 2973.198287][T12192] ? __kfree_skb+0xfe/0x150 [ 2973.202767][T12192] ? consume_skb+0x4b/0x160 [ 2973.207835][T12192] ? nlmon_xmit+0x47/0x50 [ 2973.212331][T12192] ? xmit_one+0x173/0x2e0 [ 2973.216670][T12192] ? local_bh_enable+0x1b/0x20 [ 2973.221411][T12192] ? __dev_queue_xmit+0xbf2/0x1500 [ 2973.226551][T12192] ? __skb_clone+0x2a9/0x2c0 [ 2973.231189][T12192] ? __rcu_read_unlock+0x51/0x250 [ 2973.236209][T12192] netlink_rcv_skb+0x13e/0x240 [ 2973.240969][T12192] ? rtnetlink_bind+0x60/0x60 [ 2973.245688][T12192] rtnetlink_rcv+0x18/0x20 [ 2973.250093][T12192] netlink_unicast+0x5df/0x6b0 [ 2973.254926][T12192] netlink_sendmsg+0x6f8/0x7c0 [ 2973.259676][T12192] ? netlink_getsockopt+0x720/0x720 [ 2973.265424][T12192] ____sys_sendmsg+0x352/0x4c0 [ 2973.270278][T12192] ? import_iovec+0xb8/0xd0 [ 2973.274755][T12192] __sys_sendmsg+0x1ed/0x270 [ 2973.279330][T12192] ? __fsnotify_parent+0x32f/0x430 [ 2973.284517][T12192] ? get_pid_task+0x90/0xc0 [ 2973.289053][T12192] ? vfs_write+0x54d/0x7c0 [ 2973.293458][T12192] ? __fget_light+0x219/0x260 [ 2973.298160][T12192] ? fput+0x2d/0x130 [ 2973.302080][T12192] ? ksys_write+0x157/0x180 [ 2973.306621][T12192] __x64_sys_sendmsg+0x42/0x50 [ 2973.311477][T12192] do_syscall_64+0x39/0x80 [ 2973.315961][T12192] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2973.323277][T12192] RIP: 0033:0x45e219 [ 2973.327931][T12192] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2973.349057][T12192] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2973.357452][T12192] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2973.365580][T12192] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:16:00 executing program 0 (fault-call:14 fault-nth:95): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2973.373899][T12192] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2973.381872][T12192] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005e [ 2973.389825][T12192] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2973.401700][T12192] kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 2973.453796][T12194] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2973.464872][T12194] FAULT_INJECTION: forcing a failure. [ 2973.464872][T12194] name failslab, interval 1, probability 0, space 0, times 0 [ 2973.478297][T12194] CPU: 0 PID: 12194 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2973.487547][T12194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.499008][T12194] Call Trace: [ 2973.502580][T12194] dump_stack+0x116/0x15d [ 2973.508087][T12194] should_fail+0x231/0x240 [ 2973.513125][T12194] ? radix_tree_node_alloc+0x154/0x1f0 [ 2973.519070][T12194] __should_failslab+0x81/0x90 [ 2973.526035][T12194] should_failslab+0x5/0x20 [ 2973.532239][T12194] kmem_cache_alloc+0x36/0x2e0 [ 2973.537369][T12194] radix_tree_node_alloc+0x154/0x1f0 [ 2973.544165][T12194] idr_get_free+0x22a/0x5c0 [ 2973.548819][T12194] idr_alloc_cyclic+0xe3/0x2c0 [ 2973.553844][T12194] ? __radix_tree_preload+0x19e/0x1c0 [ 2973.559723][T12194] __kernfs_new_node+0xbb/0x350 [ 2973.565824][T12194] ? radix_tree_iter_tag_clear+0xe6/0x150 [ 2973.572649][T12194] kernfs_new_node+0x5b/0xd0 [ 2973.577566][T12194] __kernfs_create_file+0x45/0x180 [ 2973.583602][T12194] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2973.590383][T12194] internal_create_group+0x2e4/0x850 [ 2973.597633][T12194] sysfs_create_groups+0x3d/0xf0 [ 2973.604026][T12194] kobject_add_internal+0x565/0x820 [ 2973.610347][T12194] kobject_init_and_add+0x14e/0x200 [ 2973.616800][T12194] ? dev_uevent_filter+0x24/0x70 [ 2973.621753][T12194] ? kobject_uevent_env+0x1f5/0xc10 [ 2973.627138][T12194] ? sysfs_create_groups+0x72/0xf0 [ 2973.632259][T12194] ? kernfs_get+0x2b/0x50 [ 2973.636623][T12194] net_rx_queue_update_kobjects+0xf5/0x2e0 [ 2973.643017][T12194] netdev_register_kobject+0x17e/0x230 [ 2973.648579][T12194] register_netdevice+0xbcf/0x1060 [ 2973.653693][T12194] ipvlan_link_new+0x2a2/0x5d0 [ 2973.658452][T12194] rtnl_newlink+0xda6/0x13b0 [ 2973.663053][T12194] ? preempt_schedule_irq+0x43/0x80 [ 2973.668749][T12194] ? irqentry_exit_cond_resched+0x30/0x40 [ 2973.674698][T12194] ? __perf_event_task_sched_in+0x565/0x590 [ 2973.680671][T12194] ? kvm_sched_clock_read+0x15/0x40 [ 2973.686042][T12194] ? sched_clock+0xf/0x20 [ 2973.690834][T12194] ? widen_string+0x3a/0x280 [ 2973.695598][T12194] ? aa_get_newest_label+0x74/0x250 [ 2973.701068][T12194] ? apparmor_capable+0xfe/0x160 [ 2973.706564][T12194] ? bpf_lsm_capable+0x5/0x10 [ 2973.713321][T12194] ? security_capable+0x91/0xa0 [ 2973.718691][T12194] ? __rcu_read_unlock+0x51/0x250 [ 2973.724047][T12194] ? ns_capable+0x79/0xa0 [ 2973.728579][T12194] ? rtnl_setlink+0x270/0x270 [ 2973.733765][T12194] rtnetlink_rcv_msg+0x723/0x7c0 [ 2973.740118][T12194] ? ___cache_free+0x3c/0x2f0 [ 2973.745445][T12194] ? __kfree_skb+0xfe/0x150 [ 2973.750494][T12194] ? __kfree_skb+0xfe/0x150 [ 2973.755736][T12194] ? consume_skb+0x4b/0x160 [ 2973.760255][T12194] ? nlmon_xmit+0x47/0x50 [ 2973.764614][T12194] ? rcu_preempt_deferred_qs_irqrestore+0x396/0x570 [ 2973.771572][T12194] ? __rcu_read_unlock+0xba/0x250 [ 2973.776591][T12194] netlink_rcv_skb+0x13e/0x240 [ 2973.781342][T12194] ? rtnetlink_bind+0x60/0x60 [ 2973.786125][T12194] rtnetlink_rcv+0x18/0x20 [ 2973.790531][T12194] netlink_unicast+0x5df/0x6b0 [ 2973.795305][T12194] netlink_sendmsg+0x6f8/0x7c0 [ 2973.800070][T12194] ? netlink_getsockopt+0x720/0x720 [ 2973.806033][T12194] ____sys_sendmsg+0x352/0x4c0 [ 2973.810808][T12194] ? import_iovec+0xb8/0xd0 [ 2973.815411][T12194] __sys_sendmsg+0x1ed/0x270 [ 2973.820165][T12194] ? __fsnotify_parent+0x32f/0x430 [ 2973.825269][T12194] ? get_pid_task+0x90/0xc0 [ 2973.829849][T12194] ? vfs_write+0x54d/0x7c0 [ 2973.834282][T12194] ? __fget_light+0x219/0x260 [ 2973.838987][T12194] ? fput+0x2d/0x130 [ 2973.842936][T12194] ? ksys_write+0x157/0x180 [ 2973.847783][T12194] __x64_sys_sendmsg+0x42/0x50 17:16:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2973.852810][T12194] do_syscall_64+0x39/0x80 [ 2973.857212][T12194] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2973.863296][T12194] RIP: 0033:0x45e219 [ 2973.867372][T12194] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2973.887047][T12194] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2973.895714][T12194] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 17:16:00 executing program 0 (fault-call:14 fault-nth:96): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2973.903743][T12194] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2973.911723][T12194] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2973.919686][T12194] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005f [ 2973.927748][T12194] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2973.938459][T12194] device ipvlan23 entered promiscuous mode [ 2973.946341][T12194] 8021q: adding VLAN 0 to HW filter on device ipvlan23 17:16:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2974.000898][T12201] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2974.011193][T12201] FAULT_INJECTION: forcing a failure. [ 2974.011193][T12201] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.027552][T12201] CPU: 0 PID: 12201 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2974.037593][T12201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.048394][T12201] Call Trace: [ 2974.052105][T12201] dump_stack+0x116/0x15d [ 2974.056477][T12201] should_fail+0x231/0x240 [ 2974.061776][T12201] __should_failslab+0x81/0x90 [ 2974.067496][T12201] ? kzalloc+0x1d/0x30 [ 2974.071730][T12201] should_failslab+0x5/0x20 [ 2974.077047][T12201] __kmalloc+0x59/0x360 [ 2974.082231][T12201] kzalloc+0x1d/0x30 [ 2974.086808][T12201] kobject_get_path+0x7c/0x110 [ 2974.092297][T12201] kobject_uevent_env+0x1ae/0xc10 [ 2974.097933][T12201] ? kobject_init_and_add+0x14e/0x200 [ 2974.104368][T12201] ? dev_uevent_filter+0x24/0x70 [ 2974.109935][T12201] ? sysfs_create_groups+0x72/0xf0 [ 2974.115321][T12201] kobject_uevent+0x18/0x20 [ 2974.119841][T12201] net_rx_queue_update_kobjects+0x14f/0x2e0 [ 2974.128540][T12201] netdev_register_kobject+0x17e/0x230 [ 2974.134343][T12201] register_netdevice+0xbcf/0x1060 [ 2974.139939][T12201] ipvlan_link_new+0x2a2/0x5d0 [ 2974.145334][T12201] rtnl_newlink+0xda6/0x13b0 [ 2974.150679][T12201] ? irqentry_exit_cond_resched+0x30/0x40 [ 2974.156975][T12201] ? irqentry_exit+0x2a/0x40 [ 2974.161665][T12201] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 2974.168848][T12201] ? widen_string+0x3a/0x280 [ 2974.173461][T12201] ? widen_string+0x3a/0x280 [ 2974.179660][T12201] ? aa_get_newest_label+0x74/0x250 [ 2974.184944][T12201] ? apparmor_capable+0xfe/0x160 [ 2974.190601][T12201] ? bpf_lsm_capable+0x5/0x10 [ 2974.196180][T12201] ? security_capable+0x91/0xa0 17:16:00 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2974.201807][T12201] ? __rcu_read_unlock+0x51/0x250 [ 2974.207298][T12201] ? ns_capable+0x79/0xa0 [ 2974.211719][T12201] ? rtnl_setlink+0x270/0x270 [ 2974.216558][T12201] rtnetlink_rcv_msg+0x723/0x7c0 [ 2974.222014][T12201] ? ___cache_free+0x3c/0x2f0 [ 2974.226777][T12201] ? ima_match_policy+0xa80/0xab0 [ 2974.232203][T12201] ? __kfree_skb+0xfe/0x150 [ 2974.237945][T12201] ? __kfree_skb+0xfe/0x150 [ 2974.242456][T12201] ? consume_skb+0x4b/0x160 [ 2974.247673][T12201] ? nlmon_xmit+0x47/0x50 [ 2974.252164][T12201] ? xmit_one+0x173/0x2e0 [ 2974.258625][T12201] ? local_bh_enable+0x1b/0x20 [ 2974.264601][T12201] ? __dev_queue_xmit+0xbf2/0x1500 [ 2974.269802][T12201] ? __skb_clone+0x2a9/0x2c0 [ 2974.274486][T12201] ? __rcu_read_unlock+0x51/0x250 [ 2974.280045][T12201] netlink_rcv_skb+0x13e/0x240 [ 2974.284947][T12201] ? rtnetlink_bind+0x60/0x60 [ 2974.289609][T12201] rtnetlink_rcv+0x18/0x20 [ 2974.294347][T12201] netlink_unicast+0x5df/0x6b0 [ 2974.299569][T12201] netlink_sendmsg+0x6f8/0x7c0 [ 2974.304500][T12201] ? netlink_getsockopt+0x720/0x720 [ 2974.309686][T12201] ____sys_sendmsg+0x352/0x4c0 [ 2974.314445][T12201] ? import_iovec+0xb8/0xd0 [ 2974.319236][T12201] __sys_sendmsg+0x1ed/0x270 [ 2974.324627][T12201] ? __fsnotify_parent+0x32f/0x430 [ 2974.330381][T12201] ? get_pid_task+0x90/0xc0 [ 2974.334885][T12201] ? vfs_write+0x54d/0x7c0 [ 2974.339376][T12201] ? __fget_light+0x219/0x260 [ 2974.344117][T12201] ? fput+0x2d/0x130 [ 2974.348007][T12201] ? ksys_write+0x157/0x180 [ 2974.352527][T12201] __x64_sys_sendmsg+0x42/0x50 [ 2974.357408][T12201] do_syscall_64+0x39/0x80 [ 2974.362002][T12201] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2974.368013][T12201] RIP: 0033:0x45e219 [ 2974.371903][T12201] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2974.391697][T12201] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2974.400101][T12201] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2974.408424][T12201] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2974.416468][T12201] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2974.424458][T12201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000060 [ 2974.432416][T12201] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2974.445077][T12201] device ipvlan24 entered promiscuous mode 17:16:01 executing program 0 (fault-call:14 fault-nth:97): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2974.451125][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2974.451709][T12201] 8021q: adding VLAN 0 to HW filter on device ipvlan24 [ 2974.505579][T12210] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2974.518484][T12210] FAULT_INJECTION: forcing a failure. [ 2974.518484][T12210] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.536132][T12210] CPU: 1 PID: 12210 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2974.546324][T12210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.557237][T12210] Call Trace: [ 2974.560511][T12210] dump_stack+0x116/0x15d [ 2974.565082][T12210] should_fail+0x231/0x240 [ 2974.569537][T12210] __should_failslab+0x81/0x90 [ 2974.575273][T12210] should_failslab+0x5/0x20 [ 2974.580984][T12210] kmem_cache_alloc_node+0x46/0x2e0 [ 2974.586183][T12210] ? __alloc_skb+0x98/0x2f0 [ 2974.590785][T12210] __alloc_skb+0x98/0x2f0 [ 2974.595100][T12210] alloc_uevent_skb+0x5b/0x120 [ 2974.599866][T12210] kobject_uevent_env+0x6f4/0xc10 [ 2974.605017][T12210] ? sysfs_create_groups+0x72/0xf0 [ 2974.610105][T12210] kobject_uevent+0x18/0x20 [ 2974.614589][T12210] net_rx_queue_update_kobjects+0x14f/0x2e0 [ 2974.620512][T12210] netdev_register_kobject+0x17e/0x230 [ 2974.625996][T12210] register_netdevice+0xbcf/0x1060 [ 2974.631205][T12210] ipvlan_link_new+0x2a2/0x5d0 [ 2974.636019][T12210] rtnl_newlink+0xda6/0x13b0 [ 2974.640870][T12210] ? kvm_sched_clock_read+0x15/0x40 [ 2974.646115][T12210] ? sched_clock+0xf/0x20 [ 2974.650514][T12210] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2974.655957][T12210] ? __switch_to+0x14e/0x4c0 [ 2974.661754][T12210] ? _raw_spin_unlock_irq+0x22/0x40 [ 2974.666946][T12210] ? widen_string+0x3a/0x280 [ 2974.671563][T12210] ? aa_get_newest_label+0x74/0x250 [ 2974.676796][T12210] ? apparmor_capable+0xfe/0x160 [ 2974.681719][T12210] ? bpf_lsm_capable+0x5/0x10 [ 2974.686540][T12210] ? security_capable+0x91/0xa0 [ 2974.691675][T12210] ? __rcu_read_unlock+0x51/0x250 [ 2974.696827][T12210] ? ns_capable+0x79/0xa0 [ 2974.701265][T12210] ? rtnl_setlink+0x270/0x270 [ 2974.705987][T12210] rtnetlink_rcv_msg+0x723/0x7c0 [ 2974.711191][T12210] ? ___cache_free+0x3c/0x2f0 [ 2974.715903][T12210] ? ima_match_policy+0xa80/0xab0 [ 2974.721636][T12210] ? __kfree_skb+0xfe/0x150 [ 2974.726149][T12210] ? __kfree_skb+0xfe/0x150 [ 2974.730671][T12210] ? consume_skb+0x4b/0x160 [ 2974.735191][T12210] ? nlmon_xmit+0x47/0x50 [ 2974.739616][T12210] ? xmit_one+0x173/0x2e0 [ 2974.744985][T12210] ? local_bh_enable+0x1b/0x20 [ 2974.750192][T12210] ? __dev_queue_xmit+0xbf2/0x1500 [ 2974.755288][T12210] ? __skb_clone+0x2a9/0x2c0 [ 2974.759947][T12210] ? __rcu_read_unlock+0x51/0x250 [ 2974.764996][T12210] netlink_rcv_skb+0x13e/0x240 [ 2974.769761][T12210] ? rtnetlink_bind+0x60/0x60 [ 2974.774958][T12210] rtnetlink_rcv+0x18/0x20 [ 2974.779945][T12210] netlink_unicast+0x5df/0x6b0 [ 2974.785830][T12210] netlink_sendmsg+0x6f8/0x7c0 [ 2974.791529][T12210] ? netlink_getsockopt+0x720/0x720 [ 2974.797841][T12210] ____sys_sendmsg+0x352/0x4c0 17:16:01 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2974.802674][T12210] ? import_iovec+0xb8/0xd0 [ 2974.808161][T12210] __sys_sendmsg+0x1ed/0x270 [ 2974.814286][T12210] ? __fsnotify_parent+0x32f/0x430 [ 2974.819663][T12210] ? get_pid_task+0x90/0xc0 [ 2974.825422][T12210] ? vfs_write+0x54d/0x7c0 [ 2974.832593][T12210] ? __fget_light+0x219/0x260 [ 2974.837865][T12210] ? fput+0x2d/0x130 [ 2974.841994][T12210] ? ksys_write+0x157/0x180 [ 2974.846677][T12210] __x64_sys_sendmsg+0x42/0x50 [ 2974.851862][T12210] do_syscall_64+0x39/0x80 [ 2974.856456][T12210] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2974.863850][T12210] RIP: 0033:0x45e219 [ 2974.867927][T12210] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2974.889943][T12210] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:16:01 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2974.900102][T12210] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2974.909397][T12210] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2974.917646][T12210] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2974.927795][T12210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000061 [ 2974.936052][T12210] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2974.944269][ C1] raw-gadget gadget: ignoring, device is not running [ 2974.978711][ C1] raw-gadget gadget: ignoring, device is not running [ 2975.008713][ C1] raw-gadget gadget: ignoring, device is not running [ 2975.017699][T10032] usb 6-1: unable to read config index 0 descriptor/all 17:16:01 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) rt_sigqueueinfo(0xffffffffffffffff, 0x25, &(0x7f0000000000)={0x8, 0x42, 0x261b3b8d}) 17:16:01 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2975.033408][T10032] usb 6-1: can't read configurations, error -32 [ 2975.065904][T12210] device ipvlan25 entered promiscuous mode 17:16:01 executing program 0 (fault-call:14 fault-nth:98): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2975.092502][T12210] 8021q: adding VLAN 0 to HW filter on device ipvlan25 [ 2975.159311][T12229] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2975.176086][T12229] FAULT_INJECTION: forcing a failure. [ 2975.176086][T12229] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.192935][T12229] CPU: 0 PID: 12229 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2975.203361][T12229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.216006][T12229] Call Trace: [ 2975.219497][T12229] dump_stack+0x116/0x15d [ 2975.223948][T12229] should_fail+0x231/0x240 [ 2975.228601][T12229] __should_failslab+0x81/0x90 [ 2975.234889][T12229] ? kzalloc+0x1d/0x30 [ 2975.241441][T12229] should_failslab+0x5/0x20 [ 2975.246212][T12229] __kmalloc+0x59/0x360 [ 2975.250715][T12229] kzalloc+0x1d/0x30 [ 2975.254726][T12229] kobject_get_path+0x7c/0x110 [ 2975.260124][T12229] kobject_uevent_env+0x1ae/0xc10 [ 2975.265857][T12229] ? kobject_init_and_add+0x14e/0x200 [ 2975.271997][T12229] ? dev_uevent_filter+0x24/0x70 [ 2975.277347][T12229] ? sysfs_create_groups+0x72/0xf0 [ 2975.282465][T12229] kobject_uevent+0x18/0x20 [ 2975.287814][T12229] net_rx_queue_update_kobjects+0x14f/0x2e0 [ 2975.293926][T12229] netdev_register_kobject+0x17e/0x230 [ 2975.299474][T12229] register_netdevice+0xbcf/0x1060 [ 2975.304575][T12229] ipvlan_link_new+0x2a2/0x5d0 [ 2975.309832][T12229] rtnl_newlink+0xda6/0x13b0 [ 2975.315682][T12229] ? __perf_event_task_sched_in+0x565/0x590 [ 2975.322121][T12229] ? kvm_sched_clock_read+0x15/0x40 [ 2975.327762][T12229] ? sched_clock+0xf/0x20 [ 2975.332632][T12229] ? copy_fpregs_to_fpstate+0xd8/0x110 [ 2975.338539][T12229] ? widen_string+0x3a/0x280 [ 2975.343413][T12229] ? widen_string+0x3a/0x280 [ 2975.348285][T12229] ? aa_get_newest_label+0x74/0x250 [ 2975.353647][T12229] ? apparmor_capable+0xfe/0x160 [ 2975.358734][T12229] ? bpf_lsm_capable+0x5/0x10 [ 2975.364125][T12229] ? security_capable+0x91/0xa0 [ 2975.369188][T12229] ? __rcu_read_unlock+0x51/0x250 [ 2975.374291][T12229] ? ns_capable+0x79/0xa0 [ 2975.378637][T12229] ? rtnl_setlink+0x270/0x270 [ 2975.383325][T12229] rtnetlink_rcv_msg+0x723/0x7c0 [ 2975.388713][T12229] ? ___cache_free+0x3c/0x2f0 [ 2975.393727][T12229] ? ima_match_policy+0xa80/0xab0 [ 2975.398918][T12229] ? __kfree_skb+0xfe/0x150 [ 2975.404652][T12229] ? __kfree_skb+0xfe/0x150 [ 2975.409525][T12229] ? consume_skb+0x4b/0x160 [ 2975.414208][T12229] ? nlmon_xmit+0x47/0x50 [ 2975.418625][T12229] ? xmit_one+0x173/0x2e0 [ 2975.422962][T12229] ? local_bh_enable+0x1b/0x20 [ 2975.428012][T12229] ? __dev_queue_xmit+0xbf2/0x1500 [ 2975.433831][T12229] ? __skb_clone+0x2a9/0x2c0 [ 2975.438819][T12229] ? __rcu_read_unlock+0x51/0x250 [ 2975.443948][T12229] netlink_rcv_skb+0x13e/0x240 [ 2975.448812][T12229] ? rtnetlink_bind+0x60/0x60 [ 2975.454256][T12229] rtnetlink_rcv+0x18/0x20 [ 2975.458746][T12229] netlink_unicast+0x5df/0x6b0 [ 2975.463584][T12229] netlink_sendmsg+0x6f8/0x7c0 [ 2975.468508][T12229] ? netlink_getsockopt+0x720/0x720 [ 2975.473977][T12229] ____sys_sendmsg+0x352/0x4c0 [ 2975.478868][T12229] ? import_iovec+0xb8/0xd0 [ 2975.483387][T12229] __sys_sendmsg+0x1ed/0x270 [ 2975.488171][T12229] ? __fsnotify_parent+0x32f/0x430 [ 2975.493304][T12229] ? get_pid_task+0x90/0xc0 [ 2975.498234][T12229] ? vfs_write+0x54d/0x7c0 [ 2975.502657][T12229] ? __fget_light+0x219/0x260 [ 2975.507357][T12229] ? fput+0x2d/0x130 [ 2975.511234][T12229] ? ksys_write+0x157/0x180 [ 2975.515735][T12229] __x64_sys_sendmsg+0x42/0x50 [ 2975.520725][T12229] do_syscall_64+0x39/0x80 [ 2975.525563][T12229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2975.531534][T12229] RIP: 0033:0x45e219 [ 2975.535940][T12229] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2975.556216][T12229] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2975.566344][T12229] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2975.574742][T12229] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 [ 2975.583365][T12229] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2975.591847][T12229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000062 [ 2975.600251][T12229] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c 17:16:02 executing program 0 (fault-call:14 fault-nth:99): syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2975.619925][T12229] device ipvlan26 entered promiscuous mode [ 2975.627061][T12229] 8021q: adding VLAN 0 to HW filter on device ipvlan26 [ 2975.674270][T12232] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2975.684707][T12232] FAULT_INJECTION: forcing a failure. [ 2975.684707][T12232] name failslab, interval 1, probability 0, space 0, times 0 [ 2975.699736][T12232] CPU: 0 PID: 12232 Comm: syz-executor.0 Not tainted 5.11.0-rc1-syzkaller #0 [ 2975.700979][T10032] usb 6-1: new high-speed USB device number 112 using dummy_hcd [ 2975.708532][T12232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.728115][T12232] Call Trace: [ 2975.733050][T12232] dump_stack+0x116/0x15d [ 2975.739682][T12232] should_fail+0x231/0x240 [ 2975.744911][T12232] __should_failslab+0x81/0x90 [ 2975.750048][T12232] should_failslab+0x5/0x20 [ 2975.755022][T12232] kmem_cache_alloc_node+0x46/0x2e0 [ 2975.760976][T12232] ? __alloc_skb+0x98/0x2f0 [ 2975.766372][T12232] __alloc_skb+0x98/0x2f0 [ 2975.771406][T12232] alloc_uevent_skb+0x5b/0x120 [ 2975.776296][T12232] kobject_uevent_env+0x6f4/0xc10 [ 2975.782594][T12232] ? sysfs_create_groups+0x72/0xf0 [ 2975.788309][T12232] kobject_uevent+0x18/0x20 [ 2975.792902][T12232] net_rx_queue_update_kobjects+0x14f/0x2e0 [ 2975.799665][T12232] netdev_register_kobject+0x17e/0x230 [ 2975.806296][T12232] register_netdevice+0xbcf/0x1060 [ 2975.812514][T12232] ipvlan_link_new+0x2a2/0x5d0 [ 2975.819530][T12232] rtnl_newlink+0xda6/0x13b0 [ 2975.825993][T12232] ? preempt_schedule_irq+0x43/0x80 [ 2975.831871][T12232] ? irqentry_exit_cond_resched+0x30/0x40 [ 2975.839429][T12232] ? irqentry_exit+0x2a/0x40 [ 2975.844506][T12232] ? sysvec_apic_timer_interrupt+0x80/0x90 [ 2975.851375][T12232] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2975.858618][T12232] ? __perf_event_task_sched_in+0x565/0x590 [ 2975.865486][T12232] ? kvm_sched_clock_read+0x15/0x40 [ 2975.870993][T12232] ? sched_clock+0xf/0x20 [ 2975.877776][T12232] ? widen_string+0x3a/0x280 [ 2975.883872][T12232] ? aa_get_newest_label+0x74/0x250 [ 2975.889330][T12232] ? apparmor_capable+0xfe/0x160 [ 2975.896401][T12232] ? bpf_lsm_capable+0x5/0x10 [ 2975.901673][T12232] ? security_capable+0x91/0xa0 [ 2975.907005][T12232] ? __rcu_read_unlock+0x51/0x250 [ 2975.913976][T12232] ? ns_capable+0x79/0xa0 [ 2975.918806][T12232] ? rtnl_setlink+0x270/0x270 [ 2975.924427][T12232] rtnetlink_rcv_msg+0x723/0x7c0 [ 2975.929686][T12232] ? ___cache_free+0x3c/0x2f0 [ 2975.934833][T12232] ? ima_match_policy+0xa80/0xab0 [ 2975.940261][T12232] ? __kfree_skb+0xfe/0x150 [ 2975.944850][T12232] ? __kfree_skb+0xfe/0x150 [ 2975.949391][T12232] ? consume_skb+0x4b/0x160 [ 2975.954190][T12232] ? nlmon_xmit+0x47/0x50 [ 2975.958618][T12232] ? xmit_one+0x173/0x2e0 [ 2975.963046][T12232] ? local_bh_enable+0x1b/0x20 [ 2975.967882][T12232] ? __dev_queue_xmit+0xbf2/0x1500 [ 2975.973078][T12232] ? __skb_clone+0x2a9/0x2c0 [ 