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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xffffff9e) 04:02:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x14, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2478.152048][ T2101] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xfffffff0) 04:02:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x5000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x18, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2478.261789][ T2214] FAULT_INJECTION: forcing a failure. [ 2478.261789][ T2214] name failslab, interval 1, probability 0, space 0, times 0 [ 2478.274962][ T2214] CPU: 1 PID: 2214 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2478.282883][ T2214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2478.293177][ T2214] Call Trace: [ 2478.296487][ T2214] dump_stack+0x11d/0x181 [ 2478.300850][ T2214] should_fail.cold+0xa/0x1a [ 2478.305539][ T2214] __should_failslab+0xee/0x130 [ 2478.310410][ T2214] should_failslab+0x9/0x14 [ 2478.314948][ T2214] kmem_cache_alloc+0x29/0x5d0 [ 2478.319725][ T2214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2478.325982][ T2214] skb_clone+0xf9/0x290 [ 2478.330153][ T2214] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2478.336433][ T2214] dev_queue_xmit_nit+0x24a/0x540 [ 2478.341470][ T2214] ? constant_test_bit+0x30/0x30 [ 2478.346431][ T2214] dev_hard_start_xmit+0x3f5/0x430 [ 2478.351557][ T2214] __dev_queue_xmit+0x14ab/0x1b40 [ 2478.356595][ T2214] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2478.362853][ T2214] ? nf_ct_bridge_post+0x22f/0xb50 [ 2478.366184][ T2222] netlink: 'syz-executor.1': attribute type 24 has an invalid length. [ 2478.368003][ T2214] dev_queue_xmit+0x21/0x30 [ 2478.368096][ T2214] br_dev_queue_push_xmit+0x2c1/0x330 [ 2478.368153][ T2214] ? nf_hook_slow+0xb8/0x160 [ 2478.389225][ T2222] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2478.391002][ T2214] br_forward_finish+0x177/0x190 [ 2478.391021][ T2214] ? br_fdb_add.cold+0x88/0x88 [ 2478.391115][ T2214] __br_forward+0x331/0x4a0 [ 2478.391146][ T2214] ? __read_once_size.constprop.0+0x20/0x20 [ 2478.419435][ T2214] br_flood+0x31a/0x330 [ 2478.423678][ T2214] br_dev_xmit+0x680/0x920 [ 2478.428146][ T2214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2478.434400][ T2214] dev_hard_start_xmit+0xef/0x430 [ 2478.439505][ T2214] __dev_queue_xmit+0x14ab/0x1b40 [ 2478.441218][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.444573][ T2214] ? ipt_do_table+0x8e9/0xe60 [ 2478.450293][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xfffffffc) [ 2478.455023][ T2214] ? __this_cpu_preempt_check+0x4a/0x170 [ 2478.455042][ T2214] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2478.455092][ T2214] ? __rcu_read_unlock+0x66/0x3c0 [ 2478.477313][ T2214] ? nf_nat_packet+0xc2/0x110 [ 2478.482010][ T2214] dev_queue_xmit+0x21/0x30 [ 2478.486536][ T2214] ip_finish_output2+0x836/0xe40 [ 2478.491619][ T2214] __ip_finish_output+0x23a/0x490 [ 2478.496669][ T2214] ? ipv4_confirm+0xdc/0x160 [ 2478.501299][ T2214] ip_finish_output+0x41/0x160 [ 2478.506145][ T2214] ip_mc_output+0x143/0x620 04:02:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x25, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2478.510721][ T2214] ? __ip_finish_output+0x490/0x490 [ 2478.516196][ T2214] ip_local_out+0x74/0x90 [ 2478.520587][ T2214] __ip_queue_xmit+0x3a8/0xa40 [ 2478.525363][ T2214] l2tp_xmit_skb+0x574/0x8e0 [ 2478.529968][ T2214] ? skb_put+0xeb/0x110 [ 2478.534198][ T2214] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2478.539069][ T2214] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2478.544279][ T2214] sock_sendmsg+0x9f/0xc0 [ 2478.548627][ T2214] ___sys_sendmsg+0x2b7/0x5d0 [ 2478.553369][ T2214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2478.559635][ T2214] ? __rcu_read_unlock+0x66/0x3c0 [ 2478.564692][ T2214] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2478.570604][ T2214] ? __fget+0xb8/0x1d0 [ 2478.574727][ T2214] ? __fget_light+0xaf/0x190 [ 2478.579335][ T2214] ? __fdget+0x2c/0x40 [ 2478.583419][ T2214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2478.589681][ T2214] __sys_sendmmsg+0x123/0x350 [ 2478.594392][ T2214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2478.600657][ T2214] ? fput_many+0xec/0x130 [ 2478.605052][ T2214] ? fput+0x29/0x30 [ 2478.608887][ T2214] ? ksys_write+0x145/0x1b0 04:02:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x9000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x100000000000000) [ 2478.613406][ T2214] __x64_sys_sendmmsg+0x64/0x80 [ 2478.618325][ T2214] do_syscall_64+0xcc/0x370 [ 2478.622909][ T2214] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2478.629763][ T2214] RIP: 0033:0x45a639 [ 2478.633729][ T2214] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2478.653350][ T2214] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2478.661846][ T2214] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2478.669835][ T2214] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2478.677839][ T2214] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2478.685995][ T2214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2478.693978][ T2214] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2478.702196][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.708005][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.732996][ T2540] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x6000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x200000000000000) 04:02:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x5a, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:34 executing program 5 (fault-call:9 fault-nth:30): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x400000000000000) [ 2479.192796][ T2660] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2479.258035][ T2665] FAULT_INJECTION: forcing a failure. [ 2479.258035][ T2665] name failslab, interval 1, probability 0, space 0, times 0 [ 2479.277670][ T2665] CPU: 0 PID: 2665 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2479.285506][ T2665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.295567][ T2665] Call Trace: [ 2479.298870][ T2665] dump_stack+0x11d/0x181 [ 2479.303205][ T2665] should_fail.cold+0xa/0x1a [ 2479.307840][ T2665] __should_failslab+0xee/0x130 [ 2479.312726][ T2665] should_failslab+0x9/0x14 [ 2479.317280][ T2665] kmem_cache_alloc_node+0x39/0x660 [ 2479.322511][ T2665] __alloc_skb+0x8e/0x360 [ 2479.326914][ T2665] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2479.332821][ T2665] sock_wmalloc+0xb8/0x110 [ 2479.337253][ T2665] pppol2tp_sendmsg+0x15a/0x3c0 [ 2479.342113][ T2665] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2479.347239][ T2665] sock_sendmsg+0x9f/0xc0 [ 2479.351595][ T2665] ___sys_sendmsg+0x2b7/0x5d0 [ 2479.356340][ T2665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2479.362593][ T2665] ? __rcu_read_unlock+0x66/0x3c0 [ 2479.367629][ T2665] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2479.373575][ T2665] ? __fget+0xb8/0x1d0 [ 2479.377658][ T2665] ? __fget_light+0xaf/0x190 [ 2479.382255][ T2665] ? __fdget+0x2c/0x40 [ 2479.386336][ T2665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2479.392600][ T2665] __sys_sendmmsg+0x123/0x350 [ 2479.397312][ T2665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2479.403595][ T2665] ? fput_many+0xec/0x130 04:02:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1f6, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x600000000000000) [ 2479.407939][ T2665] ? fput+0x29/0x30 [ 2479.411759][ T2665] ? ksys_write+0x145/0x1b0 [ 2479.416283][ T2665] __x64_sys_sendmmsg+0x64/0x80 [ 2479.421151][ T2665] do_syscall_64+0xcc/0x370 [ 2479.425940][ T2665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2479.431841][ T2665] RIP: 0033:0x45a639 [ 2479.435765][ T2665] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:02:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xa00000000000000) 04:02:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x7000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2479.455432][ T2665] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2479.463851][ T2665] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2479.471844][ T2665] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2479.479825][ T2665] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2479.487846][ T2665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2479.495830][ T2665] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xa000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:34 executing program 5 (fault-call:9 fault-nth:31): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2479.736492][ T2995] FAULT_INJECTION: forcing a failure. [ 2479.736492][ T2995] name failslab, interval 1, probability 0, space 0, times 0 [ 2479.749299][ T2995] CPU: 1 PID: 2995 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2479.757091][ T2995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.767225][ T2995] Call Trace: [ 2479.770599][ T2995] dump_stack+0x11d/0x181 [ 2479.774934][ T2995] should_fail.cold+0xa/0x1a [ 2479.779657][ T2995] __should_failslab+0xee/0x130 [ 2479.784641][ T2995] should_failslab+0x9/0x14 [ 2479.789189][ T2995] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2479.794933][ T2995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2479.801179][ T2995] ? memcg_kmem_put_cache+0x91/0xe0 [ 2479.806451][ T2995] __kmalloc_node_track_caller+0x38/0x50 [ 2479.812088][ T2995] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2479.817485][ T2995] __alloc_skb+0xc2/0x360 [ 2479.821819][ T2995] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2479.827709][ T2995] sock_wmalloc+0xb8/0x110 [ 2479.832126][ T2995] pppol2tp_sendmsg+0x15a/0x3c0 [ 2479.836983][ T2995] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2479.842156][ T2995] sock_sendmsg+0x9f/0xc0 [ 2479.846526][ T2995] ___sys_sendmsg+0x2b7/0x5d0 [ 2479.851225][ T2995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2479.857586][ T2995] ? __rcu_read_unlock+0x66/0x3c0 [ 2479.862605][ T2995] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2479.868580][ T2995] ? __fget+0xb8/0x1d0 [ 2479.872655][ T2995] ? __fget_light+0xaf/0x190 [ 2479.877259][ T2995] ? __fdget+0x2c/0x40 [ 2479.881441][ T2995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2479.887696][ T2995] __sys_sendmmsg+0x123/0x350 [ 2479.892387][ T2995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2479.898651][ T2995] ? fput_many+0xec/0x130 [ 2479.902978][ T2995] ? fput+0x29/0x30 [ 2479.906878][ T2995] ? ksys_write+0x145/0x1b0 [ 2479.911399][ T2995] __x64_sys_sendmmsg+0x64/0x80 [ 2479.916254][ T2995] do_syscall_64+0xcc/0x370 [ 2479.920775][ T2995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2479.926672][ T2995] RIP: 0033:0x45a639 [ 2479.930568][ T2995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2479.950189][ T2995] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2479.958603][ T2995] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2479.966567][ T2995] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2479.974555][ T2995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2479.982534][ T2995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2479.990511][ T2995] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xc00000000000000) 04:02:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x600, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x8000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:35 executing program 5 (fault-call:9 fault-nth:32): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xe00000000000000) [ 2480.233745][ T3129] FAULT_INJECTION: forcing a failure. [ 2480.233745][ T3129] name failslab, interval 1, probability 0, space 0, times 0 [ 2480.246500][ T3129] CPU: 0 PID: 3129 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2480.254310][ T3129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2480.264371][ T3129] Call Trace: [ 2480.267675][ T3129] dump_stack+0x11d/0x181 [ 2480.272035][ T3129] should_fail.cold+0xa/0x1a [ 2480.276747][ T3129] __should_failslab+0xee/0x130 [ 2480.281739][ T3129] should_failslab+0x9/0x14 [ 2480.286255][ T3129] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2480.291976][ T3129] ? should_fail+0xd4/0x45d [ 2480.296551][ T3129] __kmalloc_node_track_caller+0x38/0x50 [ 2480.302282][ T3129] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2480.307721][ T3129] pskb_expand_head+0x102/0x750 [ 2480.312576][ T3129] ? iov_iter_advance+0x211/0x9d0 [ 2480.317626][ T3129] l2tp_xmit_skb+0x754/0x8e0 [ 2480.322233][ T3129] ? skb_put+0xeb/0x110 [ 2480.326475][ T3129] pppol2tp_sendmsg+0x2fc/0x3c0 04:02:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x9000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x7d00, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xf00000000000000) [ 2480.331370][ T3129] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2480.336528][ T3129] sock_sendmsg+0x9f/0xc0 [ 2480.340869][ T3129] ___sys_sendmsg+0x2b7/0x5d0 [ 2480.345611][ T3129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2480.351897][ T3129] ? __rcu_read_unlock+0x66/0x3c0 [ 2480.356930][ T3129] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2480.362833][ T3129] ? __fget+0xb8/0x1d0 [ 2480.366919][ T3129] ? __fget_light+0xaf/0x190 [ 2480.371522][ T3129] ? __fdget+0x2c/0x40 [ 2480.375606][ T3129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 04:02:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x1000000000000000) [ 2480.381946][ T3129] __sys_sendmmsg+0x123/0x350 [ 2480.386652][ T3129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2480.392969][ T3129] ? fput_many+0xec/0x130 [ 2480.397308][ T3129] ? fput+0x29/0x30 [ 2480.401140][ T3129] ? ksys_write+0x145/0x1b0 [ 2480.405736][ T3129] __x64_sys_sendmmsg+0x64/0x80 [ 2480.410675][ T3129] do_syscall_64+0xcc/0x370 [ 2480.415237][ T3129] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2480.421212][ T3129] RIP: 0033:0x45a639 [ 2480.425118][ T3129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2480.444726][ T3129] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2480.453170][ T3129] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2480.461154][ T3129] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2480.469139][ T3129] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2480.477131][ T3129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2480.485147][ T3129] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xa000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x2, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2480.662179][ T3400] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:02:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xe000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x6000000000000000) 04:02:36 executing program 5 (fault-call:9 fault-nth:33): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x10000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x3, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2481.057330][ T3509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2481.105348][ T3520] FAULT_INJECTION: forcing a failure. [ 2481.105348][ T3520] name failslab, interval 1, probability 0, space 0, times 0 [ 2481.118068][ T3520] CPU: 0 PID: 3520 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2481.125877][ T3520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.135941][ T3520] Call Trace: [ 2481.139242][ T3520] dump_stack+0x11d/0x181 [ 2481.143655][ T3520] should_fail.cold+0xa/0x1a [ 2481.148268][ T3520] __should_failslab+0xee/0x130 [ 2481.153231][ T3520] should_failslab+0x9/0x14 [ 2481.157752][ T3520] kmem_cache_alloc+0x29/0x5d0 [ 2481.162629][ T3520] skb_clone+0xf9/0x290 [ 2481.166827][ T3520] ip_mc_output+0x1fd/0x620 [ 2481.171388][ T3520] ? constant_test_bit+0x30/0x30 [ 2481.176348][ T3520] ip_local_out+0x74/0x90 [ 2481.180699][ T3520] __ip_queue_xmit+0x3a8/0xa40 [ 2481.185493][ T3520] l2tp_xmit_skb+0x574/0x8e0 [ 2481.190392][ T3520] ? skb_put+0xeb/0x110 [ 2481.194617][ T3520] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2481.199485][ T3520] ? pppol2tp_seq_show+0x6b0/0x6b0 04:02:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x6558000000000000) 04:02:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x4, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x10000120}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2481.204677][ T3520] sock_sendmsg+0x9f/0xc0 [ 2481.209072][ T3520] ___sys_sendmsg+0x2b7/0x5d0 [ 2481.213770][ T3520] ? __rcu_read_unlock+0x66/0x3c0 [ 2481.218802][ T3520] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2481.224718][ T3520] ? __fget+0xb8/0x1d0 [ 2481.228810][ T3520] ? __fget_light+0xaf/0x190 [ 2481.233464][ T3520] ? __fdget+0x2c/0x40 [ 2481.237704][ T3520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2481.243962][ T3520] __sys_sendmmsg+0x123/0x350 [ 2481.248667][ T3520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2481.254916][ T3520] ? fput_many+0xec/0x130 [ 2481.259406][ T3520] ? fput+0x29/0x30 [ 2481.263220][ T3520] ? ksys_write+0x145/0x1b0 [ 2481.267738][ T3520] __x64_sys_sendmmsg+0x64/0x80 [ 2481.272672][ T3520] do_syscall_64+0xcc/0x370 [ 2481.277294][ T3520] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2481.283189][ T3520] RIP: 0033:0x45a639 [ 2481.287096][ T3520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2481.293900][ T3627] validate_nla: 3 callbacks suppressed [ 2481.293909][ T3627] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2481.306781][ T3520] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2481.306857][ T3520] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2481.306867][ T3520] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2481.306875][ T3520] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:02:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x5, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2481.306896][ T3520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2481.360996][ T3520] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x8100000000000000) 04:02:36 executing program 5 (fault-call:9 fault-nth:34): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2481.467234][ T3743] net_ratelimit: 30 callbacks suppressed [ 2481.467251][ T3743] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2481.487237][ T3743] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2481.547372][ T3748] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2481.601466][ T3839] FAULT_INJECTION: forcing a failure. [ 2481.601466][ T3839] name failslab, interval 1, probability 0, space 0, times 0 [ 2481.614196][ T3839] CPU: 0 PID: 3839 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2481.622063][ T3839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.632236][ T3839] Call Trace: [ 2481.635524][ T3839] dump_stack+0x11d/0x181 [ 2481.639855][ T3839] should_fail.cold+0xa/0x1a [ 2481.644514][ T3839] __should_failslab+0xee/0x130 [ 2481.649385][ T3839] should_failslab+0x9/0x14 [ 2481.653984][ T3839] kmem_cache_alloc+0x29/0x5d0 [ 2481.658822][ T3839] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2481.664724][ T3839] dst_alloc+0xad/0x149 [ 2481.668878][ T3839] rt_dst_clone+0x5c/0x3b0 [ 2481.673304][ T3839] ip_mc_finish_output+0x68/0x340 [ 2481.678317][ T3839] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2481.684109][ T3839] ? nf_hook_slow+0xb8/0x160 [ 2481.688729][ T3839] ip_mc_output+0x32c/0x620 [ 2481.693292][ T3839] ? ip_copy_addrs+0x50/0x50 [ 2481.697883][ T3839] ip_local_out+0x74/0x90 [ 2481.702281][ T3839] __ip_queue_xmit+0x3a8/0xa40 [ 2481.707100][ T3839] l2tp_xmit_skb+0x574/0x8e0 [ 2481.711691][ T3839] ? skb_put+0xeb/0x110 [ 2481.715876][ T3839] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2481.720767][ T3839] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2481.725878][ T3839] sock_sendmsg+0x9f/0xc0 [ 2481.730348][ T3839] ___sys_sendmsg+0x2b7/0x5d0 [ 2481.735064][ T3839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2481.741380][ T3839] ? __rcu_read_unlock+0x66/0x3c0 [ 2481.746477][ T3839] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2481.752394][ T3839] ? __fget+0xb8/0x1d0 [ 2481.756461][ T3839] ? __fget_light+0xaf/0x190 [ 2481.761162][ T3839] ? __fdget+0x2c/0x40 [ 2481.765306][ T3839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2481.771562][ T3839] __sys_sendmmsg+0x123/0x350 [ 2481.776317][ T3839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2481.782656][ T3839] ? fput_many+0xec/0x130 [ 2481.787063][ T3839] ? fput+0x29/0x30 [ 2481.790901][ T3839] ? ksys_write+0x145/0x1b0 [ 2481.795448][ T3839] __x64_sys_sendmmsg+0x64/0x80 [ 2481.800425][ T3839] do_syscall_64+0xcc/0x370 [ 2481.804932][ T3839] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2481.810907][ T3839] RIP: 0033:0x45a639 [ 2481.814792][ T3839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2481.834725][ T3839] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2481.843184][ T3839] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2481.851165][ T3839] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2481.859128][ T3839] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2481.867113][ T3839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2481.875139][ T3839] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xf000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x20010010}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x88a8ffff00000000) 04:02:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:37 executing program 5 (fault-call:9 fault-nth:35): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2482.060963][ T3964] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2482.089656][ T3964] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:02:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x3f000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2482.175043][ T4073] FAULT_INJECTION: forcing a failure. [ 2482.175043][ T4073] name failslab, interval 1, probability 0, space 0, times 0 [ 2482.187730][ T4073] CPU: 0 PID: 4073 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2482.195586][ T4073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2482.205647][ T4073] Call Trace: [ 2482.209004][ T4073] dump_stack+0x11d/0x181 [ 2482.213425][ T4073] should_fail.cold+0xa/0x1a [ 2482.218040][ T4073] __should_failslab+0xee/0x130 [ 2482.222936][ T4073] should_failslab+0x9/0x14 [ 2482.227453][ T4073] kmem_cache_alloc+0x29/0x5d0 [ 2482.232580][ T4073] ? __read_once_size.constprop.0+0x20/0x20 [ 2482.238494][ T4073] skb_clone+0xf9/0x290 [ 2482.242678][ T4073] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2482.249001][ T4073] dev_queue_xmit_nit+0x24a/0x540 [ 2482.254209][ T4073] ? constant_test_bit+0x30/0x30 [ 2482.259185][ T4073] dev_hard_start_xmit+0x3f5/0x430 [ 2482.264291][ T4073] __dev_queue_xmit+0x14ab/0x1b40 [ 2482.269467][ T4073] ? ipt_do_table+0x8e9/0xe60 04:02:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x9effffff00000000) 04:02:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x9, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2482.274229][ T4073] ? __this_cpu_preempt_check+0x4a/0x170 [ 2482.279859][ T4073] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2482.285839][ T4073] ? __rcu_read_unlock+0x66/0x3c0 [ 2482.290951][ T4073] ? nf_nat_packet+0xc2/0x110 [ 2482.295650][ T4073] dev_queue_xmit+0x21/0x30 [ 2482.300169][ T4073] ip_finish_output2+0x836/0xe40 [ 2482.305287][ T4073] __ip_finish_output+0x23a/0x490 [ 2482.310351][ T4073] ? ipv4_confirm+0xdc/0x160 [ 2482.314962][ T4073] ip_finish_output+0x41/0x160 [ 2482.319750][ T4073] ip_mc_output+0x143/0x620 [ 2482.324275][ T4073] ? __ip_finish_output+0x490/0x490 [ 2482.329629][ T4073] ip_local_out+0x74/0x90 [ 2482.334069][ T4073] __ip_queue_xmit+0x3a8/0xa40 [ 2482.338846][ T4073] l2tp_xmit_skb+0x574/0x8e0 [ 2482.343488][ T4073] ? skb_put+0xeb/0x110 [ 2482.347876][ T4073] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2482.352788][ T4073] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2482.357912][ T4073] sock_sendmsg+0x9f/0xc0 [ 2482.359053][ T4081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2482.362281][ T4073] ___sys_sendmsg+0x2b7/0x5d0 [ 2482.362304][ T4073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2482.362324][ T4073] ? __rcu_read_unlock+0x66/0x3c0 [ 2482.362352][ T4073] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2482.377425][ T4082] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2482.382618][ T4073] ? __fget+0xb8/0x1d0 [ 2482.382638][ T4073] ? __fget_light+0xaf/0x190 [ 2482.382656][ T4073] ? __fdget+0x2c/0x40 [ 2482.382677][ T4073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2482.382713][ T4073] __sys_sendmmsg+0x123/0x350 [ 2482.382744][ T4073] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2482.390108][ T4082] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2482.393647][ T4073] ? fput_many+0xec/0x130 [ 2482.393666][ T4073] ? fput+0x29/0x30 [ 2482.393708][ T4073] ? ksys_write+0x145/0x1b0 [ 2482.393737][ T4073] __x64_sys_sendmmsg+0x64/0x80 [ 2482.465018][ T4073] do_syscall_64+0xcc/0x370 [ 2482.469634][ T4073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 04:02:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0xa, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xc86d000000000000) [ 2482.475531][ T4073] RIP: 0033:0x45a639 [ 2482.479466][ T4073] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2482.499073][ T4073] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2482.507501][ T4073] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2482.515496][ T4073] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2482.523515][ T4073] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2482.531588][ T4073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2482.539643][ T4073] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x40000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2482.586714][ T4187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2482.601244][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2482.607019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2482.624695][ T4188] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2482.638877][ T4188] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:02:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x10000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:38 executing program 5 (fault-call:9 fault-nth:36): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0xb, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xf0ffffff00000000) 04:02:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x78000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xfcffffff00000000) [ 2482.995681][ T4404] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2483.074892][ T4504] FAULT_INJECTION: forcing a failure. [ 2483.074892][ T4504] name failslab, interval 1, probability 0, space 0, times 0 [ 2483.087595][ T4504] CPU: 0 PID: 4504 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2483.095449][ T4504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.105507][ T4504] Call Trace: [ 2483.108817][ T4504] dump_stack+0x11d/0x181 [ 2483.113164][ T4504] should_fail.cold+0xa/0x1a [ 2483.117787][ T4504] __should_failslab+0xee/0x130 04:02:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xffffff7f00000000) [ 2483.122700][ T4504] should_failslab+0x9/0x14 [ 2483.127274][ T4504] kmem_cache_alloc+0x29/0x5d0 [ 2483.132048][ T4504] skb_clone+0xf9/0x290 [ 2483.136214][ T4504] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.142460][ T4504] dev_queue_xmit_nit+0x24a/0x540 [ 2483.147505][ T4504] ? constant_test_bit+0x30/0x30 [ 2483.152531][ T4504] dev_hard_start_xmit+0x3f5/0x430 [ 2483.157663][ T4504] __dev_queue_xmit+0x14ab/0x1b40 [ 2483.162759][ T4504] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.169189][ T4504] ? nf_ct_bridge_post+0x22f/0xb50 [ 2483.174329][ T4504] dev_queue_xmit+0x21/0x30 [ 2483.178926][ T4504] br_dev_queue_push_xmit+0x2c1/0x330 [ 2483.184325][ T4504] ? nf_hook_slow+0xb8/0x160 [ 2483.188945][ T4504] br_forward_finish+0x177/0x190 [ 2483.193903][ T4504] ? br_fdb_add.cold+0x88/0x88 [ 2483.198697][ T4504] __br_forward+0x331/0x4a0 [ 2483.203214][ T4504] ? __read_once_size.constprop.0+0x20/0x20 [ 2483.209225][ T4504] br_flood+0x31a/0x330 [ 2483.213391][ T4504] br_dev_xmit+0x680/0x920 [ 2483.217884][ T4504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:02:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xffffffff00000000) [ 2483.224212][ T4504] dev_hard_start_xmit+0xef/0x430 [ 2483.229258][ T4504] __dev_queue_xmit+0x14ab/0x1b40 [ 2483.234299][ T4504] ? ipt_do_table+0x8e9/0xe60 [ 2483.239055][ T4504] ? __this_cpu_preempt_check+0x4a/0x170 [ 2483.244706][ T4504] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2483.250621][ T4504] ? __rcu_read_unlock+0x66/0x3c0 [ 2483.255721][ T4504] ? nf_nat_packet+0xc2/0x110 [ 2483.260404][ T4504] dev_queue_xmit+0x21/0x30 [ 2483.264955][ T4504] ip_finish_output2+0x836/0xe40 [ 2483.269910][ T4504] __ip_finish_output+0x23a/0x490 04:02:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xfc000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2483.275009][ T4504] ? ipv4_confirm+0xdc/0x160 [ 2483.279616][ T4504] ip_finish_output+0x41/0x160 [ 2483.284387][ T4504] ip_mc_output+0x143/0x620 [ 2483.288964][ T4504] ? __ip_finish_output+0x490/0x490 [ 2483.294179][ T4504] ip_local_out+0x74/0x90 [ 2483.298595][ T4504] __ip_queue_xmit+0x3a8/0xa40 [ 2483.303551][ T4504] l2tp_xmit_skb+0x574/0x8e0 [ 2483.308763][ T4504] ? skb_put+0xeb/0x110 [ 2483.312928][ T4504] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2483.317793][ T4504] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2483.322908][ T4504] sock_sendmsg+0x9f/0xc0 [ 2483.327244][ T4504] ___sys_sendmsg+0x2b7/0x5d0 [ 2483.332045][ T4504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2483.338469][ T4504] ? __rcu_read_unlock+0x66/0x3c0 [ 2483.343502][ T4504] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2483.349403][ T4504] ? __fget+0xb8/0x1d0 [ 2483.353484][ T4504] ? __fget_light+0xaf/0x190 [ 2483.358093][ T4504] ? __fdget+0x2c/0x40 [ 2483.362173][ T4504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2483.368428][ T4504] __sys_sendmmsg+0x123/0x350 [ 2483.373215][ T4504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2483.379471][ T4504] ? fput_many+0xec/0x130 [ 2483.383807][ T4504] ? fput+0x29/0x30 [ 2483.387701][ T4504] ? ksys_write+0x145/0x1b0 [ 2483.392218][ T4504] __x64_sys_sendmmsg+0x64/0x80 [ 2483.397151][ T4504] do_syscall_64+0xcc/0x370 [ 2483.401672][ T4504] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2483.407588][ T4504] RIP: 0033:0x45a639 04:02:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xfffffffffffffbff, 0x103300) [ 2483.411512][ T4504] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2483.431178][ T4504] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2483.439601][ T4504] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2483.448015][ T4504] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2483.455996][ T4504] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2483.457143][ T4730] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. sendmmsg$inet6(r1, &(0x7f0000006ec0)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x10001, @mcast1, 0x10001}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000100)="75646ec1caa5326149e7363ed6ef9708c1375418459c321ad7d72d4d2a34fe1015e18f18d83ea6b6db63ed871a54f8baabed39f5596e85dae0360f82b0", 0x3d}, {&(0x7f0000000140)="82f93af535674a8ae836fef0fab9f6b0e4b0904bd4a7c5e993c17a774df57b73b0f5fb1fd57bb96d0d97c125c4cfa903d117989690f6b158d6f654c8a9db3fc5139198fb3cb55546d69c8895bc8e6039fb44c1cd9530a1e970fa5330e1545d8e1e7180f16f406fd62f10f766cf4eecc48764565b3d1d74d4254db2df56d3ff21691b4584901c12bf5234ed30ab1bdc65f6ba842aebaa7815b30dec94c61b428b3b06fff0ab1d7e84dfa9a7336cba522f1788917a0559ffd757c9b648a16257e9c65de243b536b4b575fff92c", 0xcc}, {&(0x7f0000000240)="6d4a710d017085cd937c0ce7bc43fe4f955e7cad782747806bf28c2d0f0fffe4337ba62d4e06ded9028d01c4fcc286c2cf4ae7b8655132c0850ef3feaa48cdb0921f4e106a8566177be7918c3770d70e41186f60d1e0b13f1201fe712c6efc73ef12aacf3882e8991984fb69ab1b16d933d8265cc4c9d213d66d3c04180866fa0738d6c5bbfb5ce59f4ee6adab323631479bc7d0ab84d52553d3de0652104fc6b8bf0cae8ea426213530cc0e52badfa2d5b1667c4bcb2ea3c49d39837b54d2837707956ea18253b18ad2ea8fb44320e5caddbf05d3a715212ec24270d4d34ed4f08e60667f7ae12b60", 0xe9}, {&(0x7f0000001400)="e2e2e23b9e2ec2eb4bda6f433033024a613dcd7b2edc13a9366f69e70b977794e251e5a69c0243d2e5d9e70b72a4a0faa760f503bae38ba6cee0fbf5ee5d1d1c2c76cb680a36b3c82062f59e547316ad790e021511cdfc3876714de3f103639b4ad2220b26f68e0fdb0fb7c760631ecf632608e0cf786d87a66e12cb17ea2f4c9b606c0c88d0a1c3a776299f747c728383ff13d18520111cb5324eadf30c7dbeb58945327c0172cbfa2245e6cdd64dd6a86528", 