2975.978275][T12232] ? __rcu_read_unlock+0x51/0x250 [ 2975.983491][T12232] netlink_rcv_skb+0x13e/0x240 [ 2975.988267][T12232] ? rtnetlink_bind+0x60/0x60 [ 2975.992927][T12232] rtnetlink_rcv+0x18/0x20 [ 2975.997433][T12232] netlink_unicast+0x5df/0x6b0 [ 2976.002246][T12232] netlink_sendmsg+0x6f8/0x7c0 [ 2976.006993][T12232] ? netlink_getsockopt+0x720/0x720 [ 2976.012332][T12232] ____sys_sendmsg+0x352/0x4c0 [ 2976.017136][T12232] ? import_iovec+0xb8/0xd0 [ 2976.023380][T12232] __sys_sendmsg+0x1ed/0x270 [ 2976.029907][T12232] ? __fsnotify_parent+0x32f/0x430 [ 2976.035593][T12232] ? get_pid_task+0x90/0xc0 [ 2976.040547][T12232] ? vfs_write+0x54d/0x7c0 [ 2976.045052][T12232] ? __fget_light+0x219/0x260 [ 2976.049829][T12232] ? fput+0x2d/0x130 [ 2976.053706][T12232] ? ksys_write+0x157/0x180 [ 2976.058335][T12232] __x64_sys_sendmsg+0x42/0x50 [ 2976.063557][T12232] do_syscall_64+0x39/0x80 [ 2976.067982][T12232] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2976.073893][T12232] RIP: 0033:0x45e219 [ 2976.077821][T12232] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2976.097422][T12232] RSP: 002b:00007f3c8f377c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2976.105865][T12232] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 000000000045e219 [ 2976.113921][T12232] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000012 17:16:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2976.121873][T12232] RBP: 00007f3c8f377ca0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.129837][T12232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000063 [ 2976.137919][T12232] R13: 00007fff9b284b9f R14: 00007f3c8f3789c0 R15: 000000000119bf8c [ 2976.149897][T12232] device ipvlan27 entered promiscuous mode [ 2976.157480][T12232] 8021q: adding VLAN 0 to HW filter on device ipvlan27 17:16:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2976.217204][T12236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2976.230729][T12236] device ipvlan28 entered promiscuous mode [ 2976.239914][T12236] 8021q: adding VLAN 0 to HW filter on device ipvlan28 [ 2976.285814][T12240] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2976.297091][T12240] device ipvlan29 entered promiscuous mode [ 2976.308498][T12240] 8021q: adding VLAN 0 to HW filter on device ipvlan29 [ 2976.322606][T12243] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:03 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2976.335788][T12243] device ipvlan30 entered promiscuous mode [ 2976.348703][T12243] 8021q: adding VLAN 0 to HW filter on device ipvlan30 [ 2976.378636][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2976.385673][T12247] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2976.398379][T12247] device ipvlan31 entered promiscuous mode [ 2976.405368][T12247] 8021q: adding VLAN 0 to HW filter on device ipvlan31 [ 2976.420976][T12251] device ipvlan32 entered promiscuous mode [ 2976.427863][T12251] 8021q: adding VLAN 0 to HW filter on device ipvlan32 [ 2976.518656][T10032] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2976.526687][T10032] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2976.539237][T10032] usb 6-1: config 0 has no interface number 0 [ 2976.545318][T10032] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2976.555744][T10032] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2976.566912][T10032] usb 6-1: config 0 descriptor?? [ 2976.610978][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2976.818602][T10032] snd_usb_pod 6-1:0.1: set_interface failed [ 2976.825100][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2976.834508][T10032] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2976.842789][T10032] usb 6-1: USB disconnect, device number 112 17:16:03 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2977.037487][T12266] device ipvlan33 entered promiscuous mode [ 2977.044238][T12266] 8021q: adding VLAN 0 to HW filter on device ipvlan33 [ 2977.063516][T12269] device ipvlan34 entered promiscuous mode [ 2977.070583][T12269] 8021q: adding VLAN 0 to HW filter on device ipvlan34 17:16:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:04 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2977.578537][T10001] usb 6-1: new high-speed USB device number 113 using dummy_hcd [ 2977.818603][T10001] usb 6-1: Using ep0 maxpacket: 32 17:16:04 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:04 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2977.938544][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2977.948348][T10001] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2977.964415][T10001] usb 6-1: config 0 has no interface number 0 [ 2977.973898][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2977.986453][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2977.998232][T12281] __nla_validate_parse: 3 callbacks suppressed [ 2977.998244][T12281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.015046][T10001] usb 6-1: config 0 descriptor?? [ 2978.022774][T12281] device ipvlan35 entered promiscuous mode [ 2978.029864][T12281] 8021q: adding VLAN 0 to HW filter on device ipvlan35 [ 2978.041812][T12289] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.053634][T12289] device ipvlan36 entered promiscuous mode [ 2978.062165][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2978.070007][T12289] 8021q: adding VLAN 0 to HW filter on device ipvlan36 17:16:04 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000305) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)={0x2, 'macvlan0\x00', {0xd9c}, 0x20}) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000000)=0x4) 17:16:04 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:04 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:04 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2978.128767][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 2978.136132][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2978.144820][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2978.160505][T10001] usb 6-1: USB disconnect, device number 113 [ 2978.188058][T12307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.200909][T12307] device ipvlan37 entered promiscuous mode [ 2978.208534][T12307] 8021q: adding VLAN 0 to HW filter on device ipvlan37 [ 2978.222999][T12315] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:04 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2978.242205][T12315] device ipvlan38 entered promiscuous mode [ 2978.251610][T12315] 8021q: adding VLAN 0 to HW filter on device ipvlan38 [ 2978.285557][T12320] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.297316][T12320] device ipvlan39 entered promiscuous mode [ 2978.308979][T12320] 8021q: adding VLAN 0 to HW filter on device ipvlan39 17:16:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2978.326745][T12323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.342099][T12323] device ipvlan40 entered promiscuous mode [ 2978.352085][T12323] 8021q: adding VLAN 0 to HW filter on device ipvlan40 [ 2978.389901][T12327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.402214][T12327] device ipvlan41 entered promiscuous mode [ 2978.410465][T12327] 8021q: adding VLAN 0 to HW filter on device ipvlan41 [ 2978.423318][T12330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.434454][T12330] device ipvlan42 entered promiscuous mode 17:16:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2978.445157][T12330] 8021q: adding VLAN 0 to HW filter on device ipvlan42 [ 2978.484366][T12334] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.496027][T12334] device ipvlan43 entered promiscuous mode [ 2978.505288][T12334] 8021q: adding VLAN 0 to HW filter on device ipvlan43 [ 2978.517484][T12337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2978.528433][T10001] usb 6-1: new high-speed USB device number 114 using dummy_hcd [ 2978.538207][T12337] device ipvlan44 entered promiscuous mode 17:16:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2978.545202][T12337] 8021q: adding VLAN 0 to HW filter on device ipvlan44 [ 2978.585834][T12341] device ipvlan45 entered promiscuous mode [ 2978.592735][T12341] 8021q: adding VLAN 0 to HW filter on device ipvlan45 [ 2978.614401][T12344] device ipvlan46 entered promiscuous mode [ 2978.621234][T12344] 8021q: adding VLAN 0 to HW filter on device ipvlan46 [ 2978.718537][T10001] usb 6-1: device descriptor read/64, error 18 [ 2978.988430][T10001] usb 6-1: new high-speed USB device number 115 using dummy_hcd [ 2979.179669][T10001] usb 6-1: device descriptor read/64, error 18 [ 2979.308471][T10001] usb usb6-port1: attempt power cycle [ 2980.048483][T10001] usb 6-1: new high-speed USB device number 116 using dummy_hcd [ 2980.258758][T10001] usb 6-1: device descriptor read/8, error -61 17:16:07 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:07 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2980.504926][T12348] device ipvlan47 entered promiscuous mode [ 2980.511869][T12348] 8021q: adding VLAN 0 to HW filter on device ipvlan47 [ 2980.530546][T12354] device ipvlan48 entered promiscuous mode [ 2980.537155][T12354] 8021q: adding VLAN 0 to HW filter on device ipvlan48 [ 2980.558295][T10001] usb 6-1: new high-speed USB device number 117 using dummy_hcd [ 2980.768758][T10001] usb 6-1: device descriptor read/8, error -61 [ 2980.888295][T10001] usb usb6-port1: unable to enumerate USB device 17:16:07 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:07 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2981.014521][T12358] device ipvlan49 entered promiscuous mode [ 2981.022343][T12358] 8021q: adding VLAN 0 to HW filter on device ipvlan49 [ 2981.043477][T12365] device ipvlan50 entered promiscuous mode [ 2981.052143][T12365] 8021q: adding VLAN 0 to HW filter on device ipvlan50 17:16:07 executing program 5: sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x70, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x70}, 0x1, 0x0, 0x0, 0x40800}, 0x1) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:16:07 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:07 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:07 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:07 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2981.202336][T12371] device ipvlan51 entered promiscuous mode [ 2981.210714][T12371] 8021q: adding VLAN 0 to HW filter on device ipvlan51 [ 2981.231787][T12384] device ipvlan52 entered promiscuous mode [ 2981.241199][T12384] 8021q: adding VLAN 0 to HW filter on device ipvlan52 17:16:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2981.277561][T12388] device ipvlan53 entered promiscuous mode [ 2981.285176][T12388] 8021q: adding VLAN 0 to HW filter on device ipvlan53 [ 2981.301996][T12391] device ipvlan54 entered promiscuous mode [ 2981.309183][T12391] 8021q: adding VLAN 0 to HW filter on device ipvlan54 17:16:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2981.347657][T12395] device ipvlan55 entered promiscuous mode [ 2981.354822][T12395] 8021q: adding VLAN 0 to HW filter on device ipvlan55 [ 2981.375202][T12398] device ipvlan56 entered promiscuous mode [ 2981.382861][T12398] 8021q: adding VLAN 0 to HW filter on device ipvlan56 17:16:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2981.425308][T12402] device ipvlan57 entered promiscuous mode [ 2981.432573][T12402] 8021q: adding VLAN 0 to HW filter on device ipvlan57 [ 2981.452865][T12405] device ipvlan58 entered promiscuous mode [ 2981.459569][T12405] 8021q: adding VLAN 0 to HW filter on device ipvlan58 [ 2981.498966][T12409] device ipvlan59 entered promiscuous mode [ 2981.506380][T12409] 8021q: adding VLAN 0 to HW filter on device ipvlan59 [ 2981.526742][T12414] device ipvlan60 entered promiscuous mode [ 2981.536137][T12414] 8021q: adding VLAN 0 to HW filter on device ipvlan60 [ 2981.678203][ T8806] usb 6-1: new high-speed USB device number 118 using dummy_hcd [ 2981.948208][ T8806] usb 6-1: Using ep0 maxpacket: 32 [ 2982.078637][ T8806] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2982.086659][ T8806] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2982.101916][ T8806] usb 6-1: config 0 has no interface number 0 [ 2982.111220][ T8806] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2982.123094][ T8806] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2982.135416][ T8806] usb 6-1: config 0 descriptor?? [ 2982.190771][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2982.409840][ T8806] snd_usb_pod 6-1:0.1: set_interface failed [ 2982.416490][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2982.436792][ T8806] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2982.446753][ T8806] usb 6-1: USB disconnect, device number 118 17:16:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:10 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2983.527289][T12429] __nla_validate_parse: 16 callbacks suppressed [ 2983.527302][T12429] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2983.546216][T12429] device ipvlan61 entered promiscuous mode [ 2983.553209][T12429] 8021q: adding VLAN 0 to HW filter on device ipvlan61 [ 2983.566874][T12435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2983.581823][T12435] device ipvlan62 entered promiscuous mode [ 2983.593892][T12435] 8021q: adding VLAN 0 to HW filter on device ipvlan62 17:16:10 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:10 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r1 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) syz_usb_connect(0x4, 0x2d, &(0x7f00000000c0)=ANY=[@ANYRES16=r1, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="641c6484657191b03d16debc6619092a8fadd6e864dc1da29fab820726dd7d870df146472928476fdca403e911c921ded09482d38085bab2545ac3d9c96ef74f2c114112bb1f0076ca5b8aa090362e82335b9d4a6de3394b2c5c6e650e7ca300fd73d333e27063bb146dcd517193239ad37ea05961a635d163999e9b71763af9"], 0x0) 17:16:10 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.033124][T12440] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2984.047221][T12440] device ipvlan63 entered promiscuous mode [ 2984.060054][T12440] 8021q: adding VLAN 0 to HW filter on device ipvlan63 17:16:10 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.075306][T12447] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2984.084930][T12447] vcan0: Master is either lo or non-ether device [ 2984.124146][T12450] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2984.135585][T12450] device ipvlan64 entered promiscuous mode [ 2984.145890][T12450] 8021q: adding VLAN 0 to HW filter on device ipvlan64 [ 2984.158952][T12453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:10 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:10 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:10 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.172760][T12453] device ipvlan65 entered promiscuous mode [ 2984.179706][T12453] 8021q: adding VLAN 0 to HW filter on device ipvlan65 [ 2984.234904][T12461] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2984.247646][T12461] device ipvlan66 entered promiscuous mode [ 2984.259281][T12461] 8021q: adding VLAN 0 to HW filter on device ipvlan66 [ 2984.274136][T12466] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:10 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2e, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.286270][T12466] device ipvlan67 entered promiscuous mode [ 2984.296028][T12466] 8021q: adding VLAN 0 to HW filter on device ipvlan67 [ 2984.332539][T12470] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2984.345111][T12470] device ipvlan68 entered promiscuous mode [ 2984.353778][T12470] 8021q: adding VLAN 0 to HW filter on device ipvlan68 [ 2984.366102][T12473] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.379560][T12473] device ipvlan69 entered promiscuous mode [ 2984.386579][T12473] 8021q: adding VLAN 0 to HW filter on device ipvlan69 17:16:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2984.427375][T12477] device ipvlan70 entered promiscuous mode [ 2984.434576][T12477] 8021q: adding VLAN 0 to HW filter on device ipvlan70 [ 2984.455481][T12480] device ipvlan71 entered promiscuous mode [ 2984.462630][T12480] 8021q: adding VLAN 0 to HW filter on device ipvlan71 [ 2984.504306][T12484] device ipvlan72 entered promiscuous mode [ 2984.511474][T12484] 8021q: adding VLAN 0 to HW filter on device ipvlan72 [ 2984.531347][T12487] device ipvlan73 entered promiscuous mode [ 2984.540909][T12487] 8021q: adding VLAN 0 to HW filter on device ipvlan73 17:16:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:13 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2986.551670][T12492] device ipvlan74 entered promiscuous mode [ 2986.561282][T12492] 8021q: adding VLAN 0 to HW filter on device ipvlan74 [ 2986.576677][T12499] device ipvlan75 entered promiscuous mode [ 2986.584389][T12499] 8021q: adding VLAN 0 to HW filter on device ipvlan75 17:16:13 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:13 executing program 5: r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000305) write$P9_RFSYNC(r1, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x4}, {0x2, 0x6, r3}], {0x4, 0x1}, [{0x8, 0x0, r4}, {0x8, 0x3}, {0x8, 0x1}, {0x8, 0x1}, {0x8, 0x2}], {0x10, 0x8}, {0x20, 0x5}}, 0x5c, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [{0x2, 0x4}, {0x2, 0x6, r5}], {0x4, 0x1}, [{0x8, 0x0, r6}, {0x8, 0x3}, {0x8, 0x1}, {0x8, 0x1}, {0x8, 0x2}], {0x10, 0x8}, {0x20, 0x5}}, 0x5c, 0x1) fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000021c0)={{}, {0x1, 0xa}, [{0x2, 0x4, 0xffffffffffffffff}, {0x2, 0x4, 0xee00}, {0x2, 0x2, 0xee00}, {0x2, 0x2}], {0x4, 0x2}, [{0x8, 0x1, r4}, {0x8, 0x1, r6}, {0x8, 0x2, r7}, {0x8, 0x2, r8}, {0x8, 0x7, 0xee01}, {0x8, 0x2}], {0x10, 0x4}, {0x20, 0x1}}, 0x74, 0x3) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:16:13 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:13 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2987.063252][T12504] device ipvlan76 entered promiscuous mode [ 2987.070654][T12504] 8021q: adding VLAN 0 to HW filter on device ipvlan76 [ 2987.094958][T12513] device ipvlan77 entered promiscuous mode [ 2987.102617][T12513] 8021q: adding VLAN 0 to HW filter on device ipvlan77 [ 2987.144378][T12517] device ipvlan78 entered promiscuous mode [ 2987.151539][T12517] 8021q: adding VLAN 0 to HW filter on device ipvlan78 [ 2987.169603][T12520] device ipvlan79 entered promiscuous mode [ 2987.176685][T12520] 8021q: adding VLAN 0 to HW filter on device ipvlan79 17:16:13 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:13 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:13 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:13 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2987.266973][T12528] device ipvlan80 entered promiscuous mode [ 2987.273991][T12528] 8021q: adding VLAN 0 to HW filter on device ipvlan80 [ 2987.292194][T12533] device ipvlan81 entered promiscuous mode [ 2987.299255][T12533] 8021q: adding VLAN 0 to HW filter on device ipvlan81 17:16:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2987.341941][T12537] device ipvlan82 entered promiscuous mode [ 2987.349802][T12537] 8021q: adding VLAN 0 to HW filter on device ipvlan82 [ 2987.357738][ T8806] usb 6-1: new high-speed USB device number 119 using dummy_hcd [ 2987.374261][T12540] device ipvlan83 entered promiscuous mode [ 2987.381260][T12540] 8021q: adding VLAN 0 to HW filter on device ipvlan83 17:16:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2987.423172][T12544] device ipvlan84 entered promiscuous mode [ 2987.430696][T12544] 8021q: adding VLAN 0 to HW filter on device ipvlan84 [ 2987.450177][T12547] device ipvlan85 entered promiscuous mode [ 2987.457328][T12547] 8021q: adding VLAN 0 to HW filter on device ipvlan85 [ 2987.495190][T12551] device ipvlan86 entered promiscuous mode [ 2987.503347][T12551] 8021q: adding VLAN 0 to HW filter on device ipvlan86 [ 2987.523548][T12554] device ipvlan87 entered promiscuous mode [ 2987.531778][T12554] 8021q: adding VLAN 0 to HW filter on device ipvlan87 [ 2987.607828][ T8806] usb 6-1: Using ep0 maxpacket: 32 [ 2987.728007][ T8806] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2987.736125][ T8806] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2987.747810][ T8806] usb 6-1: config 0 has no interface number 0 [ 2987.755154][ T8806] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2987.764452][ T8806] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2987.780580][ T8806] usb 6-1: config 0 descriptor?? [ 2987.832011][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2988.047783][ T8806] snd_usb_pod 6-1:0.1: set_interface failed [ 2988.053995][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2988.063515][ T8806] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2988.071717][ T8806] usb 6-1: USB disconnect, device number 119 [ 2988.807642][T10001] usb 6-1: new high-speed USB device number 120 using dummy_hcd [ 2989.057626][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 2989.198047][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2989.206328][T10001] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2989.218237][T10001] usb 6-1: config 0 has no interface number 0 [ 2989.225043][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2989.235393][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2989.245850][T10001] usb 6-1: config 0 descriptor?? [ 2989.299856][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found 17:16:16 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:16 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2989.508148][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 2989.523118][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2989.537957][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2989.545815][T10001] usb 6-1: USB disconnect, device number 120 [ 2989.579698][T12584] __nla_validate_parse: 18 callbacks suppressed [ 2989.579708][T12584] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2989.600132][T12584] device ipvlan88 entered promiscuous mode [ 2989.609478][T12584] 8021q: adding VLAN 0 to HW filter on device ipvlan88 [ 2989.623204][T12589] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2989.635171][T12589] device ipvlan89 entered promiscuous mode [ 2989.642054][T12589] 8021q: adding VLAN 0 to HW filter on device ipvlan89 17:16:16 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:16 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) syz_mount_image$zonefs(&(0x7f0000000000)='zonefs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="f2f6bb84093884f8b413d8fe843a82573152d56a0ff5395d0d7fd9212ae9db741127142b933ba44bfe6c679e9afa1aafb1cf0a9bbdcdd94bf3ca24f13d1c88d82874ac88b19cec8a8dfd4b7a2e65df2786769f3e6041b57afcfc652779ff881c4e4c452cbb5766e60a33533304dfd6a3d55aa30a367824684e25dcb8343024e76a96f8770e76d43c923d49dcf1148a29c7c781f27f63fd92aed31eed0cf13c500462c35aa2ccd784cce8d9e5d66252f5dc9086ddcd3a71be07cd35293675906cbc0641e272a53e4053c936f299ca6e853c63ab789ed3fada20c2731d956126bd48", 0xe1, 0x200}, {&(0x7f0000000080)="948e7debd7f5c4bc7bea", 0xa, 0x9}, {&(0x7f0000000280)="c47202d28bcaa3a681dd1796a46ff7caa2e3eb7f6093916c422062158abfd41915ccb3967024cb1fa8de689e3a8d3cb1e66cab4c86fe4fe124ba75f7e10e447a8f8393c865a83af869136f0a0ee3ebfe5330b5c2c40195cde4f580281d631b8d6b9c26e2dfd374d837b127886fcee95199db4b2c3e0fcf68dc795ea6011fc50602c95f4cb17b99ccbe6e6fed0985bdf9bd5556548739ec3067ede0eb5c3ce104a7c343", 0xa3, 0x8}, {&(0x7f00000000c0)="e1b11f763648620a8cb47dfb5b4413749f2885e971fbb8d3984c045d83bdb1a7fe373fe87b04469abda4383851b1fc22c8d9eba1f211bc8bf22e036e34179dd06d9e4df3959a76f80e28", 0x4a}], 0x1080042, &(0x7f0000000540)=ANY=[@ANYBLOB="657255a6726f72733d7a6f6e652d726f2c6572726f72733d7a6f6e652d726f2c6572726f72733d7a6f6e652d726f2c6572726f72733d7265706169722c6572726f72733d7a6f6e652d6f66666c696e652c6572726f72733d7a6f6f652d726f2c6572726f72733d7265706169722c6572726f72733d7a6f6e652d726f2c6572726f72733d7a6f6e652d6f66666c696e652c6578706c696369742d6f70656e2c726f6f74636f6e746578743d757365725f752c6f626a5f747970653d7b5b5e2c686173682c005a4a1cc71980e68f272cc757230ba06c891938f9b2a296b4babd19d61c7978dc313b1912a51f7e1332a8dee82dea8496eea70b7c82b7bf3d6523fbfc171da9a46e8663a1fce40efe818534898c47bbe1d3a9ae37dadd2e7dfbe674e203da6a7859875c330da36a62509fe99247005bae1bdc5dc26193a803ca4088ff6ada8632b83da40098a93b215f018ef329cb668665c4333977bea40fcf30c9bf72f6046b29eace02d1151cf6caf0279601"]) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000004c0)=0x3, 0x4) 17:16:16 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x162, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2990.096457][T12595] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.113118][T12595] device ipvlan90 entered promiscuous mode [ 2990.126305][T12595] 8021q: adding VLAN 0 to HW filter on device ipvlan90 17:16:16 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x16b, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2990.142620][T12603] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.154551][T12603] device ipvlan91 entered promiscuous mode [ 2990.161677][T12603] 8021q: adding VLAN 0 to HW filter on device ipvlan91 [ 2990.201797][T12607] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.215146][T12607] device ipvlan92 entered promiscuous mode [ 2990.223940][T12607] 8021q: adding VLAN 0 to HW filter on device ipvlan92 [ 2990.238495][T12610] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:16 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:16 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:16 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x174, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2990.267782][T12610] device ipvlan93 entered promiscuous mode [ 2990.285206][T12610] 8021q: adding VLAN 0 to HW filter on device ipvlan93 17:16:17 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2990.345613][T12620] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.361921][T12620] device ipvlan94 entered promiscuous mode [ 2990.369429][T12620] 8021q: adding VLAN 0 to HW filter on device ipvlan94 [ 2990.379819][ T17] usb 6-1: new high-speed USB device number 121 using dummy_hcd 17:16:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x192, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2990.391297][T12626] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.405922][T12626] device ipvlan95 entered promiscuous mode [ 2990.416109][T12626] 8021q: adding VLAN 0 to HW filter on device ipvlan95 [ 2990.454387][T12630] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2990.467404][T12630] device ipvlan96 entered promiscuous mode [ 2990.476353][T12630] 8021q: adding VLAN 0 to HW filter on device ipvlan96 [ 2990.489147][T12633] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1bc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2990.501559][T12633] device ipvlan97 entered promiscuous mode [ 2990.508751][T12633] 8021q: adding VLAN 0 to HW filter on device ipvlan97 [ 2990.546849][T12637] device ipvlan98 entered promiscuous mode [ 2990.554244][T12637] 8021q: adding VLAN 0 to HW filter on device ipvlan98 [ 2990.573230][T12640] device ipvlan99 entered promiscuous mode [ 2990.580836][T12640] 8021q: adding VLAN 0 to HW filter on device ipvlan99 [ 2990.627501][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 2990.747905][ T17] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2990.756538][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2990.772222][ T17] usb 6-1: config 0 has no interface number 0 [ 2990.780653][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2990.790161][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2990.801863][ T17] usb 6-1: config 0 descriptor?? [ 2990.859803][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2991.077435][ T17] snd_usb_pod 6-1:0.1: set_interface failed [ 2991.083645][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2991.096523][ T17] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2991.104215][ T17] usb 6-1: USB disconnect, device number 121 [ 2991.837436][T10032] usb 6-1: new high-speed USB device number 122 using dummy_hcd [ 2992.077365][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2992.197826][T10032] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2992.206011][T10032] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2992.218831][T10032] usb 6-1: config 0 has no interface number 0 [ 2992.224909][T10032] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2992.235384][T10032] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2992.247964][T10032] usb 6-1: config 0 descriptor?? [ 2992.289850][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found 17:16:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:19 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1be, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2992.507470][T10032] snd_usb_pod 6-1:0.1: set_interface failed [ 2992.513779][T10032] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2992.527960][T10032] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2992.535555][T10032] usb 6-1: USB disconnect, device number 122 [ 2992.600173][T12669] device ipvlan100 entered promiscuous mode [ 2992.607929][T12669] 8021q: adding VLAN 0 to HW filter on device ipvlan100 [ 2992.623735][T12675] device ipvlan101 entered promiscuous mode [ 2992.631044][T12675] 8021q: adding VLAN 0 to HW filter on device ipvlan101 17:16:19 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:19 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @initdev}, &(0x7f0000000040)=0xc) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="120100ed404153200500000000001692dce432f63ad96d707807c0fd2cfc462e05b424edfe0f8ecad60cb132cdada56ebaaf0f6353bc1ce431022a4627ff3a38310337b14b51e5c53c90a2de5150bd51cb2412d2a08e7827cf3dbe8d4748b6710fffb8e8e916e734c44ab7387aef48f896569eccd1fddfed9da13000"/134], 0x0) 17:16:19 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1da, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:19 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2993.126736][T12684] device ipvlan102 entered promiscuous mode [ 2993.133765][T12684] 8021q: adding VLAN 0 to HW filter on device ipvlan102 17:16:19 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e2, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2993.179534][T12692] device ipvlan103 entered promiscuous mode [ 2993.186708][T12692] 8021q: adding VLAN 0 to HW filter on device ipvlan103 [ 2993.204388][T12696] device ipvlan104 entered promiscuous mode [ 2993.211700][T12696] 8021q: adding VLAN 0 to HW filter on device ipvlan104 17:16:19 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1ee, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:19 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2993.250203][T12700] device ipvlan105 entered promiscuous mode [ 2993.260032][T12700] 8021q: adding VLAN 0 to HW filter on device ipvlan105 [ 2993.274761][T12703] device ipvlan106 entered promiscuous mode [ 2993.282536][T12703] 8021q: adding VLAN 0 to HW filter on device ipvlan106 17:16:20 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2993.328165][T12710] device ipvlan107 entered promiscuous mode [ 2993.335473][T12710] 8021q: adding VLAN 0 to HW filter on device ipvlan107 17:16:20 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x210, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2993.377374][T10032] usb 6-1: new high-speed USB device number 123 using dummy_hcd [ 2993.414658][T12721] device ipvlan108 entered promiscuous mode [ 2993.422728][T12721] 8021q: adding VLAN 0 to HW filter on device ipvlan108 [ 2993.442552][T12725] device ipvlan109 entered promiscuous mode [ 2993.449554][T12725] 8021q: adding VLAN 0 to HW filter on device ipvlan109 [ 2993.617244][T10032] usb 6-1: Using ep0 maxpacket: 32 [ 2993.737294][T10032] usb 6-1: unable to get BOS descriptor or descriptor too short [ 2993.745124][T10032] usb 6-1: too many configurations: 228, using maximum allowed: 8 [ 2993.817298][T10032] usb 6-1: unable to read config index 0 descriptor/start: -71 [ 2993.825501][T10032] usb 6-1: can't read configurations, error -71 17:16:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xc4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:22 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x21c, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2995.613526][T12731] __nla_validate_parse: 12 callbacks suppressed [ 2995.613592][T12731] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2995.635158][T12731] device ipvlan110 entered promiscuous mode [ 2995.642906][T12731] 8021q: adding VLAN 0 to HW filter on device ipvlan110 [ 2995.656953][T12737] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2995.671788][T12737] device ipvlan111 entered promiscuous mode [ 2995.680629][T12737] 8021q: adding VLAN 0 to HW filter on device ipvlan111 17:16:22 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:22 executing program 5: syz_usb_connect(0x2, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x2c8, r0, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xa6}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xbb53}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2a8e}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xdb}]}, @TIPC_NLA_NODE={0x10c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "03853d665ed1a4e9f7f1cdcb37dbcd2e351f07b54a2b5b603c536ee3dc3cef"}}, @TIPC_NLA_NODE_ID={0xac, 0x3, "94f2965d66bd4942c570e39c910ad6acc9aa609f35b01040bb8b8f3c72d3620852e02bd621db207c9a103e212cd8837c63282424679d639c1a1448ced8dc1a2612d04fff473b1012e55b6272f3dcee6cc613b23e4547a27affe477b62f49cfa15a0954ffb15ed17627e9fbda475bd37afad8b1c2f7f0991667ae20ac8e52675d02d7684393198fb1d284de7a1edbc02fd8663a85a4d8b95f84d6601c6b09f692d32400e1f56e8dc2"}]}, @TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2eb}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x70000}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3e}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 17:16:22 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x21e, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.149917][T12745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2996.162129][T12745] device ipvlan112 entered promiscuous mode [ 2996.174279][T12745] 8021q: adding VLAN 0 to HW filter on device ipvlan112 [ 2996.190859][T12751] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:22 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x224, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.202867][T12751] device ipvlan113 entered promiscuous mode [ 2996.211631][T12751] 8021q: adding VLAN 0 to HW filter on device ipvlan113 [ 2996.245837][T12755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2996.260025][T12755] device ipvlan114 entered promiscuous mode [ 2996.268992][T12755] 8021q: adding VLAN 0 to HW filter on device ipvlan114 [ 2996.281267][T12758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:23 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x236, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.292976][T12758] device ipvlan115 entered promiscuous mode [ 2996.304806][T12758] 8021q: adding VLAN 0 to HW filter on device ipvlan115 [ 2996.359814][T12765] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2996.373181][T12765] device ipvlan116 entered promiscuous mode [ 2996.380689][T12765] 8021q: adding VLAN 0 to HW filter on device ipvlan116 [ 2996.395689][T12768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:23 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x240, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.408550][T10001] usb 6-1: new full-speed USB device number 125 using dummy_hcd [ 2996.420193][T12768] device ipvlan117 entered promiscuous mode [ 2996.429171][T12768] 8021q: adding VLAN 0 to HW filter on device ipvlan117 [ 2996.465912][T12775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2996.481529][T12775] device ipvlan118 entered promiscuous mode [ 2996.488626][T12775] 8021q: adding VLAN 0 to HW filter on device ipvlan118 [ 2996.505441][T12778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x242, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.520807][T12778] device ipvlan119 entered promiscuous mode [ 2996.528648][T12778] 8021q: adding VLAN 0 to HW filter on device ipvlan119 17:16:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x28c, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2996.570885][T12782] device ipvlan120 entered promiscuous mode [ 2996.578588][T12782] 8021q: adding VLAN 0 to HW filter on device ipvlan120 [ 2996.594479][T12785] device ipvlan121 entered promiscuous mode [ 2996.602124][T12785] 8021q: adding VLAN 0 to HW filter on device ipvlan121 [ 2996.643854][T12789] device ipvlan122 entered promiscuous mode [ 2996.651450][T12789] 8021q: adding VLAN 0 to HW filter on device ipvlan122 [ 2996.668979][T12792] device ipvlan123 entered promiscuous mode [ 2996.676514][T12792] 8021q: adding VLAN 0 to HW filter on device ipvlan123 [ 2996.827472][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2996.835998][T10001] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2996.851239][T10001] usb 6-1: config 0 has no interface number 0 [ 2996.860330][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2996.872045][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2996.884736][T10001] usb 6-1: config 0 descriptor?? [ 2996.950681][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 2997.166979][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 2997.172984][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2997.180207][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2997.189180][T10001] usb 6-1: USB disconnect, device number 125 [ 2997.936914][T10001] usb 6-1: new full-speed USB device number 126 using dummy_hcd [ 2998.347349][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2998.355382][T10001] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2998.370654][T10001] usb 6-1: config 0 has no interface number 0 [ 2998.379311][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2998.388873][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2998.403964][T10001] usb 6-1: config 0 descriptor?? [ 2998.460497][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found 17:16:25 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xc4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:25 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x294, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2998.636461][T12813] device ipvlan124 entered promiscuous mode [ 2998.643796][T12813] 8021q: adding VLAN 0 to HW filter on device ipvlan124 [ 2998.669455][T12823] device ipvlan125 entered promiscuous mode [ 2998.681742][T12823] 8021q: adding VLAN 0 to HW filter on device ipvlan125 [ 2998.688974][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 2998.704862][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 2998.721126][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 2998.732784][T10001] usb 6-1: USB disconnect, device number 126 17:16:25 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000000203010800000000230000000000000708000340fffffff808000340000c9e10080001000400002b"], 0x2c}, 0x1, 0x0, 0x0, 0x20008010}, 0x80) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000000)={0x3, 0x3, 0x2}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000305) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000200)) 17:16:25 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xa, [@func, @func, @ptr, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x82}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:25 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:25 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x344, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2999.166023][T12833] device ipvlan126 entered promiscuous mode [ 2999.173468][T12833] 8021q: adding VLAN 0 to HW filter on device ipvlan126 [ 2999.195694][T12842] device ipvlan127 entered promiscuous mode [ 2999.203515][T12842] 8021q: adding VLAN 0 to HW filter on device ipvlan127 [ 2999.242611][T12846] device ipvlan128 entered promiscuous mode [ 2999.249953][T12846] 8021q: adding VLAN 0 to HW filter on device ipvlan128 [ 2999.267860][T12849] device ipvlan129 entered promiscuous mode [ 2999.275165][T12849] 8021q: adding VLAN 0 to HW filter on device ipvlan129 17:16:26 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x38a, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2999.357396][T12853] device ipvlan130 entered promiscuous mode [ 2999.364634][T12853] 8021q: adding VLAN 0 to HW filter on device ipvlan130 17:16:26 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3d0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2999.436863][ T9563] usb 6-1: new high-speed USB device number 127 using dummy_hcd [ 2999.466047][T12862] device ipvlan131 entered promiscuous mode [ 2999.476035][T12862] 8021q: adding VLAN 0 to HW filter on device ipvlan131 17:16:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 2999.517673][T12871] device ipvlan132 entered promiscuous mode [ 2999.525159][T12871] 8021q: adding VLAN 0 to HW filter on device ipvlan132 [ 2999.547632][T12874] device ipvlan133 entered promiscuous mode [ 2999.554844][T12874] 8021q: adding VLAN 0 to HW filter on device ipvlan133 [ 2999.592851][T12878] device ipvlan134 entered promiscuous mode [ 2999.600797][T12878] 8021q: adding VLAN 0 to HW filter on device ipvlan134 [ 2999.621531][T12881] device ipvlan135 entered promiscuous mode [ 2999.629074][T12881] 8021q: adding VLAN 0 to HW filter on device ipvlan135 [ 2999.676785][ T9563] usb 6-1: Using ep0 maxpacket: 32 [ 2999.797077][ T9563] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 2999.805388][ T9563] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2999.822942][ T9563] usb 6-1: config 0 has no interface number 0 [ 2999.831778][ T9563] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 2999.845907][ T9563] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2999.859503][ T9563] usb 6-1: config 0 descriptor?? [ 2999.900732][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3000.246716][ T9563] snd_usb_pod 6-1:0.1: set_interface failed [ 3000.253356][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3000.272876][ T9563] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3000.281525][ T9563] usb 6-1: USB disconnect, device number 127 17:16:28 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xc4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:28 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:28 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x24000, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1}]}, 0x20}}, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) syz_usb_connect(0x0, 0x2d, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYBLOB="408bc73045f83b3d9ee52f4774b934", @ANYRESHEX, @ANYRES32=0x0, @ANYRES32=r0, @ANYRESHEX, @ANYBLOB="116688a3c7559eca79c8b4c18bfa7ccc2326b379995e7cbfec27ae7cfaaded27d865cd099a93aaed87ac3ecb375ad98ffe69f36beca1164f674b6c9c89bc8a5c4c5d52290ae801d00a91dca1abb669b3fd1af6f2d86bf403a04193eb8927ac9ae67f1cab33a7fbe7bb251724e3faf54bdd76d4c393d4cc9dc9b0e5fc814e532de49c56a640e62593d35b3b90993d0500255329bd7b7f54801da6bdad0ae24f8408bb035e0b04b7dd991ce16f958821bcf772a9"], 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000300)={0xfffffff9, 0x3f, 0x7, 0x1, 0x7}) [ 3001.664668][T12903] __nla_validate_parse: 16 callbacks suppressed [ 3001.664680][T12903] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3001.684052][T12903] device ipvlan136 entered promiscuous mode [ 3001.693963][T12903] 8021q: adding VLAN 0 to HW filter on device ipvlan136 [ 3001.916617][ T8276] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 3002.106584][ T8276] usb 6-1: device descriptor read/64, error 18 17:16:28 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @func, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:28 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x900, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3002.181852][T12911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.195716][T12911] device ipvlan137 entered promiscuous mode [ 3002.208267][T12911] 8021q: adding VLAN 0 to HW filter on device ipvlan137 [ 3002.222271][T12917] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:28 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3002.234728][T12917] device ipvlan138 entered promiscuous mode [ 3002.246459][T12917] 8021q: adding VLAN 0 to HW filter on device ipvlan138 [ 3002.285336][T12921] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.299976][T12921] device ipvlan139 entered promiscuous mode [ 3002.307285][T12921] 8021q: adding VLAN 0 to HW filter on device ipvlan139 [ 3002.320879][T12924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:29 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3002.333948][T12924] device ipvlan140 entered promiscuous mode [ 3002.346335][T12924] 8021q: adding VLAN 0 to HW filter on device ipvlan140 17:16:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xb00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3002.376579][ T8276] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 3002.407154][T12931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.419474][T12931] device ipvlan141 entered promiscuous mode 17:16:29 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:29 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3002.427044][T12931] 8021q: adding VLAN 0 to HW filter on device ipvlan141 [ 3002.440442][T12934] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.452319][T12934] device ipvlan142 entered promiscuous mode [ 3002.463869][T12934] 8021q: adding VLAN 0 to HW filter on device ipvlan142 17:16:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:29 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3002.531026][T12944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.550375][T12944] device ipvlan143 entered promiscuous mode [ 3002.560203][T12944] 8021q: adding VLAN 0 to HW filter on device ipvlan143 [ 3002.569832][ T8276] usb 6-1: device descriptor read/64, error 18 [ 3002.582694][T12950] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3002.594997][T12950] device ipvlan144 entered promiscuous mode [ 3002.608827][T12950] 8021q: adding VLAN 0 to HW filter on device ipvlan144 [ 3002.686638][ T8276] usb usb6-port1: attempt power cycle [ 3003.396502][ T8276] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 3003.566562][ T8276] usb 6-1: device descriptor read/8, error -61 [ 3003.836440][ T8276] usb 6-1: new high-speed USB device number 5 using dummy_hcd [ 3004.006912][ T8276] usb 6-1: device descriptor read/8, error -61 [ 3004.126443][ T8276] usb usb6-port1: unable to enumerate USB device 17:16:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:31 