0xb3}], 0x5}}, {{0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001500)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @rthdr={{0x58, 0x29, 0x39, {0x33, 0x8, 0x1, 0x1f, 0x0, [@local, @mcast2, @ipv4={[], [], @broadcast}, @empty]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xde}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x80}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f00000015c0)="5b7f4b42a35ae10f9e8c9a0348fe92291673512830ddf3610e52d6bfe9b85a71bfa78330cfa7", 0x26}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="5f2e983bba8e5a959e0e2ed0ba472ed123c144071aba65739fdb8be75f0143a6d15f980c149308661f336f417bbfcea89e8d0726c5ef72e9fd6a223e957608c21eb4f9f30c63f0754ae956d028ce34034fa0fd7ac94f2b91968f5f489eeb27487325ff6813812f99310e3f3e7566f6fe31f559e17baf03ce132cfd2f446e3246ede0276990289a742200c61cef79bea5889cb8819125c904497021c431f6dbef224739948653a45192038d8d2fecc3ff9f14466ccbc534718b776dfd55ceef22db19ce730bb4a99c388585bb2160c01bb83786025fdeede78eca118ac86800472d644816f8abb9aa185c479feeddd10b", 0xf0}, {&(0x7f0000002700)="e35bab0c03c4cbab8ad41837a3236455dad2d8122aa9fdad1b8f9e40", 0x1c}, {&(0x7f0000002740)="6ed3c8d565f6b47b8214283a644446c70c9d336e8a9a56", 0x17}], 0x5}}, {{&(0x7f0000002800)={0xa, 0x4e21, 0x101, @mcast2, 0x2}, 0x1c, &(0x7f0000002b00)=[{&(0x7f0000002840)="2f0eb5aa6961f62b0e5404141ed0263f28bd3793b514f5e4acdc4365e95a1b7dc1", 0x21}, {&(0x7f0000002880)="1455fc3a4250de", 0x7}, {&(0x7f00000028c0)="0998417e9031c059f10d5dcd142b2f999a3eaefdd9bdc8f316bd7ab60410d51e93704590e15c821eb88e677b5b80c04732a04a4c65bc50", 0x37}, {&(0x7f0000002900)="bcf61056cfe77ad4ecc1bd5722b2b60b48d9fc9bd7f2f87ba6ec45c138f14cc24e3c4aebba7049d03dbcd46c735d6dcbf9bcb0cbf949eae823c7bbb1bebe5fe07d5587d23f9c4a02130cd52f55f94c3b5ad905f380729597a2acb2aa25ce43c7fda90c3a7f6b4cd72cb5e0b2329a2500bd9371d3e57fb814f3af152aee141fc950400a29e2250ac4", 0x88}, {&(0x7f00000029c0)="6c1ea4332d45b81af1cd2ec0528bf71778d4f95e4d83c147a029f195ba9184d5a8cb645e17c29931f4744c6961f9b618cd31c343c59ef40b1489ab9e23977cb884a7efe1e499439484f9e2cf16acd586f650f4c932881c9bbdcabda1c0049e6fc3ba32165553f0bec72f8a18867ca98157a6", 0x72}, {&(0x7f0000002a40)="b736b05ed06044ad6a9a78f652df4b7126a71d58c9f5e7e2e76ef0568930f2f480afcffbcccc4bdaf656f014d565ef7c07bc6f90d89b98b2616656488e74238aba737b555496026c794990c0fb2ee02412743076f586d5df8966b026c25886d96a469c059395b9026367e024369d3b401ccb992e169839c0e3e05f7cebb71fe0221d548d8c1d05ba", 0x88}], 0x6, &(0x7f0000002b80)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @tclass={{0x14, 0x29, 0x43, 0x80000000}}, @rthdrdstopts={{0x18, 0x29, 0x37, {0x3c}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x21, 0x1, [], [@ra={0x5, 0x2, 0x5}, @pad1, @pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}], 0xe8}}, {{&(0x7f0000002c80)={0xa, 0x4e23, 0x8001, @rand_addr="0653db95079899ac62d9008f1ea98e2f"}, 0x1c, &(0x7f0000002e80)=[{&(0x7f0000002cc0)="a24373ded0cfba49d925b15e25a95705dd9855c94144b43c366b9c502165fa9b99b9ecdd06007ba18c4c4f198ec105d0a08fd38d2961789fb1b07a3e4fc294dbff95670bfad7d013b808ec236a320bcc44af6b0bde4342c2d96747028a0515f33b9d87364cb8de06e1ac", 0x6a}, {&(0x7f0000002d40)="1a22ca005e705bc2a046bed3d87864cfb267e273f78b1060efa8291915825f897d67b6549f5f69777cb74dd2d95882199cd2e94dd6770529822f845bbb1899a3ff198b7feea149812d91e96416d1b547ab21150b985831ed5060e129e97f67a2922ed67856106573256d1cc89a77c9cf0d1834bf4dcba1afec3ef90a23a1769697f8023b746614c690c87224f80ec24c51b49e3007c0e1aaa0a6a87a", 0x9c}, {&(0x7f0000002e00)="f7d68aaf9493d82e6f54a463143e83c920bfdb4c7a2901b6c2f85c816efaae61ef15700f2545570f7583b9ff487c2d33b3d1558aca835ee93afee86ef0a57aacc66c5e51a5bd362710984793ceeb1e41765bf1d3fccec8f18887c4996844dccfbac0b574c39ce134a0e630d558c1f795dd43387b94f645534330919d4704ca", 0x7f}], 0x3, &(0x7f0000002ec0)=[@rthdrdstopts={{0x198, 0x29, 0x37, {0x5c, 0x2f, [], [@generic={0x20, 0xfc, "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"}, @generic={0x8, 0x72, "1331a7f9fb16560d9fac66234987e8528053c5c51a259b5d79f49ca3403758cee130eef161862018a6b19024216c5d8870bc1d34b0b24a3c7e4a9a9a26af3deb2480fc4c7a074cffa156c46002d3f5bed7af7c38e27c084405e4f6cb5dec4a22da5639fbcb64b5636903fbca552c8dff85e6"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7ff}}], 0x1b0}}, {{&(0x7f0000003080)={0xa, 0x4e24, 0x200, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, 0x1c, &(0x7f0000004500)=[{&(0x7f00000030c0)="d79d48caa933d18bc3242eedae05eaa0cf1680fe64374b3b4da81d121d5ca4a210667b846b946e470b5c9b2ef6603c486903c71adbf86d075a0192be32f6b3668313a4c4829584beef6bee1cd1394fdb8e57ac6dde5d6a50bd6c9c29c1e7c86f09868ecaff3e2f3f5dd6856b9883e32c18cb22450f006feb839d1ba708f142f203489ec643efa7fabb0ccc33d2b694381e7b", 0x92}, {&(0x7f0000003180)="263444a4b6b2b6eeb65b9206eae0eb20fd609ab76929f97dc8a0998df52ae3b36f345e45e420ff7d9dc0433f600de71593561b61f01c34856e920809037ab25c5dfd7b9d4d931b15c1987575bad5252e86c4139095e575db94d025066cf22c56585b53d0a2f213fe33f886930d6c2f76364bb1bc15b4", 0x76}, {&(0x7f0000003200)}, {&(0x7f0000003240)="267493242b17585c43c314e54deacb7e3ff25a5f2e89b0ca2f4ddff837b8d844a435f0f78e70b602e4473fe5d4b03ab9ea9c7279e1ddabe7ec15fdc24e37b9b64b82642ff89218246af5fbf7afbc15a8ef8bdcf737ff72c828104283e401585fde5c8f5f18da373628b7a72417cc2718e62bf0b160987821c06217ac0d854027b8a4eef4f3698f2fd89489557a91198f018f6a55ddaaa3f85f87f4", 0x9b}, {&(0x7f0000003300)="74c17f4462e337499dd88f33c1be686a10cb00085b8bad6b4ab55384cc65a0e6482c92e060acdbae7bb7bf6911d028aec961d7e5aba14dbe839cb6f345ab3ae304d3fd2a92426337775ecd132f0f75ba7f63f2917229a3d362a0d04349d75e36cb7c52e51bacaf19c8ba011b99500940c43abd01cbcd1ff67c0ebfadc70fafa216597dc4d8cc182ac965bbf21a8a5dbab79e140e7dbb7a16be242cdbfb7d137bd14542a0f66aa48971d60678358c67e10e56fe162b970083553c5257a300e24f8c2c28edf01343724d1be63a2e9f288711bedb63c823ce5fe593d157ae076160362ae00007e81e68f27ab47f950e60740954cc7c268379b258", 0xf9}, {&(0x7f0000003400)="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", 0x1000}, {&(0x7f0000004400)="174ccf289a688f5fbeaf21caf4810f6c451862b98583ab34e1676636b03387350176fc838f67914cc6e6b293926e059779a4db62ae60d6c41beebbd0a14349a16b30e4f2d1cc42", 0x47}, {&(0x7f0000004480)="6de06b35d89bfcdf43da277d6b33080bcc042ea37dd6187393da0a0b7964dd263f4436c76847f1256f79a6a4a9917a484fbfe74550598433b23e175bb220f5e86897", 0x42}], 0x8, &(0x7f0000004580)=[@hopopts={{0xa8, 0x29, 0x36, {0x67, 0x12, [], [@ra, @ra, @calipso={0x7, 0x28, {0x10000, 0x8, 0x9, 0x7e6a, [0x5a, 0x6, 0x4, 0xfffffffffffffff8]}}, @jumbo={0xc2, 0x4, 0xfff}, @ra, @calipso={0x7, 0x38, {0x15, 0xc, 0x7d, 0x119f, [0x100000001, 0x2, 0x100, 0x20, 0x9, 0x0]}}, @calipso={0x7, 0x18, {0xd1f, 0x4, 0x3, 0x3, [0x4, 0x8001]}}]}}}, @dstopts_2292={{0x78, 0x29, 0x4, {0x2e, 0xb, [], [@jumbo={0xc2, 0x4, 0x1ff}, @calipso={0x7, 0x48, {0xd5d5, 0x10, 0x3c, 0x5, [0x8001, 0x4, 0x3, 0x1, 0x2b, 0x1000, 0x6, 0xe4c9]}}, @pad1, @jumbo={0xc2, 0x4, 0x1}, @enc_lim={0x4, 0x1, 0xff}]}}}, @rthdrdstopts={{0x1230, 0x29, 0x37, {0x87, 0x243, [], [@ra={0x5, 0x2, 0xed62}, @hao={0xc9, 0x10, @remote}, @pad1, @generic={0x2, 0xfc, "9ac859c95b810090eef9b095f4b86fbbcd79be0165a8209aa41386f89b6ca2d993e38df26cb45879e13e15c0ec4046d1981eccb6e1e3e9eb39d3460bdc513b80d2ad4669ca54876e783847c75553227d80ebf308d3c87140afa411cec8806dd2973ab2d0f2d8901c40f64e47759630459c971375a2316c2199258d439b5d5550cf954c26a67106a1a846f562a20a09834c635c227699b8b6403f420d0fe15a01f7dc39f4c93027c4ba116f624b6ac1d4a0339a1294d8032991d54e03d7b929e20e97a568f337bd05ef678bd27dce8efdf07d049db9a713fa067252596329e7afd899e774e0d25113a780bb979cae3039b9efe2066b9e437c238f023e"}, @generic={0x1, 0x1000, "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"}, @pad1, @jumbo={0xc2, 0x4, 0x8beb}, @generic={0x81, 0xf4, "e4569abde05c955b32abaaad2509b6a7626972957dae4e29e10d513cf19c156a7a0f2ed4fc184b12c3141f096f8c1a5cc4d63343263437124594c204e8cd44238fc267af1f0ecfd29a3cd26edf34e38ac113522f4c543cee934eff795e43f4deba76f58a1285a0e49b6d75ccbb047279a5debe2ed360bfb61021adc14583b7eb7310dc69fced952d48a3872d37a6901f38584a7d1a38feede8212d520aa1f3d06b74733c6d245a42e3b0fd8a3be6ba1592021c9a94011f63a544b137fb8f895f9ec5dfc3572d8ed193d8f6bc9ac2ec897712e75174cf691bb490ce27d1e1cfb037064f3b80216556eaf7115c18c3896e0f0495e8"}]}}}], 0x1350}}, {{0x0, 