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:31 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xd00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3004.693682][T12963] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3004.709612][T12963] device ipvlan145 entered promiscuous mode [ 3004.718004][T12963] 8021q: adding VLAN 0 to HW filter on device ipvlan145 [ 3004.738736][T12966] device ipvlan146 entered promiscuous mode [ 3004.749062][T12966] 8021q: adding VLAN 0 to HW filter on device ipvlan146 17:16:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @func, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:31 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:16:31 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:31 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xf00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3005.240196][T12975] device ipvlan147 entered promiscuous mode [ 3005.248673][T12975] 8021q: adding VLAN 0 to HW filter on device ipvlan147 [ 3005.266782][T12980] device ipvlan148 entered promiscuous mode [ 3005.274122][T12980] 8021q: adding VLAN 0 to HW filter on device ipvlan148 [ 3005.315854][T12984] device ipvlan149 entered promiscuous mode [ 3005.329380][T12984] 8021q: adding VLAN 0 to HW filter on device ipvlan149 [ 3005.348888][T12987] device ipvlan150 entered promiscuous mode 17:16:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1002, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3005.360276][T12987] 8021q: adding VLAN 0 to HW filter on device ipvlan150 17:16:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1100, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3005.401776][T12991] device ipvlan151 entered promiscuous mode [ 3005.409002][T12991] 8021q: adding VLAN 0 to HW filter on device ipvlan151 [ 3005.426817][T12994] device ipvlan152 entered promiscuous mode [ 3005.434272][T12994] 8021q: adding VLAN 0 to HW filter on device ipvlan152 17:16:32 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1200, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3005.475520][T12999] device ipvlan153 entered promiscuous mode [ 3005.482735][T12999] 8021q: adding VLAN 0 to HW filter on device ipvlan153 [ 3005.494352][ T8276] usb 6-1: new high-speed USB device number 6 using dummy_hcd 17:16:32 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3005.554422][T13007] device ipvlan154 entered promiscuous mode [ 3005.562935][T13007] 8021q: adding VLAN 0 to HW filter on device ipvlan154 [ 3005.746287][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3005.866617][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3005.875134][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3005.890034][ T8276] usb 6-1: config 0 has no interface number 0 [ 3005.900221][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3005.911350][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3005.922482][ T8276] usb 6-1: config 0 descriptor?? [ 3005.968521][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3006.186283][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3006.192666][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3006.202905][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3006.210721][ T8276] usb 6-1: USB disconnect, device number 6 [ 3006.946264][ T8276] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 3007.196160][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3007.316768][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3007.325191][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3007.336730][ T8276] usb 6-1: config 0 has no interface number 0 [ 3007.343686][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3007.352874][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3007.363579][ T8276] usb 6-1: config 0 descriptor?? [ 3007.418490][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found 17:16:34 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:34 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1c00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:34 executing program 5: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x6, 0x118, 0xfa00, {{0xa0, 0xffffff05, "002ebf8e5e98f6b40bac22735c2fd0064126b47a43aec7b81a0cd9e6db66ca36aa525812bbe447fe3bf0b3d955b5132a3b1bd1071e6245299d8fd1d9d2dc3af45426977b5edb8f48b2b2a3ac61e7c3812ea40813affb492cb6bd0bcb959eaf96f57a80343ee511fbde6a8f002809a8f959151ea27d4b14e35bd1e359c19f35fad95ad871df6fb449aaeffcf21f6e7beed55c8fc043d0814ccc3b473d943d559027db23f8a1ccfe4243ff0eda4a03a5ff237d17be1c9f09c1f8d8802c81e802ffa2cfd08d7ccbc72abc7d511e96a333c895aa2fdaf438000938b785611a1ed31a0cd79402641aabaf62262b563cbed13ee1b6a29b7402d6c7fdd50bc30e8a5091", 0x5, 0xff, 0x40, 0x2, 0x7f, 0x7f, 0x2}}}, 0x120) syz_usb_connect(0x0, 0x2d, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000041435320410e5150e8d500e0a992149379a6d1e888afc96f7c00000109021b000100000000090401323c50f19ebc3b46bcb3edd985a0f4cbcb732ce6020000000000000049df9afaaa5b320c1e5cd0a1b4241c65e7acee947d958ace86c53ef1362d8f5669368ec9838c2b3bfcbce377320b9edabaac58c33f23"], 0x0) [ 3007.636146][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3007.646478][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3007.653720][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3007.662901][ T8276] usb 6-1: USB disconnect, device number 7 [ 3007.715246][T13044] __nla_validate_parse: 9 callbacks suppressed [ 3007.715258][T13044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3007.740128][T13044] device ipvlan155 entered promiscuous mode [ 3007.749624][T13044] 8021q: adding VLAN 0 to HW filter on device ipvlan155 [ 3007.762455][T13051] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3007.779418][T13051] device ipvlan156 entered promiscuous mode [ 3007.786955][T13051] 8021q: adding VLAN 0 to HW filter on device ipvlan156 [ 3008.086130][ T8276] usb 6-1: new high-speed USB device number 8 using dummy_hcd 17:16:34 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @func, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:34 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:34 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1c02, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:34 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e02, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3008.242171][T13056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.254867][T13056] device ipvlan157 entered promiscuous mode [ 3008.262514][T13056] 8021q: adding VLAN 0 to HW filter on device ipvlan157 [ 3008.301735][T13066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.313885][T13066] device ipvlan158 entered promiscuous mode [ 3008.322687][T13066] 8021q: adding VLAN 0 to HW filter on device ipvlan158 [ 3008.327417][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3008.342865][T13070] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:35 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3008.355999][T13070] device ipvlan159 entered promiscuous mode [ 3008.363522][T13070] 8021q: adding VLAN 0 to HW filter on device ipvlan159 [ 3008.376142][ T8276] usb 6-1: too many configurations: 146, using maximum allowed: 8 17:16:35 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2402, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3008.402205][T13074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.414068][T13074] device ipvlan160 entered promiscuous mode [ 3008.428577][T13074] 8021q: adding VLAN 0 to HW filter on device ipvlan160 [ 3008.469428][T13080] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.481454][T13080] device ipvlan161 entered promiscuous mode [ 3008.492861][T13080] 8021q: adding VLAN 0 to HW filter on device ipvlan161 [ 3008.506138][ T8276] usb 6-1: unable to read config index 0 descriptor/start: -61 17:16:35 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2500, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3008.514236][ T8276] usb 6-1: can't read configurations, error -61 17:16:35 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3008.551443][T13086] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.563850][T13086] device ipvlan162 entered promiscuous mode [ 3008.578369][T13086] 8021q: adding VLAN 0 to HW filter on device ipvlan162 17:16:35 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2e00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3008.595016][T13091] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.611522][T13091] device ipvlan163 entered promiscuous mode [ 3008.619541][T13091] 8021q: adding VLAN 0 to HW filter on device ipvlan163 [ 3008.660036][T13097] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3008.667810][ T8276] usb 6-1: new high-speed USB device number 9 using dummy_hcd [ 3008.672617][T13097] device ipvlan164 entered promiscuous mode [ 3008.685317][T13097] 8021q: adding VLAN 0 to HW filter on device ipvlan164 [ 3008.703017][T13100] device ipvlan165 entered promiscuous mode [ 3008.710531][T13100] 8021q: adding VLAN 0 to HW filter on device ipvlan165 [ 3008.916064][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3008.956098][ T8276] usb 6-1: too many configurations: 146, using maximum allowed: 8 [ 3009.086402][ T8276] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3009.094152][ T8276] usb 6-1: can't read configurations, error -61 [ 3009.107194][ T8276] usb usb6-port1: attempt power cycle [ 3009.816020][ T8276] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 3009.906227][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3009.946475][ T8276] usb 6-1: too many configurations: 146, using maximum allowed: 8 [ 3010.066030][ T8276] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3010.074022][ T8276] usb 6-1: can't read configurations, error -61 [ 3010.226434][ T8276] usb 6-1: new high-speed USB device number 11 using dummy_hcd [ 3010.316010][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3010.356063][ T8276] usb 6-1: too many configurations: 146, using maximum allowed: 8 [ 3010.476294][ T8276] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3010.484867][ T8276] usb 6-1: can't read configurations, error -61 [ 3010.497954][ T8276] usb usb6-port1: unable to enumerate USB device 17:16:37 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2f00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:37 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:37 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100004100004000090401cfb00a266bdc572d5f6f4c598eaabda68cf868f551a6e7c295789d44c1cc041e96f9b1a83cab95649bf7fd3a12c165beff48306e401e4dc57cd8d8256046ec6c0893425d809dc3dfee0f2cf024a27faa232f8ef01c738ec6c7a08d4d426453531a81e4232d8ea8de35f7a16ae4a124096ef993a10f3db940cf2c"], 0x0) [ 3010.741496][T13106] device ipvlan166 entered promiscuous mode [ 3010.752289][T13106] 8021q: adding VLAN 0 to HW filter on device ipvlan166 [ 3010.778948][T13116] device ipvlan167 entered promiscuous mode [ 3010.786604][T13116] 8021q: adding VLAN 0 to HW filter on device ipvlan167 17:16:37 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:37 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:37 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3602, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.225911][ T8069] usb 6-1: new high-speed USB device number 12 using dummy_hcd 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3a00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.282712][T13124] device ipvlan168 entered promiscuous mode [ 3011.291004][T13124] 8021q: adding VLAN 0 to HW filter on device ipvlan168 [ 3011.309835][T13129] device ipvlan169 entered promiscuous mode [ 3011.317561][T13129] 8021q: adding VLAN 0 to HW filter on device ipvlan169 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.359923][T13134] device ipvlan170 entered promiscuous mode [ 3011.367855][T13134] 8021q: adding VLAN 0 to HW filter on device ipvlan170 [ 3011.387594][T13137] device ipvlan171 entered promiscuous mode [ 3011.395299][T13137] 8021q: adding VLAN 0 to HW filter on device ipvlan171 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.441026][T13141] device ipvlan172 entered promiscuous mode [ 3011.448858][T13141] 8021q: adding VLAN 0 to HW filter on device ipvlan172 [ 3011.472919][T13144] device ipvlan173 entered promiscuous mode [ 3011.480621][T13144] 8021q: adding VLAN 0 to HW filter on device ipvlan173 [ 3011.523991][T13148] device ipvlan174 entered promiscuous mode [ 3011.530518][ T8069] usb 6-1: too many configurations: 220, using maximum allowed: 8 [ 3011.540176][T13148] 8021q: adding VLAN 0 to HW filter on device ipvlan174 [ 3011.563672][T13151] device ipvlan175 entered promiscuous mode 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4002, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:38 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xa4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3011.571158][T13151] 8021q: adding VLAN 0 to HW filter on device ipvlan175 [ 3011.627889][T13156] device ipvlan176 entered promiscuous mode [ 3011.639558][T13156] 8021q: adding VLAN 0 to HW filter on device ipvlan176 [ 3011.655390][T13161] device ipvlan177 entered promiscuous mode [ 3011.667816][T13161] 8021q: adding VLAN 0 to HW filter on device ipvlan177 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4202, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.680785][ T8069] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3011.695822][ T8069] usb 6-1: can't read configurations, error -61 17:16:38 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4403, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3011.722125][T13165] device ipvlan178 entered promiscuous mode [ 3011.731073][T13165] 8021q: adding VLAN 0 to HW filter on device ipvlan178 [ 3011.753193][T13168] device ipvlan179 entered promiscuous mode [ 3011.762715][T13168] 8021q: adding VLAN 0 to HW filter on device ipvlan179 [ 3011.808217][T13172] device ipvlan180 entered promiscuous mode [ 3011.822445][T13172] 8021q: adding VLAN 0 to HW filter on device ipvlan180 [ 3011.845915][ T8069] usb 6-1: new high-speed USB device number 13 using dummy_hcd [ 3012.135861][ T8069] usb 6-1: too many configurations: 220, using maximum allowed: 8 [ 3012.266135][ T8069] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3012.274262][ T8069] usb 6-1: can't read configurations, error -61 [ 3012.286874][ T8069] usb usb6-port1: attempt power cycle [ 3013.015823][ T8069] usb 6-1: new high-speed USB device number 14 using dummy_hcd [ 3013.176380][ T8069] usb 6-1: too many configurations: 220, using maximum allowed: 8 [ 3013.325803][ T8069] usb 6-1: unable to read config index 0 descriptor/start: -61 [ 3013.333772][ T8069] usb 6-1: can't read configurations, error -61 [ 3013.495714][ T8069] usb 6-1: new high-speed USB device number 15 using dummy_hcd [ 3013.656153][ T8069] usb 6-1: too many configurations: 220, using maximum allowed: 8 17:16:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:40 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4788, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3013.755761][ T8069] usb 6-1: unable to read config index 0 descriptor/start: -71 [ 3013.765396][ T8069] usb 6-1: can't read configurations, error -71 [ 3013.784333][ T8069] usb usb6-port1: unable to enumerate USB device [ 3013.803590][T13183] __nla_validate_parse: 16 callbacks suppressed [ 3013.803601][T13183] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3013.828336][T13183] device ipvlan181 entered promiscuous mode [ 3013.839251][T13183] 8021q: adding VLAN 0 to HW filter on device ipvlan181 [ 3013.852786][T13186] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3013.870581][T13186] device ipvlan182 entered promiscuous mode [ 3013.881661][T13186] 8021q: adding VLAN 0 to HW filter on device ipvlan182 17:16:40 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:40 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:40 executing program 5: syz_open_dev$char_usb(0xc, 0xb4, 0x840) r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) readv(r0, &(0x7f0000000000), 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000414353a7c3745f22e7ca1900000109021b000100000000090401"], 0x0) 17:16:40 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4800, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:41 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4888, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3014.320542][T13192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.334222][T13192] device ipvlan183 entered promiscuous mode [ 3014.343479][T13192] 8021q: adding VLAN 0 to HW filter on device ipvlan183 [ 3014.385433][T13206] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.400058][T13206] device ipvlan184 entered promiscuous mode [ 3014.412667][T13206] 8021q: adding VLAN 0 to HW filter on device ipvlan184 17:16:41 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4a00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3014.430782][T13209] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.443447][T13209] device ipvlan185 entered promiscuous mode [ 3014.456386][T13209] 8021q: adding VLAN 0 to HW filter on device ipvlan185 [ 3014.494872][T13213] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.509919][T13213] device ipvlan186 entered promiscuous mode [ 3014.518605][T13213] 8021q: adding VLAN 0 to HW filter on device ipvlan186 [ 3014.534193][T13216] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:41 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3014.547119][T13216] device ipvlan187 entered promiscuous mode [ 3014.555259][T13216] 8021q: adding VLAN 0 to HW filter on device ipvlan187 [ 3014.575627][ T8069] usb 6-1: new high-speed USB device number 16 using dummy_hcd 17:16:41 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xa4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:41 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3014.602326][T13220] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.621712][T13220] device ipvlan188 entered promiscuous mode [ 3014.629956][T13220] 8021q: adding VLAN 0 to HW filter on device ipvlan188 17:16:41 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xa4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3014.689488][T13230] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.703107][T13230] device ipvlan189 entered promiscuous mode [ 3014.715677][T13230] 8021q: adding VLAN 0 to HW filter on device ipvlan189 [ 3014.730418][T13235] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3014.742509][T13235] device ipvlan190 entered promiscuous mode [ 3014.754596][T13235] 8021q: adding VLAN 0 to HW filter on device ipvlan190 [ 3014.775599][ T8069] usb 6-1: device descriptor read/64, error 18 [ 3015.065599][ T8069] usb 6-1: new high-speed USB device number 17 using dummy_hcd [ 3015.275580][ T8069] usb 6-1: device descriptor read/64, error 18 [ 3015.395612][ T8069] usb usb6-port1: attempt power cycle [ 3016.145526][ T8069] usb 6-1: new high-speed USB device number 18 using dummy_hcd [ 3016.246044][ T8069] usb 6-1: Invalid ep0 maxpacket: 167 [ 3016.395502][ T8069] usb 6-1: new high-speed USB device number 19 using dummy_hcd [ 3016.485978][ T8069] usb 6-1: Invalid ep0 maxpacket: 167 [ 3016.493623][ T8069] usb usb6-port1: unable to enumerate USB device 17:16:43 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x5ba8, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:43 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3016.809821][T13239] device ipvlan191 entered promiscuous mode [ 3016.821335][T13239] 8021q: adding VLAN 0 to HW filter on device ipvlan191 [ 3016.839417][T13245] device ipvlan192 entered promiscuous mode [ 3016.847226][T13245] 8021q: adding VLAN 0 to HW filter on device ipvlan192 17:16:43 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:44 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:44 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000000)=""/95, &(0x7f0000000080)=0x5f) 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6201, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3017.358519][T13257] device ipvlan193 entered promiscuous mode [ 3017.366730][T13257] 8021q: adding VLAN 0 to HW filter on device ipvlan193 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3017.412595][T13267] device ipvlan194 entered promiscuous mode [ 3017.420355][T13267] 8021q: adding VLAN 0 to HW filter on device ipvlan194 [ 3017.439655][T13270] device ipvlan195 entered promiscuous mode [ 3017.447418][T13270] 8021q: adding VLAN 0 to HW filter on device ipvlan195 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6800, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3017.491540][T13274] device ipvlan196 entered promiscuous mode [ 3017.499645][T13274] 8021q: adding VLAN 0 to HW filter on device ipvlan196 [ 3017.522199][T13277] device ipvlan197 entered promiscuous mode [ 3017.529797][T13277] 8021q: adding VLAN 0 to HW filter on device ipvlan197 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6b01, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3017.571734][T13281] device ipvlan198 entered promiscuous mode [ 3017.581148][T13281] 8021q: adding VLAN 0 to HW filter on device ipvlan198 [ 3017.603769][T13285] device ipvlan199 entered promiscuous mode [ 3017.614079][T13285] 8021q: adding VLAN 0 to HW filter on device ipvlan199 17:16:44 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:44 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:44 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3017.654434][T13289] device ipvlan200 entered promiscuous mode [ 3017.662474][T13289] 8021q: adding VLAN 0 to HW filter on device ipvlan200 [ 3017.684174][T13292] device ipvlan201 entered promiscuous mode [ 3017.692059][T13292] 8021q: adding VLAN 0 to HW filter on device ipvlan201 [ 3017.742941][T13299] device ipvlan202 entered promiscuous mode [ 3017.751256][T13299] 8021q: adding VLAN 0 to HW filter on device ipvlan202 [ 3017.773074][T13305] device ipvlan203 entered promiscuous mode [ 3017.781495][T13305] 8021q: adding VLAN 0 to HW filter on device ipvlan203 [ 3017.795474][ T8276] usb 6-1: new high-speed USB device number 20 using dummy_hcd [ 3018.036760][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3018.156359][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3018.166170][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3018.178044][ T8276] usb 6-1: config 0 has no interface number 0 [ 3018.185055][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3018.200618][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3018.214083][ T8276] usb 6-1: config 0 descriptor?? [ 3018.257681][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3018.475356][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3018.482349][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3018.492902][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3018.502373][ T8276] usb 6-1: USB disconnect, device number 20 [ 3019.235298][ T8276] usb 6-1: new high-speed USB device number 21 using dummy_hcd [ 3019.475333][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3019.595547][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3019.603965][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3019.618700][ T8276] usb 6-1: config 0 has no interface number 0 [ 3019.625114][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3019.640067][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3019.652132][ T8276] usb 6-1: config 0 descriptor?? [ 3019.697815][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found 17:16:46 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3019.915228][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3019.926851][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3019.934751][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3019.944304][ T8276] usb 6-1: USB disconnect, device number 21 17:16:47 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:47 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:47 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7400, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:47 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:47 executing program 5: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1a8, r1, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x31}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xff}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x15c, 0x22, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xffff}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1000}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7ff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7ff}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xb804}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x400}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x10000}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x10000}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x800}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xdab}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x80000001}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7f}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xca}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x710}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x10001}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1f}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x400}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x100}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}]}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x40004}, 0x40) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x58, r1, 0x100, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x5, 0x28}}}}, [@NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @random="626d16141337"}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x1000, 0x0, 0x1, 0x0, {0x1000, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x1, 0x3, 0x1}, 0x6, 0x1, 0xf1}}, @NL80211_ATTR_MAC_HINT={0xa}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x0) read$char_raw(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500"/30720], 0x7800) [ 3020.374554][T13341] __nla_validate_parse: 13 callbacks suppressed [ 3020.374651][T13341] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.402255][T13341] device ipvlan204 entered promiscuous mode [ 3020.414164][T13341] 8021q: adding VLAN 0 to HW filter on device ipvlan204 17:16:47 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7401, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3020.429730][T13352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.442481][T13352] device ipvlan205 entered promiscuous mode [ 3020.453680][T13352] 8021q: adding VLAN 0 to HW filter on device ipvlan205 [ 3020.492366][T13356] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.509195][T13356] device ipvlan206 entered promiscuous mode [ 3020.516886][T13356] 8021q: adding VLAN 0 to HW filter on device ipvlan206 17:16:47 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7a00, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3020.535399][T13359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.549311][T13359] device ipvlan207 entered promiscuous mode [ 3020.557763][T13359] 8021q: adding VLAN 0 to HW filter on device ipvlan207 [ 3020.594343][T13363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.608578][T13363] device ipvlan208 entered promiscuous mode [ 3020.617045][T13363] 8021q: adding VLAN 0 to HW filter on device ipvlan208 [ 3020.631940][T13366] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:47 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3020.644717][T13366] device ipvlan209 entered promiscuous mode [ 3020.651396][T10001] usb 6-1: new high-speed USB device number 22 using dummy_hcd [ 3020.659563][T13366] 8021q: adding VLAN 0 to HW filter on device ipvlan209 [ 3020.696558][T13370] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.711606][T13370] device ipvlan210 entered promiscuous mode [ 3020.720913][T13370] 8021q: adding VLAN 0 to HW filter on device ipvlan210 [ 3020.736062][T13373] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:47 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:47 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8847, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3020.751083][T13373] device ipvlan211 entered promiscuous mode [ 3020.767124][T13373] 8021q: adding VLAN 0 to HW filter on device ipvlan211 17:16:47 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:47 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3020.831296][T13380] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.850864][T13380] device ipvlan212 entered promiscuous mode [ 3020.858794][T13380] 8021q: adding VLAN 0 to HW filter on device ipvlan212 [ 3020.874209][T13389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3020.889036][T13389] device ipvlan213 entered promiscuous mode [ 3020.895282][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3020.904032][T13389] 8021q: adding VLAN 0 to HW filter on device ipvlan213 [ 3021.025165][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3021.034400][T10001] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3021.045026][T10001] usb 6-1: config 0 has no interface number 0 [ 3021.052982][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3021.062237][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3021.072646][T10001] usb 6-1: config 0 descriptor?? [ 3021.117469][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3021.346233][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 3021.352816][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3021.360191][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3021.371740][T10001] usb 6-1: USB disconnect, device number 22 [ 3022.095079][ T8276] usb 6-1: new high-speed USB device number 23 using dummy_hcd [ 3022.335057][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3022.455515][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3022.463870][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3022.479437][ T8276] usb 6-1: config 0 has no interface number 0 [ 3022.487840][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3022.499794][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3022.511477][ T8276] usb 6-1: config 0 descriptor?? [ 3022.557363][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3022.775027][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3022.781059][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3022.795110][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3022.803607][ T8276] usb 6-1: USB disconnect, device number 23 17:16:50 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:50 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8848, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:50 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000041435320410e515200000000000000001b000100000000090401ba6a34342c1ef672e8bc5c5305572aa27eed03cf9463f1e7708f4b22dbe0219809b30000"], 0x0) 17:16:50 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8a03, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3023.419205][T13428] device ipvlan214 entered promiscuous mode [ 3023.429021][T13428] 8021q: adding VLAN 0 to HW filter on device ipvlan214 [ 3023.449825][T13435] device ipvlan215 entered promiscuous mode [ 3023.457630][T13435] 8021q: adding VLAN 0 to HW filter on device ipvlan215 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8c02, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3023.500809][T13439] device ipvlan216 entered promiscuous mode [ 3023.508878][T13439] 8021q: adding VLAN 0 to HW filter on device ipvlan216 [ 3023.530733][T13442] device ipvlan217 entered promiscuous mode [ 3023.538714][T13442] 8021q: adding VLAN 0 to HW filter on device ipvlan217 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9201, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3023.580314][T13446] device ipvlan218 entered promiscuous mode [ 3023.588196][T13446] 8021q: adding VLAN 0 to HW filter on device ipvlan218 [ 3023.614076][T13449] device ipvlan219 entered promiscuous mode [ 3023.621970][T13449] 8021q: adding VLAN 0 to HW filter on device ipvlan219 [ 3023.665339][T13453] device ipvlan220 entered promiscuous mode [ 3023.672891][T13453] 8021q: adding VLAN 0 to HW filter on device ipvlan220 [ 3023.684805][T10001] usb 6-1: new high-speed USB device number 24 using dummy_hcd [ 3023.701271][T13456] device ipvlan221 entered promiscuous mode [ 3023.708657][T13456] 8021q: adding VLAN 0 to HW filter on device ipvlan221 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9402, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa85b, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3023.751412][T13460] device ipvlan222 entered promiscuous mode [ 3023.759383][T13460] 8021q: adding VLAN 0 to HW filter on device ipvlan222 [ 3023.781940][T13463] device ipvlan223 entered promiscuous mode [ 3023.789996][T13463] 8021q: adding VLAN 0 to HW filter on device ipvlan223 17:16:50 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:50 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xbc01, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3023.832437][T13467] device ipvlan224 entered promiscuous mode [ 3023.840053][T13467] 8021q: adding VLAN 0 to HW filter on device ipvlan224 [ 3023.862558][T13472] device ipvlan225 entered promiscuous mode [ 3023.870990][T13472] 8021q: adding VLAN 0 to HW filter on device ipvlan225 [ 3023.915657][T13479] device ipvlan226 entered promiscuous mode [ 3023.923509][T13479] 8021q: adding VLAN 0 to HW filter on device ipvlan226 [ 3023.945057][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3023.946155][T13482] device ipvlan227 entered promiscuous mode [ 3023.958028][T13482] 8021q: adding VLAN 0 to HW filter on device ipvlan227 [ 3023.995742][T10001] usb 6-1: no configurations [ 3024.000472][T10001] usb 6-1: can't read configurations, error -22 [ 3024.155476][T10001] usb 6-1: new high-speed USB device number 25 using dummy_hcd [ 3024.414913][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3024.455270][T10001] usb 6-1: no configurations [ 3024.460017][T10001] usb 6-1: can't read configurations, error -22 [ 3024.468145][T10001] usb usb6-port1: attempt power cycle [ 3025.224937][T10001] usb 6-1: new high-speed USB device number 26 using dummy_hcd [ 3025.325348][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3025.375334][T10001] usb 6-1: no configurations [ 3025.380029][T10001] usb 6-1: can't read configurations, error -22 [ 3025.536510][T10001] usb 6-1: new high-speed USB device number 27 using dummy_hcd [ 3025.635393][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3025.685200][T10001] usb 6-1: no configurations [ 3025.689995][T10001] usb 6-1: can't read configurations, error -22 [ 3025.696713][T10001] usb usb6-port1: unable to enumerate USB device 17:16:53 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xa, [@func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x7e}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:53 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x51}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xbe01, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:53 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x90, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x34}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0xd}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x33}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}]}, 0x90}, 0x1, 0x0, 0x0, 0x200000d0}, 0x4000001) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xcc, 0x0, 0xe10, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_RULES={0xb4, 0x22, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0xffff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xffff}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4f51}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x7}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xfffffffb}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x6a}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x6}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3f}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xe2}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x2}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xfff}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x4aa8deb8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x5}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4004}, 0x4) 17:16:53 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xd003, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.450479][T13493] __nla_validate_parse: 14 callbacks suppressed [ 3026.450492][T13493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.472255][T13493] device ipvlan228 entered promiscuous mode [ 3026.484311][T13493] 8021q: adding VLAN 0 to HW filter on device ipvlan228 [ 3026.524826][T13505] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.539608][T13505] device ipvlan229 entered promiscuous mode [ 3026.548042][T13505] 8021q: adding VLAN 0 to HW filter on device ipvlan229 [ 3026.562643][T13508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xda01, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.578837][T13508] device ipvlan230 entered promiscuous mode [ 3026.588072][T13508] 8021q: adding VLAN 0 to HW filter on device ipvlan230 [ 3026.623205][T13512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.638127][T13512] device ipvlan231 entered promiscuous mode [ 3026.650940][T13512] 8021q: adding VLAN 0 to HW filter on device ipvlan231 [ 3026.664040][T13515] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe001, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.678102][T13515] device ipvlan232 entered promiscuous mode [ 3026.688909][T13515] 8021q: adding VLAN 0 to HW filter on device ipvlan232 [ 3026.729066][T13519] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.741831][T13519] device ipvlan233 entered promiscuous mode [ 3026.750361][T13519] 8021q: adding VLAN 0 to HW filter on device ipvlan233 [ 3026.764033][T13522] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe201, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.778962][T13522] device ipvlan234 entered promiscuous mode [ 3026.790589][T13522] 8021q: adding VLAN 0 to HW filter on device ipvlan234 [ 3026.827381][T13526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.840809][T13526] device ipvlan235 entered promiscuous mode [ 3026.849292][T13526] 8021q: adding VLAN 0 to HW filter on device ipvlan235 [ 3026.863686][T13529] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:53 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xee01, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.878849][T13529] device ipvlan236 entered promiscuous mode [ 3026.886736][T13529] 8021q: adding VLAN 0 to HW filter on device ipvlan236 [ 3026.904739][ T8806] usb 6-1: new high-speed USB device number 28 using dummy_hcd 17:16:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfeff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3026.941019][T13537] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3026.954578][T13537] device ipvlan237 entered promiscuous mode [ 3026.962878][T13537] 8021q: adding VLAN 0 to HW filter on device ipvlan237 [ 3026.978432][T13540] vcan0: Master is either lo or non-ether device [ 3027.014213][T13543] device ipvlan238 entered promiscuous mode [ 3027.023059][T13543] 8021q: adding VLAN 0 to HW filter on device ipvlan238 [ 3027.043916][T13546] device ipvlan239 entered promiscuous mode [ 3027.054933][T13546] 8021q: adding VLAN 0 to HW filter on device ipvlan239 [ 3027.164702][ T8806] usb 6-1: Using ep0 maxpacket: 32 [ 3027.324725][ T8806] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3027.333121][ T8806] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3027.343423][ T8806] usb 6-1: config 0 has no interface number 0 [ 3027.351212][ T8806] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3027.361488][ T8806] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3027.373350][ T8806] usb 6-1: config 0 descriptor?? [ 3027.427047][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3027.704796][ T8806] snd_usb_pod 6-1:0.1: set_interface failed [ 3027.711036][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3027.723245][ T8806] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3027.731281][ T8806] usb 6-1: USB disconnect, device number 28 [ 3028.464607][ T9563] usb 6-1: new high-speed USB device number 29 using dummy_hcd [ 3028.704590][ T9563] usb 6-1: Using ep0 maxpacket: 32 [ 3028.825140][ T9563] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3028.833570][ T9563] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3028.845033][ T9563] usb 6-1: config 0 has no interface number 0 [ 3028.851925][ T9563] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3028.862761][ T9563] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3028.873341][ T9563] usb 6-1: config 0 descriptor?? [ 3028.917019][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3029.156175][ T9563] snd_usb_pod 6-1:0.1: set_interface failed [ 3029.162648][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3029.173110][ T9563] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3029.182532][ T9563] usb 6-1: USB disconnect, device number 29 17:16:56 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:56 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xff0f, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x100000305) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x4, @private2, 0xfffffbdf}}, 0xfffffeff, 0x4, 0xfc, 0x2, 0x48, 0x400}, 0x9c) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, 0xe, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x810) recvmsg(r1, &(0x7f0000000940)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/163, 0xa3}, {&(0x7f0000000500)=""/131, 0x83}, {&(0x7f00000005c0)=""/208, 0xd0}, {&(0x7f00000006c0)=""/179, 0xb3}, {&(0x7f0000000780)=""/131, 0x83}, {&(0x7f0000000840)=""/116, 0x74}], 0x6, &(0x7f0000000300)=""/31, 0x1f}, 0x2) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f0000000980)={0x1, 0x8, @start={0x0, 0x1, "6d701861806d101a953497d9c3570df1cac2acf152efe5ab395e29fe25fb84895d9247c30e9c058447e7c384849d17ec4309d9db092451ec515bbeed5cc1c164ba0ba43061de9d079fbed65676cf862f16973291e6fa99c324f73616ca86e80a14f42007f7babb660a886153ccfbd340f7e7f371a6fbb2768360c1819b95ae545d3b2466f94ac9431f35f4915e760ad52cbceae4b197009332612a16a43f8d2f44d77abada6da44a862755a43bc92209a5e58a2c97cd16478cef1e767966c8cde765cfe7ad779013d17d963cbc53f9a85d9160acc27e7324a900397d2f6fc0dbabd2b2acf50cd24c43cb5a69b861d71aab922b53e5a51f8ca540b13f6044797f7ce8234208ae481933e70cbeab146128541c491b17f3114fe3042f78327efc44e3df58e5254ed53c2c33e318cd07f3549f92ad4dc7aea4d2f6ce14e2bb6ed4ea780a4d2212405e37c7bf0bf5fb4b89ab0cacdfe74aee876044282e424e0f0453e7e06a85832b8bf6e5abb062a67865ee8d3658f24999130b456fa0a0eb84f1e36769e993df97b2a9df6c2400a1de5c0f71ded65bc44b87b0c87023812857471f7ecf69d81c590d8a2d711171739683d7842e66c6da3c93eb513b11ce84aedde10ef575ac3274a4cb932952c8aaf709fdacc158aa49caa33ee18b7fe696af0b144c53ca0dc1f55fd77c837179421056e6cc31ee28db57a70455760d28afa54677b69e55efa235f49ba670aba6ee3166b635eed6fde4708a8fbd1f15904fd8e401fb08c8659e110a85c013564f25e6c7beebf08f316fb0368afca3ddc794f03dd6db8a9bc6f50827b7488220f6a79285ba130a89fd91fa50ec838f44655079fbf71b240d60545a081d94dc01f2995b00cf1693d2bd7468d6c4540ea9d65e2b01c380d5fa678e4e1e5bf308f4253d037134ed4045f2b7308403059d5a80c26242161b160e37396253266e9ec79950ae875eb7b0614fd3b61d32826387dbf75ba197cca5355e8096a29e74b28edeca57efd5c902661ba8e5eb272b54abee5d594c6738d12852f4130dc373d61cde5da18437d137387ca4c2899239a69a15b9cf3f9bbe46ecc9967fa12e2caa1b49f2d1aeec5d40cbedbcb87c818bc4e6240db7ff4d1c04d6847574835c0d545cd1e3488042935cb58ae41235b385fa9086bee6c173909d9d843e41fd7a55570c95286b0be96807dd816c1495ccf7f9c1813a201201a2364d92abd91484d4904df079b2a250146540255366aaeb22c4543471959fe3ae6f79f80b49a503f8372776de5180a1552e22c1163220152a07ebaf9311edea3e3a63573315684bc2109355cb4c0d4fc3fafe5925c1c3974e9de015a855026e3e2235e47a5eac02dd32c52e545d4a2ece24977ef894a1e70e15537a63bb3a563eb29546b25a8fca9450554cccb968bd450e2cec9e7cc4d53497574535a4c10207", "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"}, [0x2, 0x8, 0x4, 0x4, 0x0, 0x6, 0x7fffffff, 0xf1, 0x3, 0x8, 0x4, 0x401, 0x9, 0x9, 0x2, 0x6, 0x58, 0x1, 0x6, 0x7, 0x1ff, 0xc13a, 0x9, 0x9, 0x1f, 0x100000000000, 0x9, 0xf048, 0x7, 0xff, 0xffffffffffffce3a, 0xe76, 0x11c1, 0x40f2, 0xffff, 0x7fff, 0x10, 0x1000, 0x8, 0xc6c, 0x10000, 0xee, 0x3, 0x6, 0x9, 0x7ff, 0x3, 0x1, 0x77fa, 0x7, 0x8, 0x7, 0xffffffff, 0x0, 0x2314, 0xfffffffffffffffa, 0x2444, 0x1, 0x3, 0x1000, 0x9, 0x7, 0x0, 0x7]}) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0xfffffff0}}]}]}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="38ac1533e064"}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x24004004) 17:16:56 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:56 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xff7f, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3029.479178][T13580] device ipvlan240 entered promiscuous mode [ 3029.489133][T13580] 8021q: adding VLAN 0 to HW filter on device ipvlan240 [ 3029.511709][T13594] device ipvlan241 entered promiscuous mode [ 3029.519857][T13594] 8021q: adding VLAN 0 to HW filter on device ipvlan241 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfffe, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3029.568302][T13598] device ipvlan242 entered promiscuous mode [ 3029.576512][T13598] 8021q: adding VLAN 0 to HW filter on device ipvlan242 [ 3029.594264][T13598] device ipvlan243 entered promiscuous mode [ 3029.602843][T13598] 8021q: adding VLAN 0 to HW filter on device ipvlan243 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x20000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3029.641180][T13605] device ipvlan244 entered promiscuous mode [ 3029.649057][T13605] 8021q: adding VLAN 0 to HW filter on device ipvlan244 [ 3029.671181][T13609] device ipvlan245 entered promiscuous mode [ 3029.678660][T13609] 8021q: adding VLAN 0 to HW filter on device ipvlan245 [ 3029.721403][T13613] device ipvlan246 entered promiscuous mode [ 3029.729917][T13613] 8021q: adding VLAN 0 to HW filter on device ipvlan246 [ 3029.746594][ T9563] usb 6-1: new high-speed USB device number 30 using dummy_hcd 17:16:56 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3ffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x40000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3029.939696][T13619] device ipvlan247 entered promiscuous mode [ 3029.947519][T13619] 8021q: adding VLAN 0 to HW filter on device ipvlan247 17:16:56 