0x0, &(0x7f0000005940)=[{&(0x7f0000005900)="37f69e7c8d0982e4742626f1147994f435f22103e08f664939b9", 0x1a}], 0x1}}, {{&(0x7f0000005980)={0xa, 0x4e23, 0x330b, @mcast1, 0x6}, 0x1c, &(0x7f0000006d00)=[{&(0x7f00000059c0)="6febadd8c88c2a", 0x7}, {&(0x7f0000005a00)="8362962fcce53c058758ff80356d867ca6dfcd2af58faeea", 0x18}, {&(0x7f0000005a40)="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", 0x1000}, {&(0x7f0000006a40)="9897b0a65a94822382fdcabd3c77db49f78a0e4d24fde4cbc234825076bc4f590a4235e6656c671b5eb09ed4abe03699392b01684868e3550a5e745c66d69ce44ff91cefb2c4f8340eb0b367cce4a9914ce1cfa7009df5b921e2eb3c4aa8aabefef57fdc5c90087a950ecc5776695c0c014171eaa03f0cda470d24b1959e2f812f239022952126bb2b0ac32e785b1ff881ee4157d9d74d2ff638013d3f15cf5ebfed251a564cdd3646df60a7ba31e87292dc17473059177c1663c0d37f12f7e2f1f961cad6b6be8a783c0a6dd1", 0xcd}, {&(0x7f0000006b40)="3ae64b97ced217811f559516be3de868f9f2fbc694ec0a3664739d6beb43a4a4fd4e7db5a966d142a49b505f1ebe24a0274217c87f3d823b55867a1ca22d378c24b1068fb8b97f0dacc147da5835564bff0e1af5becca0bd24d92cfbbf92771a8db5dbda53", 0x65}, {&(0x7f0000006bc0)="003977a3dc3dfd79d7b1049d1eec", 0xe}, {&(0x7f0000006c00)="13013a2ad4399ea899335bb5ed1cb3601c4af602db9adb05c7e6b4ad307603bf413cf12bce8c4c59122625d98cf94a", 0x2f}, {&(0x7f0000006c40)="41618aec7db8d1cfaeb5c323509fc0ead97c073c27a4468f03c51b9605b3d5b59a935457e627d7922cf6389bf008b8a5c6117c2dfed20410d58d77df1d5c00521aecd19847999dd07fa1ec648f637c3864b289fba63f056c9394744dcf96aa102050ba2ca692a87f9323ee0cdb10e86ac9ffd9c21ebddafcf94431c443b0da91ae1b4d23c12f52553b9f67153fb95bf5cb20dfdc7f4e3b31afe9af31166c9490b9bb87d6c75aa232213016a917158f2e3a", 0xb1}], 0x8, &(0x7f0000006d80)=[@dstopts_2292={{0x100, 0x29, 0x4, {0x88, 0x1c, [], [@calipso={0x7, 0x40, {0x7fffffff, 0xe, 0x0, 0x6, [0x8, 0x9, 0x4809, 0x3f, 0x5, 0x7fffffff, 0xe63d]}}, @calipso={0x7, 0x48, {0x7, 0x10, 0x5, 0xc52f, [0x900, 0x0, 0x0, 0x8, 0x3, 0x100000000, 0x3, 0x1]}}, @jumbo={0xc2, 0x4, 0x6}, @hao={0xc9, 0x10, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}}, @calipso={0x7, 0x40, {0x3, 0xe, 0x2, 0xbb, [0xfffffffffffffffb, 0x2, 0x5, 0x7, 0x4, 0x0, 0x400]}}]}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x32, 0x2, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x1f}}]}}}], 0x130}}], 0x8, 0x2) 04:02:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0xf, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2483.463974][ T4504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2483.463985][ T4504] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x10000120}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xfe800000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x804801) ioctl$RTC_UIE_ON(r1, 0x7003) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:39 executing program 5 (fault-call:9 fault-nth:37): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x10, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2483.965217][ T4960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:02:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xfec00000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0xfffffd3f}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x10) getsockopt$nfc_llcp(r1, 0x118, 0x4, &(0x7f00000000c0)=""/74, 0x4a) [ 2484.025815][ T5059] FAULT_INJECTION: forcing a failure. [ 2484.025815][ T5059] name failslab, interval 1, probability 0, space 0, times 0 [ 2484.067080][ T5059] CPU: 0 PID: 5059 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2484.074975][ T5059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2484.085100][ T5059] Call Trace: [ 2484.088425][ T5059] dump_stack+0x11d/0x181 [ 2484.092773][ T5059] should_fail.cold+0xa/0x1a [ 2484.097389][ T5059] __should_failslab+0xee/0x130 [ 2484.102314][ T5059] should_failslab+0x9/0x14 [ 2484.107132][ T5059] kmem_cache_alloc_node+0x39/0x660 [ 2484.112548][ T5059] ? __schedule+0x31e/0x690 [ 2484.117073][ T5059] __alloc_skb+0x8e/0x360 [ 2484.121420][ T5059] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2484.127386][ T5059] sock_wmalloc+0xb8/0x110 [ 2484.131830][ T5059] pppol2tp_sendmsg+0x15a/0x3c0 [ 2484.136702][ T5059] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2484.141826][ T5059] sock_sendmsg+0x9f/0xc0 [ 2484.146170][ T5059] ___sys_sendmsg+0x2b7/0x5d0 [ 2484.150916][ T5059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2484.157180][ T5059] ? __rcu_read_unlock+0x66/0x3c0 04:02:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xff000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:39 executing program 3: getpeername(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000040)=0x80) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="50452495b54c6a694c2cd04fa89172ec", 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000180)={@ipv4={[], [], @remote}, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@mcast1, @mcast2, @loopback, 0x7, 0x7, 0x1, 0xc00, 0x79c0bdff, 0x10000, r2}) [ 2484.162250][ T5059] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2484.168219][ T5059] ? __fget+0xb8/0x1d0 [ 2484.172306][ T5059] ? __fget_light+0xaf/0x190 [ 2484.176940][ T5059] ? __fdget+0x2c/0x40 [ 2484.181032][ T5059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2484.187309][ T5059] __sys_sendmmsg+0x123/0x350 [ 2484.192118][ T5059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2484.198565][ T5059] ? fput_many+0xec/0x130 [ 2484.202908][ T5059] ? fput+0x29/0x30 [ 2484.206797][ T5059] ? ksys_write+0x145/0x1b0 [ 2484.211474][ T5059] __x64_sys_sendmmsg+0x64/0x80 [ 2484.216344][ T5059] do_syscall_64+0xcc/0x370 [ 2484.220938][ T5059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2484.226917][ T5059] RIP: 0033:0x45a639 [ 2484.230937][ T5059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2484.250659][ T5059] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2484.259127][ T5059] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:02:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x11, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x2, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2484.267109][ T5059] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2484.275085][ T5059] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2484.283065][ T5059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2484.291408][ T5059] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2484.375220][ T5383] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:02:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x11000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x10000000) 04:02:40 executing program 5 (fault-call:9 fault-nth:38): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:40 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x12, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x3, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x4, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2484.984362][ T5611] FAULT_INJECTION: forcing a failure. [ 2484.984362][ T5611] name failslab, interval 1, probability 0, space 0, times 0 [ 2484.997921][ T5611] CPU: 0 PID: 5611 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2485.005873][ T5611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2485.016078][ T5611] Call Trace: [ 2485.019388][ T5611] dump_stack+0x11d/0x181 [ 2485.023797][ T5611] should_fail.cold+0xa/0x1a [ 2485.028409][ T5611] __should_failslab+0xee/0x130 [ 2485.033279][ T5611] should_failslab+0x9/0x14 [ 2485.037790][ T5611] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2485.043535][ T5611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2485.049858][ T5611] ? memcg_kmem_put_cache+0x91/0xe0 [ 2485.055076][ T5611] __kmalloc_node_track_caller+0x38/0x50 [ 2485.060724][ T5611] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2485.066176][ T5611] __alloc_skb+0xc2/0x360 [ 2485.070528][ T5611] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2485.076494][ T5611] sock_wmalloc+0xb8/0x110 [ 2485.081105][ T5611] pppol2tp_sendmsg+0x15a/0x3c0 [ 2485.085995][ T5611] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2485.091292][ T5611] sock_sendmsg+0x9f/0xc0 [ 2485.095640][ T5611] ___sys_sendmsg+0x2b7/0x5d0 [ 2485.100324][ T5611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2485.106644][ T5611] ? __rcu_read_unlock+0x66/0x3c0 [ 2485.111684][ T5611] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2485.117676][ T5611] ? __fget+0xb8/0x1d0 [ 2485.121823][ T5611] ? __fget_light+0xaf/0x190 [ 2485.126410][ T5611] ? __fdget+0x2c/0x40 04:02:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x5, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2485.130467][ T5611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2485.136824][ T5611] __sys_sendmmsg+0x123/0x350 [ 2485.141521][ T5611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2485.147864][ T5611] ? fput_many+0xec/0x130 [ 2485.152216][ T5611] ? fput+0x29/0x30 [ 2485.156033][ T5611] ? ksys_write+0x145/0x1b0 [ 2485.160617][ T5611] __x64_sys_sendmmsg+0x64/0x80 [ 2485.165486][ T5611] do_syscall_64+0xcc/0x370 [ 2485.169997][ T5611] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2485.175922][ T5611] RIP: 0033:0x45a639 [ 2485.179860][ T5611] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2485.199486][ T5611] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2485.207912][ T5611] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2485.215888][ T5611] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2485.223883][ T5611] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:02:40 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x13, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000041c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)=""/51, 0x33}, {&(0x7f00000000c0)=""/180, 0xb4}, {&(0x7f0000000180)=""/251, 0xfb}], 0x3, &(0x7f00000002c0)=""/51, 0x33}, 0x80}, {{&(0x7f0000000300)=@tipc=@name, 0x80, &(0x7f0000000380)=[{&(0x7f0000000400)=""/247, 0xf7}], 0x1}}, {{&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000001840)=[{&(0x7f0000000580)=""/86, 0x56}, {&(0x7f0000000600)=""/79, 0x4f}, {&(0x7f0000000680)=""/30, 0x1e}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/190, 0xbe}, {&(0x7f0000001780)=""/138, 0x8a}], 0x6, &(0x7f00000018c0)=""/119, 0x77}, 0x6}, {{0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/176, 0xb0}, {&(0x7f0000002a00)=""/25, 0x19}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000002b00)=""/39, 0x27}, {&(0x7f0000002b40)=""/245, 0xf5}, {&(0x7f0000002c40)=""/4096, 0x1000}], 0x7, &(0x7f0000003cc0)=""/118, 0x76}, 0x3}, {{&(0x7f0000003d40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003dc0)=""/155, 0x9b}, {&(0x7f0000003e80)=""/218, 0xda}], 0x2, &(0x7f0000003fc0)=""/147, 0x93}, 0x5}], 0x5, 0x2000, &(0x7f0000004200)={r1, r2+10000000}) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x6, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2485.231938][ T5611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2485.239923][ T5611] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2485.335997][ T5867] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:02:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:41 executing program 5 (fault-call:9 fault-nth:39): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:41 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x7, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x14, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2485.821376][ T6153] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2485.883286][ T6164] FAULT_INJECTION: forcing a failure. [ 2485.883286][ T6164] name failslab, interval 1, probability 0, space 0, times 0 [ 2485.895966][ T6164] CPU: 0 PID: 6164 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2485.903842][ T6164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2485.913929][ T6164] Call Trace: [ 2485.917237][ T6164] dump_stack+0x11d/0x181 [ 2485.921587][ T6164] should_fail.cold+0xa/0x1a [ 2485.926245][ T6164] __should_failslab+0xee/0x130 [ 2485.931111][ T6164] should_failslab+0x9/0x14 [ 2485.935631][ T6164] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2485.941358][ T6164] ? should_fail+0xd4/0x45d [ 2485.945883][ T6164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2485.952155][ T6164] __kmalloc_node_track_caller+0x38/0x50 [ 2485.957802][ T6164] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2485.963233][ T6164] pskb_expand_head+0x102/0x750 [ 2485.968102][ T6164] ? iov_iter_advance+0x211/0x9d0 [ 2485.973146][ T6164] l2tp_xmit_skb+0x754/0x8e0 [ 2485.977784][ T6164] ? skb_put+0xeb/0x110 04:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x8, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2485.982002][ T6164] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2485.986867][ T6164] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2485.991991][ T6164] sock_sendmsg+0x9f/0xc0 [ 2485.996358][ T6164] ___sys_sendmsg+0x2b7/0x5d0 [ 2486.001048][ T6164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2486.007303][ T6164] ? __rcu_read_unlock+0x66/0x3c0 [ 2486.012424][ T6164] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2486.018340][ T6164] ? __fget+0xb8/0x1d0 [ 2486.022487][ T6164] ? __fget_light+0xaf/0x190 [ 2486.027095][ T6164] ? __fdget+0x2c/0x40 [ 2486.031177][ T6164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2486.037425][ T6164] __sys_sendmmsg+0x123/0x350 [ 2486.042123][ T6164] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2486.048382][ T6164] ? fput_many+0xec/0x130 [ 2486.052723][ T6164] ? fput+0x29/0x30 [ 2486.056607][ T6164] ? ksys_write+0x145/0x1b0 [ 2486.061153][ T6164] __x64_sys_sendmmsg+0x64/0x80 [ 2486.066089][ T6164] do_syscall_64+0xcc/0x370 [ 2486.070676][ T6164] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2486.076574][ T6164] RIP: 0033:0x45a639 [ 2486.080557][ T6164] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2486.100171][ T6164] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2486.108752][ T6164] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2486.116729][ T6164] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2486.124707][ T6164] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:02:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80000001, 0x8000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001400)={@loopback, 0x0}, &(0x7f0000001440)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r10], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r10}) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r13, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r13], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r13}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r16, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r16], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r16}) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r17, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r19, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r19], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r19}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001980)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001940)={&(0x7f00000019c0)={0x4b8, r6, 0x9, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r5}, {0x128, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x100, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_tx_hash_to_port_mapping={{{0x0, 0x1, 'lb_tx_hash_to_port_mapping\x00'}}}}]}}, {{0x8, 0x1, r5}, {0x168, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x9, 0x8, 0x0, 0x5}, {0x7, 0x0, 0x81, 0x5}, {0x1, 0xff, 0xb5, 0x847}, {0xe079, 0x0, 0x26, 0x9}, {0x7, 0x52, 0x1f}, {0x1, 0x1, 0x8, 0x2}, {0x27, 0x58, 0xf8, 0x5}, {0x73, 0x54, 0x1, 0x2}, {0x3, 0x6, 0x5, 0x4d6f1969}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9e6}}}]}}]}, 0x4b8}, 0x1, 0x0, 0x0, 0x8000}, 0x2040004) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r5}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x781040, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000100)=@xdp={0x2c, 0xc, r5, 0x16}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000180)="854bfe066f15237140ca76490dd3aee48401e19012a37c9fd6c636de3a01d7365e6c06289e", 0x25}, {&(0x7f00000001c0)="c4ee08130111c045ca1ded30424231da82f04d2aaf69aa70678108e1fc259c4bb5034f208a84a2e4d4e64f3d1580727a9b02", 0x32}, {&(0x7f0000000200)="fba64c5b13d0ab7e6f261e593d0efb0351aa077b3779601a888a8beb236c86", 0x1f}], 0x4}, 0x2) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000000c0)=""/54) 