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x100000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3029.992959][T13628] device ipvlan248 entered promiscuous mode [ 3029.994572][ T9563] usb 6-1: Using ep0 maxpacket: 32 [ 3030.001469][T13628] 8021q: adding VLAN 0 to HW filter on device ipvlan248 [ 3030.050244][T13633] device ipvlan249 entered promiscuous mode [ 3030.058855][T13633] 8021q: adding VLAN 0 to HW filter on device ipvlan249 [ 3030.080773][T13636] device ipvlan250 entered promiscuous mode [ 3030.088946][T13636] 8021q: adding VLAN 0 to HW filter on device ipvlan250 [ 3030.124511][ T9563] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3030.132914][ T9563] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3030.143420][ T9563] usb 6-1: config 0 has no interface number 0 [ 3030.151417][ T9563] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3030.160755][ T9563] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3030.176031][ T9563] usb 6-1: config 0 descriptor?? [ 3030.216992][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3030.494550][ T9563] snd_usb_pod 6-1:0.1: set_interface failed [ 3030.500821][ T9563] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3030.512458][ T9563] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3030.522387][ T9563] usb 6-1: USB disconnect, device number 30 [ 3030.979454][ T35] audit: type=1804 audit(1609694217.644:294): pid=13584 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir972982565/syzkaller.A3CZXl/7508/cgroup.controllers" dev="sda1" ino=16229 res=1 errno=0 [ 3031.006744][ T35] audit: type=1804 audit(1609694217.644:295): pid=13651 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir972982565/syzkaller.A3CZXl/7508/cgroup.controllers" dev="sda1" ino=16229 res=1 errno=0 17:16:59 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:16:59 executing program 5: getpeername$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000040)=0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) recvfrom$l2tp(r0, &(0x7f0000000080)=""/121, 0x79, 0x100, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x298, r2, 0x800, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0x24c, 0x33, @mgmt_frame=@assoc_resp={@wo_ht={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x36}, @device_a, @broadcast, @initial, {0x8, 0x8}}, 0x8000, 0x4, @default, @void, @void, [{0xdd, 0x68, "648039d744674d4b284354faa359287e2f0bb81c74c265047f8dd6fbf3f6f414f2cc7da6e2314b907f3a85362c9c195d32e9d9e490f47da46122ae47c037ee44be6bbab8c85a401fecfee95195c7cb2e00799c3029e4b6f66f9d87a1aae1c8a4cfa409f8b796ac84"}, {0xdd, 0xbd, "73d09c8e1113e0b8b4f849ce7e85ee613bd7a126c854ea873973e025a711e7231746c6c6e77abac9ba01c593096a09665183a079c85c55b24e7d9d27447b1878acd14d34a586f0455baa8b751984c739c0e8352b07898d10344edd0e96e8e592ef7af4096bbcd4ca29a596a8736f975d43f62b2fb56cdd590b5b03cbb5c8441c5c1cf133b1deb108313b3c8abb8573812dba37bf6c2ab820c482d1d33f6bd9b013039f64c99f9d6b8a25cd4a0aec5ea3685ba3a6a5e789b908e6fc93df"}, {0xdd, 0xff, "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"}]}}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x298}, 0x1, 0x0, 0x0, 0x2000c051}, 0x88c0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) 17:16:59 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:59 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3032.486352][T13659] __nla_validate_parse: 14 callbacks suppressed [ 3032.486386][T13659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3032.529686][T13659] device ipvlan251 entered promiscuous mode [ 3032.538222][T13659] 8021q: adding VLAN 0 to HW filter on device ipvlan251 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3032.602704][T13676] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3032.617902][T13676] device ipvlan252 entered promiscuous mode [ 3032.626455][T13676] 8021q: adding VLAN 0 to HW filter on device ipvlan252 [ 3032.640543][T13679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3032.653870][T13679] device ipvlan253 entered promiscuous mode [ 3032.661905][T13679] 8021q: adding VLAN 0 to HW filter on device ipvlan253 [ 3032.698533][T13683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3032.711587][T13683] device ipvlan254 entered promiscuous mode [ 3032.719700][T13683] 8021q: adding VLAN 0 to HW filter on device ipvlan254 [ 3032.736618][T13686] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3032.749323][T13686] device ipvlan255 entered promiscuous mode [ 3032.757773][T13686] 8021q: adding VLAN 0 to HW filter on device ipvlan255 [ 3032.795088][T13690] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3032.807731][T13690] device ipvlan256 entered promiscuous mode [ 3032.821657][T13690] 8021q: adding VLAN 0 to HW filter on device ipvlan256 17:16:59 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x5000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3032.956332][T13696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3032.969134][T13696] device ipvlan257 entered promiscuous mode [ 3032.977241][T13696] 8021q: adding VLAN 0 to HW filter on device ipvlan257 [ 3032.992663][T13702] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:16:59 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3033.008311][T13702] device ipvlan258 entered promiscuous mode [ 3033.015891][T13702] 8021q: adding VLAN 0 to HW filter on device ipvlan258 [ 3033.050048][T13706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3033.063658][T13706] device ipvlan259 entered promiscuous mode [ 3033.076479][T13706] 8021q: adding VLAN 0 to HW filter on device ipvlan259 17:16:59 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="08b784d66ae44f896072386b725ce84b47715fbbda196141d4445adbb45fb2e9cef06feb744764090c91587094feb45cef99befe009e0ac26ae1f838d19ebaed8d38cd8bc7d305a16b9a5425210a9eb960f92e3416c796aa3b95c26e5bb48e0ad7f5cb1e6a18b22eee5436dc78f9a502000000e7290e50a7d0c98f486e107d786a9afc72591a0a1ab5c2d389eb79cfcbe80dda62a538bf0f22641a87e2e8dcf92069630506a02b5ccd1527b345b50bbc3f0d7b9c90e4728aaf826924d6"], 0x0) [ 3033.092815][T13709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3033.106068][T13709] device ipvlan260 entered promiscuous mode [ 3033.116229][T13709] 8021q: adding VLAN 0 to HW filter on device ipvlan260 [ 3033.404247][ T8276] usb 6-1: new high-speed USB device number 31 using dummy_hcd [ 3033.594247][ T8276] usb 6-1: device descriptor read/64, error 18 [ 3033.864213][ T8276] usb 6-1: new high-speed USB device number 32 using dummy_hcd [ 3034.054696][ T8276] usb 6-1: device descriptor read/64, error 18 [ 3034.174220][ T8276] usb usb6-port1: attempt power cycle [ 3034.884178][ T8276] usb 6-1: new high-speed USB device number 33 using dummy_hcd [ 3035.054212][ T8276] usb 6-1: device descriptor read/8, error -61 [ 3035.324160][ T8276] usb 6-1: new high-speed USB device number 34 using dummy_hcd 17:17:02 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:02 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:02 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3035.494149][ T8276] usb 6-1: device descriptor read/8, error -61 [ 3035.527434][T13720] device ipvlan261 entered promiscuous mode [ 3035.536208][T13720] 8021q: adding VLAN 0 to HW filter on device ipvlan261 17:17:02 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3035.563721][T13723] device ipvlan262 entered promiscuous mode [ 3035.572354][T13723] 8021q: adding VLAN 0 to HW filter on device ipvlan262 17:17:02 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3035.615966][ T8276] usb usb6-port1: unable to enumerate USB device [ 3035.653094][T13742] device ipvlan263 entered promiscuous mode 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3035.662083][T13742] 8021q: adding VLAN 0 to HW filter on device ipvlan263 [ 3035.684202][T13745] device ipvlan264 entered promiscuous mode [ 3035.691584][T13745] 8021q: adding VLAN 0 to HW filter on device ipvlan264 [ 3035.733460][T13749] device ipvlan265 entered promiscuous mode [ 3035.741188][T13749] 8021q: adding VLAN 0 to HW filter on device ipvlan265 [ 3035.763492][T13752] device ipvlan266 entered promiscuous mode [ 3035.771048][T13752] 8021q: adding VLAN 0 to HW filter on device ipvlan266 17:17:02 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xb000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3035.983644][T13756] device ipvlan267 entered promiscuous mode [ 3035.991632][T13756] 8021q: adding VLAN 0 to HW filter on device ipvlan267 [ 3036.013163][T13762] device ipvlan268 entered promiscuous mode [ 3036.021595][T13762] 8021q: adding VLAN 0 to HW filter on device ipvlan268 [ 3036.067146][T13766] device ipvlan269 entered promiscuous mode [ 3036.075723][T13766] 8021q: adding VLAN 0 to HW filter on device ipvlan269 [ 3036.094309][T13769] device ipvlan270 entered promiscuous mode [ 3036.101938][T13769] 8021q: adding VLAN 0 to HW filter on device ipvlan270 17:17:02 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3036.176276][T13775] device ipvlan271 entered promiscuous mode [ 3036.184594][T13775] 8021q: adding VLAN 0 to HW filter on device ipvlan271 [ 3036.201540][T13778] device ipvlan272 entered promiscuous mode [ 3036.209621][T13778] 8021q: adding VLAN 0 to HW filter on device ipvlan272 17:17:05 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:05 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r1 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x1, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1e9698e00"}) syz_usb_connect(0x2, 0x2d, &(0x7f0000000540)=ANY=[@ANYRES16=0x0, @ANYRESOCT, @ANYRESOCT=r0, @ANYRESOCT=r1, @ANYRESDEC=r1, @ANYBLOB="55548fe6fe10b75d08e5b4874a02f9ba66a4d2ec6ba1d7d71b18eb6e6132992a135ca5bd9cc3aa93e37569d30dcc981228dd31d54b76ab407ee5fb9e1197c7e978e74f06bb4f51c98c16f25a9461783928489f842bb7aa5a4e4fd0b5a2a3a81e59456c79b71165ba5db627308de6c790e7abfc5556c1ff0042d1c401699bdeb583503c22957f744988f16d87ff2e31a6c563617dba805a2443fa6faed319447216f9e290dbf15ad7999ea521c8d9e27896005e18ba7e18e69e1fb599c2fba830a33e925fa1f44fb3a4ba9b48e0a112208ce5a86bcb32e2444f49110610d0016d048f9db114c89a39b7b032b0ef2e431feff4ff2d9beab5f66730b40c2dbfdea231662b89cd814ef5f5b09d972c93be676f2fbe878d0254b9f04da036164969b5cd406761265058d46ee01c9820c0d4ff13902a2db88b2a4b9446c385e07e8cfe6efe85e20dc069a48f672f7a2e34cca8532f7c6750cb793ee6713ce83859e5be9cb24002ad88905db819bb460e05d9a57a230f1644c953ceb877c0"], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0x208e24b) move_mount(r2, &(0x7f00000001c0)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00', 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000180)=0x1) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0xc6, 0x4, 0x379ea9a3}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r2, 0x0, 0x100000305) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="409289d0707c252d4168afa40d8b9ba7dc3f00000000"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000440)={0x208, 0x5, 0x7fc, @local, 'xfrm0\x00'}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="488019d9d4d9b12801bc11807d2100955d4a6e96ad923f5deb56e5d81a91296a2a0819d768332600"/54, @ANYRES16=r5, @ANYBLOB="00022abd7000fbdbdf250500000008000300070000000800030008000000040001801400018008000300ac1414bb0800030000000000080002000600000004000180"], 0x48}}, 0x4000005) 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xd000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:05 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:05 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3038.587360][T13785] __nla_validate_parse: 12 callbacks suppressed [ 3038.587371][T13785] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.614942][T13785] device ipvlan273 entered promiscuous mode [ 3038.622447][T13785] 8021q: adding VLAN 0 to HW filter on device ipvlan273 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3038.662340][T13794] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.678223][T13794] device ipvlan274 entered promiscuous mode [ 3038.692187][T13794] 8021q: adding VLAN 0 to HW filter on device ipvlan274 [ 3038.731451][T13803] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.746798][T13803] device ipvlan275 entered promiscuous mode [ 3038.758092][T13803] 8021q: adding VLAN 0 to HW filter on device ipvlan275 [ 3038.771259][T13806] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xf000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3038.789336][T13806] device ipvlan276 entered promiscuous mode [ 3038.800025][T13806] 8021q: adding VLAN 0 to HW filter on device ipvlan276 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3038.840074][T13810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.853303][T13810] device ipvlan277 entered promiscuous mode [ 3038.863908][ T17] usb 6-1: new full-speed USB device number 35 using dummy_hcd [ 3038.872331][T13810] 8021q: adding VLAN 0 to HW filter on device ipvlan277 [ 3038.918147][T13816] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.930867][T13816] device ipvlan278 entered promiscuous mode [ 3038.943602][T13816] 8021q: adding VLAN 0 to HW filter on device ipvlan278 17:17:05 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x10020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3038.959798][T13819] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3038.972455][T13819] device ipvlan279 entered promiscuous mode [ 3038.983258][T13819] 8021q: adding VLAN 0 to HW filter on device ipvlan279 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x11000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3039.033419][T13826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3039.047808][T13826] device ipvlan280 entered promiscuous mode [ 3039.056045][T13826] 8021q: adding VLAN 0 to HW filter on device ipvlan280 [ 3039.064370][ T17] usb 6-1: device descriptor read/64, error 18 [ 3039.103019][T13832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3039.120449][T13832] device ipvlan281 entered promiscuous mode [ 3039.128715][T13832] 8021q: adding VLAN 0 to HW filter on device ipvlan281 17:17:05 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x12000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3039.146973][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3039.159365][T13835] device ipvlan282 entered promiscuous mode [ 3039.171688][T13835] 8021q: adding VLAN 0 to HW filter on device ipvlan282 [ 3039.216105][T13840] device ipvlan283 entered promiscuous mode [ 3039.224743][T13840] 8021q: adding VLAN 0 to HW filter on device ipvlan283 [ 3039.243454][T13843] device ipvlan284 entered promiscuous mode [ 3039.251306][T13843] 8021q: adding VLAN 0 to HW filter on device ipvlan284 [ 3039.333825][ T17] usb 6-1: new full-speed USB device number 36 using dummy_hcd [ 3039.523821][ T17] usb 6-1: device descriptor read/64, error 18 [ 3039.643846][ T17] usb usb6-port1: attempt power cycle [ 3040.353788][ T17] usb 6-1: new full-speed USB device number 37 using dummy_hcd [ 3040.534719][ T17] usb 6-1: device descriptor read/8, error -61 [ 3040.803751][ T17] usb 6-1: new full-speed USB device number 38 using dummy_hcd [ 3040.974622][ T17] usb 6-1: device descriptor read/8, error -61 [ 3041.093764][ T17] usb usb6-port1: unable to enumerate USB device 17:17:08 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:08 executing program 5: syz_usb_connect(0x1, 0x2d, &(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], 0x0) 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1c000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:08 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3041.621634][T13851] device ipvlan285 entered promiscuous mode [ 3041.632146][T13851] 8021q: adding VLAN 0 to HW filter on device ipvlan285 17:17:08 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1c020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3041.672633][T13860] device ipvlan286 entered promiscuous mode [ 3041.691718][T13860] 8021q: adding VLAN 0 to HW filter on device ipvlan286 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1e020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3041.740160][T13870] device ipvlan287 entered promiscuous mode [ 3041.748143][T13870] 8021q: adding VLAN 0 to HW filter on device ipvlan287 [ 3041.799624][T13876] device ipvlan288 entered promiscuous mode [ 3041.811258][T13876] 8021q: adding VLAN 0 to HW filter on device ipvlan288 [ 3041.833055][T13879] device ipvlan289 entered promiscuous mode 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x20000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3041.844874][T13879] 8021q: adding VLAN 0 to HW filter on device ipvlan289 [ 3041.888534][T13883] device ipvlan290 entered promiscuous mode [ 3041.896706][T13883] 8021q: adding VLAN 0 to HW filter on device ipvlan290 [ 3041.915398][T13886] device ipvlan291 entered promiscuous mode [ 3041.923558][T13886] 8021q: adding VLAN 0 to HW filter on device ipvlan291 17:17:08 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x24020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3042.033477][T13890] device ipvlan292 entered promiscuous mode [ 3042.042542][T13890] 8021q: adding VLAN 0 to HW filter on device ipvlan292 [ 3042.053760][ T17] usb 6-1: new low-speed USB device number 39 using dummy_hcd [ 3042.070623][T13896] device ipvlan293 entered promiscuous mode 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x25000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3042.079101][T13896] 8021q: adding VLAN 0 to HW filter on device ipvlan293 17:17:08 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2e000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3042.121268][T13900] device ipvlan294 entered promiscuous mode [ 3042.129922][T13900] 8021q: adding VLAN 0 to HW filter on device ipvlan294 [ 3042.177244][T13906] device ipvlan295 entered promiscuous mode [ 3042.185631][T13906] 8021q: adding VLAN 0 to HW filter on device ipvlan295 [ 3042.207113][T13909] device ipvlan296 entered promiscuous mode [ 3042.215455][T13909] 8021q: adding VLAN 0 to HW filter on device ipvlan296 [ 3042.253660][ T17] usb 6-1: device descriptor read/64, error 18 [ 3042.523626][ T17] usb 6-1: new low-speed USB device number 40 using dummy_hcd [ 3042.713579][ T17] usb 6-1: device descriptor read/64, error 18 [ 3042.833611][ T17] usb usb6-port1: attempt power cycle [ 3043.543545][ T17] usb 6-1: new low-speed USB device number 41 using dummy_hcd [ 3043.714150][ T17] usb 6-1: device descriptor read/8, error -61 [ 3043.983512][ T17] usb 6-1: new low-speed USB device number 42 using dummy_hcd [ 3044.163793][ T17] usb 6-1: device descriptor read/8, error -61 [ 3044.283932][ T17] usb usb6-port1: unable to enumerate USB device 17:17:11 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x2f000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:11 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r0 = syz_usb_connect$uac1(0x6, 0xa8, &(0x7f00000009c0)=ANY=[@ANYBLOB="12010002000000406b1d01014000010203010902960003010500070904000000010100000a2401020001020102092408030000ff5547082408050001ff590904010000010200000904010101010200000f240201030b20ff1ccac89e4b365e0905010900042009ff072501027f0600090402000001020000090402e500010200000d240202020000f068ac6896c70a240202050005006ef909058209100088c601072501020405006be991fa844e55963c41e056c3e69893cec9b266259c1e74308ceec8129be490a0a5448f657da5b95a6bf38e885c6b705b175a075a22c03959a40250f3d9b7264e3e8bc5dff956abe2f948c77a1e00b40c87d714f95b"], &(0x7f0000000100)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x201, 0x2, 0x81, 0x0, 0x40, 0x7}, 0x183, &(0x7f0000000180)={0x5, 0xf, 0x183, 0x4, [@ssp_cap={0x24, 0x10, 0xa, 0x0, 0x6, 0x4, 0xf000, 0x3, [0x3f3f, 0xc0ff, 0x3f00, 0xc0, 0xc0f0, 0x6f]}, @ssp_cap={0x24, 0x10, 0xa, 0x5c, 0x6, 0x5, 0xf000, 0x8, [0x3f18, 0x1fe00, 0x3f00, 0xc0f0, 0xc0c0, 0x3f30]}, @generic={0x83, 0x10, 0x1, "0b4196cf3ca9f7236530c3848d7a6b9eec96a0ebd1e43f382cbea2743cde7e7ad5b1d56aea61ce7a62c7b05c04bd5ddb04646968f24eb0194d50f38dd088345ecfc5830f82ad31879591d283fab0ad74fafec0940996c84f97bf2eeacd9f911d85e4018711d61c6debaabd971ed89896562b6b3190fac064f0ca92f7c1309ea2"}, @generic={0xb3, 0x10, 0x1, "af5fcc760c3178a8bf3431750f3f48604b72bb8238c7d4dbf01172d4b9c8f955b273265b0b4462603ed83d05f225118b6e73a06660f237df1991f5d4861dd5d74cd5f38d462e9426983f7fb38d18918639e0c04532177ebffd7d41d2a02a7bca5a9ca308a43d9ff734ebacd552e732c3c3f57984e38339bcc7df8b2e584aa07e2e8bc542da2a323ba130a5e45c4d060fab812db05b43368a1f67243509b5eae7c907871b2c2fb2536d452920b2878b48"}]}, 0x3, [{0x8f, &(0x7f00000003c0)=@string={0x8f, 0x3, "08491d1fa8fc325aa05837e9f211b67b375bbfa217245e1c5becee1420db4db2e056a2d5ef847b40d1e97ef24ed9784cab1a5aadfb78f6efb5f9e88cf54f703ebb1b7691071da35d9a63282853cb9d3d82f3265b966850c585b2975b9c119190a1b1bb96ce7eceb5ce13ef59c0c048f9099fe3b2042e4665219ff7396c9a18063c64fb252f725f7a1e9b16e2bc"}}, {0x53, &(0x7f0000000480)=@string={0x53, 0x3, "24b1857074b3077cc6eea2ed6cb87220ea4831279f5c3bab77385ffc060b8f4813b36efe350536be7156ecbc3a62e0732607eec954e6718cee5698aa897adfd045fd83c2c9120c4cbfe473a56249b2bf1e"}}, {0x8d, &(0x7f0000000500)=@string={0x8d, 0x3, "91f55b729990b22ca492e225b40760da964b4ba3c4ed0b5cb7c95856d15a1a5b732841309531841cb92cf4439d567154cd553fc01db298ae56b851cdec43c0c068bb79fea720678ab7f6c680cb3018e5dac46a17c098e9fa0ccd19c07fdffafa6b5377e8b41bb62353d19c52b9aa6a1815824d1b4369df8bf2625df9b4906eff8ad95533afcafb5e2f32ce"}}]}) syz_usb_connect(0x4, 0x9bf, &(0x7f0000000ac0)={{0x12, 0x1, 0x54f2ccee01098e74, 0x79, 0x4e, 0x22, 0x40, 0x18ec, 0x3188, 0x582c, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x9ad, 0x2, 0xa3, 0x1f, 0x20, 0x1f, [{{0x9, 0x4, 0x2a, 0x7, 0xe, 0xe, 0x1, 0x0, 0x0, [@hid_hid={0x9, 0x21, 0x1, 0x4, 0x1, {0x22, 0x4f2}}], [{{0x9, 0x5, 0x4, 0x8, 0x40, 0x48, 0x6, 0x20, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xdd, 0x1}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x4, 0x2}]}}, {{0x9, 0x5, 0xc, 0x0, 0x400, 0x3, 0x40}}, {{0x9, 0x5, 0xa, 0x0, 0x3ff, 0x21, 0x22, 0x1f, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x3, 0x1}]}}, {{0x9, 0x5, 0xf, 0x0, 0x20, 0x1, 0x7, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0xff, 0x2}]}}, {{0x9, 0x5, 0xa, 0xc, 0x40, 0x1, 0x37, 0x9}}, {{0x9, 0x5, 0xe, 0x0, 0x200, 0x1, 0x21, 0x9}}, {{0x9, 0x5, 0xd, 0x0, 0x20, 0x5, 0x6, 0xff}}, {{0x9, 0x5, 0x2, 0x8, 0x20, 0x81, 0x87, 0x63}}, {{0x9, 0x5, 0xd, 0x10, 0x200, 0x7, 0x7f, 0x86, [@generic={0xd4, 0x7, "3a213e70a8e497bdec838062354e27285cef146c667113066a16f924c81aaf9583ce18f61047e055b3e049da93e881909ea0a09e748fcc59b7ee29ebb647cb41443b0a625cccad79f7c3677e42fba1fb0b2eeda791132d302220de5f9bbbd5ebffa6797443fe6c54a9a97427051c11813d5aa77ee5255a2d011ffe48a33a8a4d453ee458a03b87908f0a5d62018aa383181b069d32419e6e85fa9bc214fc9dfefa6a4630e1ae5225d714de0594be21c6063db9727470bf3a401231002346febe65289b87e48870e33197e674693c0345d72e"}, @generic={0x2c, 0x1, "ef0c4e19187561389885667a9e689539b0e2e7252d1e4f44440f59acf715a14ae254568a06dabba684e0"}]}}, {{0x9, 0x5, 0x9, 0x3, 0x40, 0x81, 0xd0, 0x4}}, {{0x9, 0x5, 0x2, 0x0, 0x40, 0x1, 0x4, 0x40, [@generic={0x13, 0x4, "bb04b09b45b37f006de27faaabb93b2e05"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x7, 0x7}]}}, {{0x9, 0x5, 0xd, 0x0, 0x40, 0x8, 0x80, 0xc8, [@uac_iso={0x7}]}}, {{0x9, 0x5, 0x0, 0x0, 0x400, 0xe, 0x8, 0x57, [@generic={0x8e, 0x5, "2b9a3e6113f7236e4915a2d95305bc506ae0b51bcb8825409c41fb01b30efb18e791e7ba15be992b539a68b1e7266aec66f8fd22880969776987c0d24ce703e64f190c6e7035c157ceabb36e3a385dadbbbb7f9d7e538d9fc355634039a46f88b0cf14e19f1040397252bcccd601529e5ddcd9276d32162cdfa55a2d31bb77182827871c06d4e67df4785238"}, @generic={0xd0, 0x6, "e96ddcdbef814fe61bbfc0a545fffda652eb01879f648fe7e2975e67f2bf90e830711e8728194e2fc27e2caba585533e3749ea82210c4810e420c35f5af966f33631c914129756a14869f3e09a9addb46eb39190f5615a95d9982eea4b07cbfc55ef3e94d3c50e2e4c0080357271f25f5069dbd732be9c4911e1fa20ae89fd40ecb77b3c8a4fb3d51af274424b05a2c918688620abe372ddb00634d32dc5977c7837859f680c0ddc21a761abfe98f9216886c8cea0040fa55bbdca347d358d76ab737b98852a3bcafa99335684aa"}]}}, {{0x9, 0x5, 0x6, 0x0, 0x8, 0x1, 0x40, 0x14, [@generic={0xe1, 0x3, "6386fd88e012066f53ba5972d962498467cc40a8af06d194ad52480024ef824559ceb294c0ff7496e8ad1888ec236b83d88b4c1cd92b557aece2fd2d3dbb50346550f8a9dc0426a9ad1d68577a1b2564b1cdb540b2f97f630b94aba7b53236f79142015b8398f9b978d219207184dd29cbfc119e8da9a5a0a04eba8a3f77b7458ef8c0023fb7dc9df9626f088e4fddbce7d60f9479798b095fc48d0df59b25eb9a84ee98d96d30c064b7816ea9b76f06febe9eb7f0a7c77724ff7439d0b0a330b233b43055fad454baadd8affa7aa21249da690eec60f6cfbb97a16ecee2c4"}]}}]}}, {{0x9, 0x4, 0xe1, 0x16, 0x10, 0xb0, 0x82, 0x6, 0x81, [], [{{0x9, 0x5, 0xf, 0x0, 0x3ff, 0x1, 0x6, 0x1, [@generic={0x72, 0xb, "c12a8f333031f438d60678065dc28d144bd19c8ec4b2d7a99908570449b043aac94d29c82595bd40a4624d6f7889325413502f44699bf68e9282b320f42c4e31ca233d3ef80f9db6ea72b92d6c54bbc9f17d18839122b847785ec11b29ddf8b71f240422f92341b9b2dfa9fdf49b6430"}]}}, {{0x9, 0x5, 0xf, 0x0, 0x10, 0x2, 0x1, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x1, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x7, 0xaf}]}}, {{0x9, 0x5, 0x8, 0x27b76cb0b713062b, 0x3ff, 0x9, 0x5, 0x5}}, {{0x9, 0x5, 0xa, 0x0, 0x11144261d8ad29ab, 0x6, 0x88, 0x7, [@generic={0xce, 0xb, "cb3f02e98c7c69389290afc14498aef26c9e0accb65b2f03d0a0ab5de26c55e20268657c9c0eb27355e064090a11f5a6d01a5857a34d1e561c30636262ca6384c4c43d163cff7d8b1b62c627637f088a3cfca0877c7769f69221c0fe01020e11f1a20805d67c87f90d1ec090c0c6a6d0a711288d7dfccd05cfb9d4536f88472eb5bce8fafb04208c66964255940b7e5a8f14d4187522b7ba386d28d73bdf191bfab0f10d013ffe439851f08573809db83a97badd6379ce723224e08b7b931dfdac94db2ea91260ffe3bf6c8d"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x10, 0x3, 0x2b, 0x40, [@generic={0x101, 0x9, "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"}, @generic={0x29, 0x4, "a821b2f64058b3809072c0611e64169f774ed92fa345640d06d6c8344caff343a0a36b57b8298e"}]}}, {{0x9, 0x5, 0xe, 0x1, 0x400, 0x80, 0x81, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x84, 0x6, 0x45}]}}, {{0x9, 0x5, 0xe, 0x10, 0x10, 0x1, 0x0, 0x3}}, {{0x9, 0x5, 0x5, 0x8, 0x10, 0x1, 0x80, 0x4, [@generic={0x42, 0x2, "60b7a19428e847605b9b0f63826e15b20605adefefab50129e3754895b1f229f4b3565db7fa117c1383c8318904d42c47bc5443b9325fb46d3e5ea0edaec22fb"}]}}, {{0x9, 0x5, 0x5, 0x8, 0x10, 0x0, 0x7f, 0x81, [@generic={0x9b, 0x0, "a2bbef09ee84e0ca7cdcb898a72676de10ed184a5024daecd748c457d955c2c04310a1e1047246adafd7020d3095be61e0b24d92ac26fc3e688ea8e2e4a16e69b6052c9b593ef67c2d72762d8e395947c991989a63df491b8f8978112e9832ca703a236c8320862fa63f2142a47118b7f10bbd1565c41187ad4e47d1c5fa6df04432ea53f4b7c28c6a8ba49a648a7d22cb302f89dda97334d0"}]}}, {{0x9, 0x5, 0x9, 0x0, 0x8, 0x2, 0x7f, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x81, 0x7}]}}, {{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x8, 0x14, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x6}]}}, {{0x9, 0x5, 0x6, 0x8, 0x20, 0x29, 0xfa, 0x2, [@generic={0xaa, 0x8, "39311eb4cc972681903466255115a0cd4aaa286f41069af479ddd3c901de5c6d66fc5b03af15c8ede8add71faf5ca24fc9eb95feba8931560de579fe2730a8cfe6af3d25773ae3d6932923ce910dc8590459fb81445fbb07d75241d2dd97d87711eca0d0d0797246e38d9a5d9aa778f14f557d6b6f79cacb9ed2d1eb5769a3ec7c3142d7949f0aa9a4245a50f89d33b1460c4ff2f893ada59a0d312089026e441180949903b0032a"}, @generic={0x3d, 0x30, "c60748805b3a819ea6c39deeeaa1dfb190beaf357cf6c7a1ac2f2ba6d3e71ec8d73ea2c0ef8b114e49f154b8e3b68327477ee4af9edf387c2ddc2e"}]}}, {{0x9, 0x5, 0xe, 0x10, 0x400, 0x0, 0xb3, 0x7}}, {{0x9, 0x5, 0xd, 0x3, 0x3ff, 0x9, 0x8, 0x8}}, {{0x9, 0x5, 0xc, 0x0, 0x3ff, 0x1, 0x0, 0x20}}, {{0x9, 0x5, 0x7, 0x0, 0x20, 0xbe, 0x7, 0x6, [@generic={0xae, 0x21, "d66e1ca87f5eb1a7049220a77a58165ee67d7f517454132258be7b5ac584fb7b79aad80872ad83733f550d6ecf88d66f3854c11181d7325db397c12ecb4ba9eb980e881c25b6c9a663ebfa3d91b095a11ac8a9f0256c7cbc0844163d0b762bcb5a080889c86f6bbd0bdf2fd4c905847672c1e6816b3c10b9a9c99e174d52b5e715f4bfcb888f58ac7c666a28544875c748727086f6c7c5cd0dcdf59a3e36235a15d16e7c21f83d5ffd1196c0"}]}}]}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x110, 0x3f, 0x6, 0x7f, 0x8, 0x2}, 0x2d, &(0x7f0000000040)={0x5, 0xf, 0x2d, 0x2, [@ss_container_id={0x14, 0x10, 0x4, 0xff, "08b95f5af2589c32875cb9df3dee3ccd"}, @ss_container_id={0x14, 0x10, 0x4, 0x20, "f78901b51675a6d0d560a1b04e6e448b"}]}, 0x1, [{0x17, &(0x7f0000000080)=@string={0x17, 0x3, "215d317ba8e2ef8e0e77b4190dfc466d3a222c33d2"}}]}) syz_usb_control_io$uac1(r0, &(0x7f00000006c0)={0x14, &(0x7f00000005c0)={0x40, 0x1, 0x2b, {0x2b, 0x21, "4e4ade3cf0553caec64188ac9487e8a8e3e5b7e583f34fdc12615e70a57f46fbda5aa4fb5824340029"}}, &(0x7f0000000600)={0x0, 0x3, 0x88, @string={0x88, 0x3, "f1a8528cab04272a484ae0c98c239a5517523f99e39ddb0447643a2b8c37d0a874f7de3c0275572a9ed3f9c434ea9461317f1ccf427690880dbfb60e3c98576a4489161160ddb3c2c90e0f983d72eee0f08620365c8873a613a670bc5a735f47ec689673423acda1d464ea414b63f4f18c4271341079ca7652a242052f3c93ba694934c6f451"}}}, &(0x7f0000000940)={0x44, &(0x7f0000000700)={0x0, 0x8, 0x46, "1737df28db2c540cacafd1a62d6c9f8b2c5cf4d0cec834706f3c2f63452c3ed2b900cea414ea405cc3d326fda474aada4c29ef7548fccf41e36967f9cce90c8dbeaccbe58d03"}, &(0x7f0000000780)={0x0, 0xa, 0x1, 0x5}, &(0x7f00000007c0)={0x0, 0x8, 0x1, 0x5}, &(0x7f0000000800)={0x20, 0x81, 0x3, "468db6"}, &(0x7f0000000840)={0x20, 0x82, 0x3, "d3cb61"}, &(0x7f0000000880)={0x20, 0x83, 0x1, "be"}, &(0x7f00000008c0)={0x20, 0x84, 0x2, "903f"}, &(0x7f0000000900)={0x20, 0x85, 0x3, "12563b"}}) 17:17:11 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3044.646208][T13915] __nla_validate_parse: 14 callbacks suppressed [ 3044.646222][T13915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3044.673902][T13915] device ipvlan297 entered promiscuous mode [ 3044.682375][T13915] 8021q: adding VLAN 0 to HW filter on device ipvlan297 17:17:11 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x36020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3044.705026][T13925] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3044.719286][T13925] device ipvlan298 entered promiscuous mode [ 3044.730936][T13925] 8021q: adding VLAN 0 to HW filter on device ipvlan298 17:17:11 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3044.774675][T13935] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3044.789460][T13935] device ipvlan299 entered promiscuous mode [ 3044.798834][T13935] 8021q: adding VLAN 0 to HW filter on device ipvlan299 [ 3044.812680][T13941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3a000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3044.827857][T13941] device ipvlan300 entered promiscuous mode [ 3044.837349][T13941] 8021q: adding VLAN 0 to HW filter on device ipvlan300 [ 3044.877768][T13945] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3044.891410][T13945] device ipvlan301 entered promiscuous mode [ 3044.904975][T13945] 8021q: adding VLAN 0 to HW filter on device ipvlan301 [ 3044.921382][T13948] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3044.937163][T13948] device ipvlan302 entered promiscuous mode [ 3044.948208][T13948] 8021q: adding VLAN 0 to HW filter on device ipvlan302 17:17:11 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3045.050254][T13952] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3045.067186][T13952] device ipvlan303 entered promiscuous mode [ 3045.078338][T13952] 8021q: adding VLAN 0 to HW filter on device ipvlan303 [ 3045.085436][ T17] usb 6-1: new high-speed USB device number 43 using dummy_hcd 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3045.105352][T13959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3045.118677][T13959] device ipvlan304 entered promiscuous mode [ 3045.131806][T13959] 8021q: adding VLAN 0 to HW filter on device ipvlan304 [ 3045.171635][T13963] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3045.188188][T13963] device ipvlan305 entered promiscuous mode [ 3045.195906][T13963] 8021q: adding VLAN 0 to HW filter on device ipvlan305 [ 3045.212181][T13966] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:11 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x40020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3045.225183][T13966] device ipvlan306 entered promiscuous mode [ 3045.233631][T13966] 8021q: adding VLAN 0 to HW filter on device ipvlan306 [ 3045.276298][T13970] device ipvlan307 entered promiscuous mode [ 3045.285125][T13970] 8021q: adding VLAN 0 to HW filter on device ipvlan307 [ 3045.303719][T13974] device ipvlan308 entered promiscuous mode [ 3045.312320][T13974] 8021q: adding VLAN 0 to HW filter on device ipvlan308 [ 3045.324106][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3045.445318][ T17] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3045.454253][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3045.471056][ T17] usb 6-1: config 0 has no interface number 0 [ 3045.480359][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3045.492744][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3045.507044][ T17] usb 6-1: config 0 descriptor?? [ 3045.545759][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3045.763391][ T17] snd_usb_pod 6-1:0.1: set_interface failed [ 3045.769557][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3045.783372][ T17] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3045.792087][ T17] usb 6-1: USB disconnect, device number 43 [ 3046.513387][ T17] usb 6-1: new high-speed USB device number 44 using dummy_hcd [ 3046.753319][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3046.873317][ T17] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3046.881700][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3046.897583][ T17] usb 6-1: config 0 has no interface number 0 [ 3046.906153][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3046.917924][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3046.929791][ T17] usb 6-1: config 0 descriptor?? [ 3046.977489][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3047.183315][ T17] snd_usb_pod 6-1:0.1: set_interface failed [ 3047.191013][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3047.210834][ T17] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3047.220842][ T17] usb 6-1: USB disconnect, device number 44 17:17:14 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x42020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:14 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090001"], 0x0) 17:17:14 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3047.678306][T14007] device ipvlan309 entered promiscuous mode [ 3047.686986][T14007] 8021q: adding VLAN 0 to HW filter on device ipvlan309 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x44030000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3047.720816][T14014] device ipvlan310 entered promiscuous mode [ 3047.735726][T14014] 8021q: adding VLAN 0 to HW filter on device ipvlan310 17:17:14 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3047.780134][T14021] device ipvlan311 entered promiscuous mode [ 3047.800810][T14021] 8021q: adding VLAN 0 to HW filter on device ipvlan311 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x48000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3047.828818][T14025] device ipvlan312 entered promiscuous mode [ 3047.837371][T14025] 8021q: adding VLAN 0 to HW filter on device ipvlan312 [ 3047.881022][T14031] device ipvlan313 entered promiscuous mode [ 3047.889377][T14031] 8021q: adding VLAN 0 to HW filter on device ipvlan313 [ 3047.911206][T14034] device ipvlan314 entered promiscuous mode [ 3047.919296][T14034] 8021q: adding VLAN 0 to HW filter on device ipvlan314 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4a000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3047.933283][ T17] usb 6-1: new high-speed USB device number 45 using dummy_hcd [ 3047.962941][T14038] device ipvlan315 entered promiscuous mode [ 3047.971232][T14038] 8021q: adding VLAN 0 to HW filter on device ipvlan315 [ 3047.994262][T14041] device ipvlan316 entered promiscuous mode [ 3048.002708][T14041] 8021q: adding VLAN 0 to HW filter on device ipvlan316 17:17:14 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3048.079503][T14046] device ipvlan317 entered promiscuous mode [ 3048.087766][T14046] 8021q: adding VLAN 0 to HW filter on device ipvlan317 [ 3048.106374][T14051] device ipvlan318 entered promiscuous mode [ 3048.116236][T14051] 8021q: adding VLAN 0 to HW filter on device ipvlan318 17:17:14 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x62010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3048.165341][T14055] device ipvlan319 entered promiscuous mode [ 3048.176299][T14055] 8021q: adding VLAN 0 to HW filter on device ipvlan319 [ 3048.183422][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3048.230277][T14061] device ipvlan320 entered promiscuous mode [ 3048.238326][T14061] 8021q: adding VLAN 0 to HW filter on device ipvlan320 [ 3048.260796][T14064] device ipvlan321 entered promiscuous mode [ 3048.268694][T14064] 8021q: adding VLAN 0 to HW filter on device ipvlan321 [ 3048.303250][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3048.313964][ T17] usb 6-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 3048.323215][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3048.332330][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3048.344570][ T17] usb 6-1: config 0 descriptor?? [ 3048.585054][ T8069] usb 6-1: USB disconnect, device number 45 [ 3049.353150][ T17] usb 6-1: new high-speed USB device number 46 using dummy_hcd [ 3049.593102][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3049.713469][ T17] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3049.723752][ T17] usb 6-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 3049.733002][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3049.749614][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3049.761059][ T17] usb 6-1: config 0 descriptor?? [ 3050.013188][T10001] usb 6-1: USB disconnect, device number 46 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x654268b4, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:17 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x890) 17:17:17 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:17 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3050.699317][T14089] __nla_validate_parse: 15 callbacks suppressed [ 3050.699369][T14089] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3050.719506][T14089] device ipvlan322 entered promiscuous mode [ 3050.730966][T14089] 8021q: adding VLAN 0 to HW filter on device ipvlan322 17:17:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x68000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3050.780635][T14103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3050.797598][T14103] device ipvlan323 entered promiscuous mode [ 3050.806046][T14103] 8021q: adding VLAN 0 to HW filter on device ipvlan323 17:17:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3050.880573][T14112] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3050.897675][T14112] device ipvlan324 entered promiscuous mode [ 3050.905702][T14112] 8021q: adding VLAN 0 to HW filter on device ipvlan324 [ 3050.924578][T14119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3050.937178][T14119] device ipvlan325 entered promiscuous mode [ 3050.950009][T14119] 8021q: adding VLAN 0 to HW filter on device ipvlan325 [ 3050.983074][ T8806] usb 6-1: new high-speed USB device number 47 using dummy_hcd 17:17:17 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6b010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3051.095842][T14126] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.108783][T14126] device ipvlan326 entered promiscuous mode [ 3051.118231][T14126] 8021q: adding VLAN 0 to HW filter on device ipvlan326 [ 3051.132709][T14129] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x6c000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3051.148636][T14129] device ipvlan327 entered promiscuous mode [ 3051.159182][T14129] 8021q: adding VLAN 0 to HW filter on device ipvlan327 [ 3051.199751][T14133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.215905][T14133] device ipvlan328 entered promiscuous mode [ 3051.229597][T14133] 8021q: adding VLAN 0 to HW filter on device ipvlan328 [ 3051.243128][ T8806] usb 6-1: Using ep0 maxpacket: 32 17:17:17 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x74000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3051.251833][T14137] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.267397][T14137] device ipvlan329 entered promiscuous mode [ 3051.276076][T14137] 8021q: adding VLAN 0 to HW filter on device ipvlan329 [ 3051.312067][T14141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.328240][T14141] device ipvlan330 entered promiscuous mode [ 3051.336606][T14141] 8021q: adding VLAN 0 to HW filter on device ipvlan330 17:17:18 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x74010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3051.356629][T14145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.369662][T14145] device ipvlan331 entered promiscuous mode [ 3051.383400][T14145] 8021q: adding VLAN 0 to HW filter on device ipvlan331 [ 3051.413059][ T8806] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3051.421290][ T8806] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3051.437392][ T8806] usb 6-1: config 0 has no interface number 0 [ 3051.446063][ T8806] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3051.457892][ T8806] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3051.461444][T14150] device ipvlan332 entered promiscuous mode [ 3051.474848][ T8806] usb 6-1: config 0 descriptor?? [ 3051.477140][T14150] 8021q: adding VLAN 0 to HW filter on device ipvlan332 [ 3051.525318][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3051.733565][ T8806] snd_usb_pod 6-1:0.1: set_interface failed [ 3051.739499][ T8806] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3051.758806][ T8806] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3051.767927][ T8806] usb 6-1: USB disconnect, device number 47 [ 3052.492941][ T8276] usb 6-1: new high-speed USB device number 48 using dummy_hcd [ 3052.732888][ T8276] usb 6-1: Using ep0 maxpacket: 32 [ 3052.853463][ T8276] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3052.862164][ T8276] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3052.877953][ T8276] usb 6-1: config 0 has no interface number 0 [ 3052.886742][ T8276] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3052.899126][ T8276] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3052.911652][ T8276] usb 6-1: config 0 descriptor?? [ 3052.956751][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3053.162842][ T8276] snd_usb_pod 6-1:0.1: set_interface failed [ 3053.169390][ T8276] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3053.182428][ T8276] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3053.190498][ T8276] usb 6-1: USB disconnect, device number 48 17:17:20 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {0x0}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x7a000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:20 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:20 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100f7ffffff0401", @ANYRES32, @ANYRESDEC, @ANYRES16], 0x0) 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3053.713411][T14181] device ipvlan333 entered promiscuous mode [ 3053.722329][T14181] 8021q: adding VLAN 0 to HW filter on device ipvlan333 [ 3053.743834][T14188] device ipvlan334 entered promiscuous mode [ 3053.752337][T14188] 8021q: adding VLAN 0 to HW filter on device ipvlan334 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81ffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3053.810241][T14199] device ipvlan335 entered promiscuous mode [ 3053.818434][T14199] 8021q: adding VLAN 0 to HW filter on device ipvlan335 17:17:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3053.867305][T14206] device ipvlan336 entered promiscuous mode [ 3053.877888][T14206] 8021q: adding VLAN 0 to HW filter on device ipvlan336 [ 3053.904432][T14209] device ipvlan337 entered promiscuous mode [ 3053.915579][T14209] 8021q: adding VLAN 0 to HW filter on device ipvlan337 17:17:20 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88470000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3054.052785][ T8806] usb 6-1: new high-speed USB device number 49 using dummy_hcd 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88480000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3054.118490][T14217] device ipvlan338 entered promiscuous mode [ 3054.126942][T14217] 8021q: adding VLAN 0 to HW filter on device ipvlan338 [ 3054.146464][T14222] device ipvlan339 entered promiscuous mode [ 3054.157047][T14222] 8021q: adding VLAN 0 to HW filter on device ipvlan339 17:17:20 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3054.200025][T14226] device ipvlan340 entered promiscuous mode [ 3054.208598][T14226] 8021q: adding VLAN 0 to HW filter on device ipvlan340 [ 3054.230925][T14229] device ipvlan341 entered promiscuous mode [ 3054.239193][T14229] 8021q: adding VLAN 0 to HW filter on device ipvlan341 [ 3054.281861][T14234] device ipvlan342 entered promiscuous mode [ 3054.290191][T14234] 8021q: adding VLAN 0 to HW filter on device ipvlan342 [ 3054.312207][T14237] device ipvlan343 entered promiscuous mode 17:17:21 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8a030000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3054.325427][T14237] 8021q: adding VLAN 0 to HW filter on device ipvlan343 [ 3054.325661][ T8806] usb 6-1: Using ep0 maxpacket: 32 [ 3054.368532][T14242] device ipvlan344 entered promiscuous mode [ 3054.377849][T14242] 8021q: adding VLAN 0 to HW filter on device ipvlan344 [ 3054.402171][T14245] device ipvlan345 entered promiscuous mode [ 3054.410342][T14245] 8021q: adding VLAN 0 to HW filter on device ipvlan345 [ 3054.453197][ T8806] usb 6-1: config 0 has an invalid descriptor of length 255, skipping remainder of the config [ 3054.464001][ T8806] usb 6-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 3054.478890][ T8806] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3054.492767][ T8806] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3054.510074][ T8806] usb 6-1: rejected 1 configuration due to insufficient available bus power [ 3054.519887][ T8806] usb 6-1: no configuration chosen from 1 choice 17:17:23 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8c020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:23 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:23 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000414b5320410e5150ddac0000000109021b000100000000090401d0cca28b8a9163060764b6f30718c9acf54876f9e751182ea929b7ae9172e6401148164977d9483ce49fc0bac60ce416d77440fcb4e214a58c1011b8bb7a3fd0aaef0cc2227944cf1f23df0bf51ec4097b8491a40ec6ca8f3c"], 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c001a694", @ANYRES16=0x0, @ANYBLOB="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"], 0x1c0}, 0x1, 0x0, 0x0, 0x4000000}, 0xa1bfb38411ceea08) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x480040, 0x0) mq_notify(r0, &(0x7f0000000440)={0x0, 0x25, 0x1, @thr={&(0x7f0000000340)="53f94be17c8553c18dde6b56c1df0f4b40b461854d0e2d7abd6ba7f3fa076cc69a4e319002cec4d3c8e6605f0ff866c2666a70c0e717da70c2aba3216d4c287bd59b90632e666089c515acc63e92d8f9df3aeb1e", &(0x7f00000003c0)="cf617f21dc530819d8e5e16bee0247b8c82a4bd1c0a4223590d649fd41a8e69a8e881925ec33b5de92bb0fd00e875c20576fa2565fdf0695f5fb3b2fc988902037ba26dff995efdade46dd"}}) [ 3056.780465][T14255] __nla_validate_parse: 14 callbacks suppressed [ 3056.780477][T14255] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3056.806166][T10001] usb 6-1: USB disconnect, device number 49 [ 3056.851727][T14255] device ipvlan346 entered promiscuous mode 17:17:23 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3056.895003][T14255] 8021q: adding VLAN 0 to HW filter on device ipvlan346 17:17:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x92010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3056.964545][T14272] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3056.989586][T14272] device ipvlan347 entered promiscuous mode [ 3057.001575][T14272] 8021q: adding VLAN 0 to HW filter on device ipvlan347 17:17:23 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3057.054973][T14279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.071515][T14279] device ipvlan348 entered promiscuous mode [ 3057.085047][T14279] 8021q: adding VLAN 0 to HW filter on device ipvlan348 [ 3057.138486][T14283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.165504][T14283] device ipvlan349 entered promiscuous mode 17:17:23 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x8, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xcc}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3057.186884][T14283] 8021q: adding VLAN 0 to HW filter on device ipvlan349 17:17:23 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x94020000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3057.244706][T14293] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.256042][T10001] usb 6-1: new high-speed USB device number 50 using dummy_hcd [ 3057.270532][T14293] device ipvlan350 entered promiscuous mode [ 3057.282053][T14293] 8021q: adding VLAN 0 to HW filter on device ipvlan350 17:17:24 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3057.358653][T14299] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.376739][T14299] device ipvlan351 entered promiscuous mode [ 3057.386093][T14299] 8021q: adding VLAN 0 to HW filter on device ipvlan351 17:17:24 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xa85b0000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3057.481548][T14305] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.510696][T14305] device ipvlan352 entered promiscuous mode [ 3057.517286][T10001] usb 6-1: Using ep0 maxpacket: 32 [ 3057.537514][T14305] 8021q: adding VLAN 0 to HW filter on device ipvlan352 17:17:24 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xb4684265, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3057.640641][T14312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3057.668105][T14312] device ipvlan353 entered promiscuous mode [ 3057.682591][T10001] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3057.697128][T10001] usb 6-1: config 0 has an invalid descriptor of length 99, skipping remainder of the config [ 3057.708937][T14312] 8021q: adding VLAN 0 to HW filter on device ipvlan353 [ 3057.732793][T10001] usb 6-1: config 0 has no interface number 0 [ 3057.748789][T10001] usb 6-1: too many endpoints for config 0 interface 1 altsetting 208: 204, using maximum allowed: 30 [ 3057.764359][T10001] usb 6-1: config 0 interface 1 altsetting 208 has 0 endpoint descriptors, different from the interface descriptor's value: 204 [ 3057.781414][T10001] usb 6-1: config 0 interface 1 has no altsetting 0 [ 3057.792270][T10001] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=ac.dd [ 3057.805309][T10001] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3057.818958][T10001] usb 6-1: config 0 descriptor?? [ 3058.112541][T10001] usb 6-1: string descriptor 0 read error: -71 [ 3058.121267][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3058.136143][T10001] usb 6-1: selecting invalid altsetting 0 [ 3058.143838][T10001] snd_usb_pod 6-1:0.1: set_interface failed [ 3058.149879][T10001] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3058.157623][T10001] snd_usb_pod: probe of 6-1:0.1 failed with error -22 [ 3058.165356][T10001] usb 6-1: USB disconnect, device number 50 [ 3058.842509][ T17] usb 6-1: new high-speed USB device number 51 using dummy_hcd [ 3059.082488][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3059.202473][ T17] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3059.210640][ T17] usb 6-1: config 0 has an invalid descriptor of length 99, skipping remainder of the config [ 3059.226381][ T17] usb 6-1: config 0 has no interface number 0 [ 3059.236360][ T17] usb 6-1: too many endpoints for config 0 interface 1 altsetting 208: 204, using maximum allowed: 30 [ 3059.250315][ T17] usb 6-1: config 0 interface 1 altsetting 208 has 0 endpoint descriptors, different from the interface descriptor's value: 204 [ 3059.266264][ T17] usb 6-1: config 0 interface 1 has no altsetting 0 [ 3059.275767][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=ac.dd [ 3059.287728][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3059.299971][ T17] usb 6-1: config 0 descriptor?? [ 3059.582468][ T17] usb 6-1: string descriptor 0 read error: -71 [ 3059.591391][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3059.611615][ T17] usb 6-1: selecting invalid altsetting 0 [ 3059.620067][ T17] snd_usb_pod 6-1:0.1: set_interface failed [ 3059.627040][ T17] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3059.636563][ T17] snd_usb_pod: probe of 6-1:0.1 failed with error -22 [ 3059.645901][ T17] usb 6-1: USB disconnect, device number 51 17:17:26 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xbc010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3059.748147][T14343] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3059.764358][T14343] device ipvlan354 entered promiscuous mode [ 3059.773899][T14343] 8021q: adding VLAN 0 to HW filter on device ipvlan354 17:17:26 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:26 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d50000000109021b000100000000090401"], 0x0) r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000080)={0x1, 0x1, 0x1000, 0x77, &(0x7f0000000000)="d4f1354c6bc479d6cb9047e9f8f79c09b469588f655d17caf5e6dccf1daa4a6d81122b67a1ea240d63f81e55c2bbb98ef94d525e4f2592e9deb1adb440c8e002f2eb6a855d0ff31e62e789e4e3c605b5a9648809ba9b891167cced58c33fb020472f2c744a9496ce7f93f758bea0c897c4f384705a8d16", 0xd8, 0x0, &(0x7f0000000180)="e8bb0e1589c40b873c07f1bc411cee03d1d4e01a90f17ad6ecde0c3819ccaf1f13206be338449a2efd2916759f7cbeb291bf66cc6d9db2d8099de84d4456629480fb1dfc23adcb492a8ed4efc47b99e0cf40ecaf2f6f3fa78f965102713fdce2ab05391c0dcbfffdbc7724023d211ed7166f8bd3ef59ecd957ffd1761a4e633f72bf08cdfe3070031f66074f46a5201b322078ce424831e4970ab60d99fc999d2e00751ba9c26b77f7413b2ad9c644d1d5bb1cc619fddd2d639faa9ba59c14692371e65a9cd75c730e865274363a4bf6e63f5abeecac630f"}) [ 3059.789583][T14349] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3059.804194][T14349] device ipvlan355 entered promiscuous mode [ 3059.813148][T14349] 8021q: adding VLAN 0 to HW filter on device ipvlan355 17:17:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xbe010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:26 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x8, [@struct, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3059.971042][T14360] device ipvlan356 entered promiscuous mode [ 3059.979663][T14360] 8021q: adding VLAN 0 to HW filter on device ipvlan356 [ 3060.006554][T14368] device ipvlan357 entered promiscuous mode [ 3060.016591][T14368] 8021q: adding VLAN 0 to HW filter on device ipvlan357 [ 3060.132382][ T4540] usb 6-1: new high-speed USB device number 52 using dummy_hcd 17:17:26 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x7, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd7}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xc3ffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:26 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xd0030000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3060.235752][T14374] device ipvlan358 entered promiscuous mode [ 3060.245842][T14374] 8021q: adding VLAN 0 to HW filter on device ipvlan358 [ 3060.266296][T14380] device ipvlan359 entered promiscuous mode [ 3060.277615][T14380] 8021q: adding VLAN 0 to HW filter on device ipvlan359 [ 3060.321150][T14384] device ipvlan360 entered promiscuous mode [ 3060.329550][T14384] 8021q: adding VLAN 0 to HW filter on device ipvlan360 [ 3060.352626][T14387] device ipvlan361 entered promiscuous mode [ 3060.361610][T14387] 8021q: adding VLAN 0 to HW filter on device ipvlan361 17:17:27 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xda010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3060.382356][ T4540] usb 6-1: Using ep0 maxpacket: 32 17:17:27 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe0010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3060.409477][T14391] device ipvlan362 entered promiscuous mode [ 3060.418176][T14391] 8021q: adding VLAN 0 to HW filter on device ipvlan362 [ 3060.460903][T14396] device ipvlan363 entered promiscuous mode [ 3060.469544][T14396] 8021q: adding VLAN 0 to HW filter on device ipvlan363 [ 3060.493050][T14399] device ipvlan364 entered promiscuous mode [ 3060.501430][T14399] 8021q: adding VLAN 0 to HW filter on device ipvlan364 [ 3060.522356][ T4540] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3060.531286][ T4540] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3060.547205][ T4540] usb 6-1: config 0 has no interface number 0 [ 3060.553704][ T4540] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3060.563270][ T4540] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3060.574274][ T4540] usb 6-1: config 0 descriptor?? [ 3060.626148][ T4540] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3060.842422][ T4540] snd_usb_pod 6-1:0.1: set_interface failed [ 3060.850081][ T4540] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3060.860048][ T4540] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3060.870235][ T4540] usb 6-1: USB disconnect, device number 52 [ 3061.612418][ T4540] usb 6-1: new high-speed USB device number 53 using dummy_hcd [ 3061.862279][ T4540] usb 6-1: Using ep0 maxpacket: 32 [ 3062.014039][ T4540] usb 6-1: config 0 has an invalid interface number: 1 but max is 0 [ 3062.023780][ T4540] usb 6-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 3062.034370][ T4540] usb 6-1: config 0 has no interface number 0 [ 3062.042498][ T4540] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 3062.052567][ T4540] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3062.063536][ T4540] usb 6-1: config 0 descriptor?? [ 3062.124294][ T4540] snd_usb_pod 6-1:0.1: Line 6 Pocket POD found [ 3062.332220][ T4540] snd_usb_pod 6-1:0.1: set_interface failed [ 3062.339709][ T4540] snd_usb_pod 6-1:0.1: Line 6 Pocket POD now disconnected [ 3062.354971][ T4540] snd_usb_pod: probe of 6-1:0.1 failed with error -71 [ 3062.362878][ T4540] usb 6-1: USB disconnect, device number 53 17:17:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xe2010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:29 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3062.768897][T14432] __nla_validate_parse: 9 callbacks suppressed [ 3062.768909][T14432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3062.788310][T14432] device ipvlan365 entered promiscuous mode [ 3062.799660][T14432] 8021q: adding VLAN 0 to HW filter on device ipvlan365 17:17:29 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:29 executing program 5: syz_usb_connect(0x0, 0x2d, &(0x7f0000000140)=ANY=[@ANYBLOB="1201000041435320410e5150e8d10000000109021b00d9fbd6b004498af8"], 0x0) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000000)=""/59, 0x3b, 0x40002023, 0x0, 0x0) 17:17:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xee010000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:29 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3062.886105][T14442] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3062.913960][T14442] device ipvlan366 entered promiscuous mode [ 3062.929525][T14442] 8021q: adding VLAN 0 to HW filter on device ipvlan366 17:17:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x8, [@struct, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x100}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3062.948532][T14454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3062.962390][T14454] device ipvlan367 entered promiscuous mode [ 3062.970350][T14454] 8021q: adding VLAN 0 to HW filter on device ipvlan367 [ 3063.172167][ T4540] usb 6-1: new high-speed USB device number 54 using dummy_hcd 17:17:29 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x7, [@struct, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @ptr, @func_proto, @fwd, @int]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd7}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xefffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:29 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3063.249394][T14461] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.266653][T14461] device ipvlan368 entered promiscuous mode [ 3063.275351][T14461] 8021q: adding VLAN 0 to HW filter on device ipvlan368 17:17:30 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfcffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3063.320058][T14469] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.337128][T14469] device ipvlan369 entered promiscuous mode [ 3063.345223][T14469] 8021q: adding VLAN 0 to HW filter on device ipvlan369 [ 3063.388578][T14475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.406116][T14475] device ipvlan370 entered promiscuous mode [ 3063.414274][T14475] 8021q: adding VLAN 0 to HW filter on device ipvlan370 17:17:30 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfeff0000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3063.429917][T14478] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.442199][ T4540] usb 6-1: Using ep0 maxpacket: 32 [ 3063.449680][T14478] device ipvlan371 entered promiscuous mode [ 3063.458897][T14478] 8021q: adding VLAN 0 to HW filter on device ipvlan371 [ 3063.497034][T14482] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.510746][T14482] device ipvlan372 entered promiscuous mode [ 3063.520926][T14482] 8021q: adding VLAN 0 to HW filter on device ipvlan372 [ 3063.536066][T14485] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:30 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xfeffffff, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3063.549568][T14485] device ipvlan373 entered promiscuous mode [ 3063.563965][T14485] 8021q: adding VLAN 0 to HW filter on device ipvlan373 [ 3063.592175][ T4540] usb 6-1: config 251 has too many interfaces: 217, using maximum allowed: 32 [ 3063.605295][ T4540] usb 6-1: config 251 has an invalid descriptor of length 73, skipping remainder of the config [ 3063.622588][ T4540] usb 6-1: config 251 has 0 interfaces, different from the descriptor's value: 217 [ 3063.633952][T14489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3063.637901][ T4540] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d1.e8 [ 3063.650839][T14489] device ipvlan374 entered promiscuous mode [ 3063.659562][ T4540] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3063.664179][T14489] 8021q: adding VLAN 0 to HW filter on device ipvlan374 [ 3063.698716][T14494] device ipvlan375 entered promiscuous mode [ 3063.709153][T14494] 8021q: adding VLAN 0 to HW filter on device ipvlan375 [ 3063.962201][ T4540] usb 6-1: string descriptor 0 read error: -71 [ 3063.970617][ T4540] usb 6-1: USB disconnect, device number 54 [ 3064.692087][ T17] usb 6-1: new high-speed USB device number 55 using dummy_hcd [ 3064.932724][ T17] usb 6-1: Using ep0 maxpacket: 32 [ 3065.052858][ T17] usb 6-1: config 251 has too many interfaces: 217, using maximum allowed: 32 [ 3065.063541][ T17] usb 6-1: config 251 has an invalid descriptor of length 73, skipping remainder of the config [ 3065.080515][ T17] usb 6-1: config 251 has 0 interfaces, different from the descriptor's value: 217 [ 3065.103004][ T17] usb 6-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d1.e8 [ 3065.116769][ T17] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3065.412061][ T17] usb 6-1: string descriptor 0 read error: -71 [ 3065.420358][ T17] usb 6-1: USB disconnect, device number 55 17:17:32 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@func, @func, @ptr, @enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x52}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe", 0x23}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 17:17:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xff0f0000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) 17:17:32 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x400, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000280)={0x0, 0x4, 0x0, "a08aae957e0ce7539587a482c2d093a9e78cb21b5ca1a65ae65c4b2f10e9698e"}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1a202, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x5, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000100)=0x10001, 0x4) syz_init_net_socket$x25(0x9, 0x5, 0x0) syz_usb_connect(0x6, 0x2d, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=0x0], 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x12f800, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3fb, 0x0, 0x70bd26, 0x4, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8001}, 0x8010) [ 3065.805062][T14520] device ipvlan376 entered promiscuous mode [ 3065.816863][T14520] 8021q: adding VLAN 0 to HW filter on device ipvlan376 17:17:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xff7f0000, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3065.850299][T14526] device ipvlan377 entered promiscuous mode [ 3065.861771][T14526] 8021q: adding VLAN 0 to HW filter on device ipvlan377 17:17:32 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func, @func, @ptr, @enum={0x0, 0x7, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x89}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 3065.910442][T14531] device ipvlan378 entered promiscuous mode [ 3065.921434][T14531] 8021q: adding VLAN 0 to HW filter on device ipvlan378 17:17:32 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0xffff0300, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1], 0x44}}, 0x0) [ 3066.040573][T14540] device ipvlan379 entered promiscuous mode [ 3066.051805][T14540] 8021q: adding VLAN 0 to HW filter on device ipvlan379 [ 3066.075666][ T3174] ================================================================== [ 3066.075666][T14543] device ipvlan380 entered promiscuous mode [ 3066.077812][T14543] 8021q: adding VLAN 0 to HW filter on device ipvlan380 [ 3066.084227][ T3174] BUG: KCSAN: data-race in __dev_change_flags / is_upper_ndev_bond_master_filter [ 3066.084252][ T3174] [ 3066.084256][ T3174] read-write to 0xffff888074875228 of 4 bytes by task 14543 on cpu 0: [ 3066.084269][ T3174] __dev_change_flags+0x9e/0x400 [ 3066.137028][ T3174] rtnl_configure_link+0xc2/0x150 [ 3066.150993][ T3174] rtnl_newlink+0xf17/0x13b0 [ 3066.157556][ T3174] rtnetlink_rcv_msg+0x723/0x7c0 [ 3066.165305][ T3174] netlink_rcv_skb+0x13e/0x240 [ 3066.170291][ T3174] rtnetlink_rcv+0x18/0x20 [ 3066.175191][ T3174] netlink_unicast+0x5df/0x6b0 [ 3066.180682][ T3174] netlink_sendmsg+0x6f8/0x7c0 [ 3066.185809][ T3174] ____sys_sendmsg+0x352/0x4c0 [ 3066.191451][ T3174] __sys_sendmsg+0x1ed/0x270 [ 3066.196816][ T3174] __x64_sys_sendmsg+0x42/0x50 [ 3066.202731][ T3174] do_syscall_64+0x39/0x80 [ 3066.208389][ T3174] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 3066.217016][ T3174] [ 3066.222017][ T3174] read to 0xffff888074875228 of 4 bytes by task 3174 on cpu 1: [ 3066.235840][ T3174] is_upper_ndev_bond_master_filter+0x27/0xb0 [ 3066.246213][ T3174] ib_enum_roce_netdev+0x292/0x310 [ 3066.253782][ T3174] ib_enum_all_roce_netdevs+0x94/0x100 [ 3066.260939][ T3174] netdevice_event_work_handler+0x63/0x200 [ 3066.271835][ T3174] process_one_work+0x3e1/0x950 [ 3066.285551][ T3174] worker_thread+0x635/0xb90 [ 3066.298958][ T3174] kthread+0x1fd/0x220 [ 3066.311097][ T3174] ret_from_fork+0x1f/0x30 [ 3066.331227][ T3174] [ 3066.339897][ T3174] Reported by Kernel Concurrency Sanitizer on: [ 3066.361179][ T3174] CPU: 1 PID: 3174 Comm: kworker/u4:5 Not tainted 5.11.0-rc1-syzkaller #0 [ 3066.376390][ T3174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.390470][ T3174] Workqueue: gid-cache-wq netdevice_event_work_handler [ 3066.399506][ T3174] ================================================================== [ 3066.411933][ T3174] Kernel panic - not syncing: panic_on_warn set ... [ 3066.422068][ T3174] CPU: 1 PID: 3174 Comm: kworker/u4:5 Not tainted 5.11.0-rc1-syzkaller #0 [ 3066.437767][ T3174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3066.457170][ T3174] Workqueue: gid-cache-wq netdevice_event_work_handler [ 3066.468705][ T3174] Call Trace: [ 3066.477048][ T3174] dump_stack+0x116/0x15d [ 3066.482571][ T3174] panic+0x1e7/0x5fa [ 3066.488027][ T3174] ? vprintk_emit+0x2e2/0x360 [ 3066.494182][ T3174] kcsan_report+0x67b/0x680 [ 3066.499485][ T3174] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 3066.510710][ T3174] ? is_upper_ndev_bond_master_filter+0x27/0xb0 [ 3066.520513][ T3174] ? ib_enum_roce_netdev+0x292/0x310 [ 3066.528034][ T3174] ? ib_enum_all_roce_netdevs+0x94/0x100 [ 3066.537772][ T3174] ? netdevice_event_work_handler+0x63/0x200 [ 3066.545448][ T3174] ? process_one_work+0x3e1/0x950 [ 3066.552792][ T3174] ? worker_thread+0x635/0xb90 [ 3066.559674][ T3174] ? kthread+0x1fd/0x220 [ 3066.564778][ T3174] ? ret_from_fork+0x1f/0x30 [ 3066.573306][ T3174] ? update_load_avg+0x1ad/0x2d0 [ 3066.580626][ T3174] ? rb_insert_color+0x2c9/0x2e0 [ 3066.586721][ T3174] kcsan_setup_watchpoint+0x47b/0x4e0 [ 3066.596031][ T3174] is_upper_ndev_bond_master_filter+0x27/0xb0 [ 3066.603677][ T3174] ib_enum_roce_netdev+0x292/0x310 [ 3066.610122][ T3174] ? add_netdev_ips+0x30/0x30 [ 3066.615625][ T3174] ? del_default_gids+0xb0/0xb0 [ 3066.622061][ T3174] ? del_default_gids+0xb0/0xb0 [ 3066.628612][ T3174] ? add_netdev_ips+0x30/0x30 [ 3066.635432][ T3174] ib_enum_all_roce_netdevs+0x94/0x100 [ 3066.642190][ T3174] ? add_netdev_ips+0x30/0x30 [ 3066.648381][ T3174] ? del_default_gids+0xb0/0xb0 [ 3066.654547][ T3174] netdevice_event_work_handler+0x63/0x200 [ 3066.665614][ T3174] process_one_work+0x3e1/0x950 [ 3066.673548][ T3174] worker_thread+0x635/0xb90 [ 3066.680575][ T3174] ? process_one_work+0x950/0x950 [ 3066.688079][ T3174] kthread+0x1fd/0x220 [ 3066.693712][ T3174] ? process_one_work+0x950/0x950 [ 3066.703000][ T3174] ? kthread_blkcg+0x80/0x80 [ 3066.708374][ T3174] ret_from_fork+0x1f/0x30 [ 3066.717220][ T3174] Kernel Offset: disabled [ 3066.723033][ T3174] Rebooting in 86400 seconds..