04:02:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x20010010}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2486.132700][ T6164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2486.140680][ T6164] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x2f, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:41 executing program 5 (fault-call:9 fault-nth:40): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x9, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2486.368044][ T6493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xb, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 2486.464242][ T6605] FAULT_INJECTION: forcing a failure. [ 2486.464242][ T6605] name failslab, interval 1, probability 0, space 0, times 0 [ 2486.477083][ T6605] CPU: 0 PID: 6605 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2486.484908][ T6605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2486.495042][ T6605] Call Trace: [ 2486.498399][ T6605] dump_stack+0x11d/0x181 [ 2486.502766][ T6605] should_fail.cold+0xa/0x1a [ 2486.507451][ T6605] __should_failslab+0xee/0x130 04:02:41 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x5a, 0x3, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2486.512377][ T6605] should_failslab+0x9/0x14 [ 2486.516922][ T6605] kmem_cache_alloc+0x29/0x5d0 [ 2486.521699][ T6605] skb_clone+0xf9/0x290 [ 2486.525869][ T6605] ip_mc_output+0x1fd/0x620 [ 2486.530394][ T6605] ? constant_test_bit+0x30/0x30 [ 2486.535349][ T6605] ip_local_out+0x74/0x90 [ 2486.539691][ T6605] __ip_queue_xmit+0x3a8/0xa40 [ 2486.544516][ T6605] l2tp_xmit_skb+0x574/0x8e0 [ 2486.549122][ T6605] ? skb_put+0xeb/0x110 [ 2486.553319][ T6605] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2486.558185][ T6605] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2486.563307][ T6605] sock_sendmsg+0x9f/0xc0 [ 2486.567651][ T6605] ___sys_sendmsg+0x2b7/0x5d0 [ 2486.572342][ T6605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2486.578595][ T6605] ? __rcu_read_unlock+0x66/0x3c0 [ 2486.583657][ T6605] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2486.589707][ T6605] ? __fget+0xb8/0x1d0 [ 2486.600044][ T6605] ? __fget_light+0xaf/0x190 [ 2486.604635][ T6605] ? __fdget+0x2c/0x40 [ 2486.608710][ T6605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 04:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0x1b, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2486.614978][ T6605] __sys_sendmmsg+0x123/0x350 [ 2486.619702][ T6605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2486.626034][ T6605] ? fput_many+0xec/0x130 [ 2486.630377][ T6605] ? fput+0x29/0x30 [ 2486.634199][ T6605] ? ksys_write+0x145/0x1b0 [ 2486.638763][ T6605] __x64_sys_sendmmsg+0x64/0x80 [ 2486.643696][ T6605] do_syscall_64+0xcc/0x370 [ 2486.648222][ T6605] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2486.654115][ T6605] RIP: 0033:0x45a639 [ 2486.658056][ T6605] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2486.660658][ T6617] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2486.677754][ T6605] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2486.677813][ T6605] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2486.677824][ T6605] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 04:02:42 executing program 5 (fault-call:9 fault-nth:41): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2486.677835][ T6605] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2486.677844][ T6605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2486.677853][ T6605] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2486.738718][ T6615] net_ratelimit: 38 callbacks suppressed [ 2486.738736][ T6615] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) 04:02:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2486.757253][ T6615] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2486.771100][ T6615] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2486.771204][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2486.783265][ T6615] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2486.788788][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2486.987263][ T6826] FAULT_INJECTION: forcing a failure. [ 2486.987263][ T6826] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.000250][ T6826] CPU: 0 PID: 6826 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2487.001205][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2487.008064][ T6826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2487.008071][ T6826] Call Trace: [ 2487.008192][ T6826] dump_stack+0x11d/0x181 [ 2487.013869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2487.023944][ T6826] should_fail.cold+0xa/0x1a [ 2487.023967][ T6826] __should_failslab+0xee/0x130 [ 2487.024025][ T6826] should_failslab+0x9/0x14 [ 2487.051339][ T6826] kmem_cache_alloc+0x29/0x5d0 [ 2487.056121][ T6826] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2487.062009][ T6826] dst_alloc+0xad/0x149 [ 2487.066168][ T6826] rt_dst_clone+0x5c/0x3b0 [ 2487.070591][ T6826] ip_mc_finish_output+0x68/0x340 [ 2487.075690][ T6826] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2487.081570][ T6826] ? nf_hook_slow+0xb8/0x160 [ 2487.086161][ T6826] ip_mc_output+0x32c/0x620 [ 2487.090723][ T6826] ? ip_copy_addrs+0x50/0x50 [ 2487.095376][ T6826] ip_local_out+0x74/0x90 [ 2487.099693][ T6826] __ip_queue_xmit+0x3a8/0xa40 [ 2487.104521][ T6826] l2tp_xmit_skb+0x574/0x8e0 [ 2487.109175][ T6826] ? skb_put+0xeb/0x110 [ 2487.113328][ T6826] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2487.118196][ T6826] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2487.123356][ T6826] sock_sendmsg+0x9f/0xc0 [ 2487.127758][ T6826] ___sys_sendmsg+0x2b7/0x5d0 [ 2487.132463][ T6826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2487.138726][ T6826] ? __rcu_read_unlock+0x66/0x3c0 [ 2487.143766][ T6826] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2487.149671][ T6826] ? __fget+0xb8/0x1d0 [ 2487.153761][ T6826] ? __fget_light+0xaf/0x190 [ 2487.158375][ T6826] ? __fdget+0x2c/0x40 [ 2487.162459][ T6826] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2487.168898][ T6826] __sys_sendmmsg+0x123/0x350 [ 2487.173640][ T6826] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2487.180056][ T6826] ? fput_many+0xec/0x130 [ 2487.184400][ T6826] ? fput+0x29/0x30 04:02:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x2c010000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x2, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="200000008599c3add86c0b21b11e70bb2e5f591016b8a655da602ec7ab28298f461828c39f41fb62c3a2b57a088a8bd4355fa1a56c8553416af6b38e8e0764912e3585603ce88b2eb9cae253f7df40cc4936758371788a509934cd5e159b7e49c6045d4c2b1375112885d21cbf57444dca8befae43c7adfdbc53713dd91c6087228dbbc1cce91043201e9f079418962083bb037959a5", @ANYRES16=r1, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x20004004}, 0x40001) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x800) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000280)=""/15) [ 2487.188290][ T6826] ? ksys_write+0x145/0x1b0 [ 2487.192924][ T6826] __x64_sys_sendmmsg+0x64/0x80 [ 2487.197865][ T6826] do_syscall_64+0xcc/0x370 [ 2487.202402][ T6826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2487.208378][ T6826] RIP: 0033:0x45a639 [ 2487.212295][ T6826] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2487.231931][ T6826] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2487.240336][ T6826] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2487.248393][ T6826] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2487.256372][ T6826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2487.264357][ T6826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2487.272344][ T6826] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2487.272868][ T6939] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 04:02:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x2, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:42 executing program 5 (fault-call:9 fault-nth:42): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x4, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa00, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f00000000c0)=[0x2, 0x6]) r2 = syz_open_dev$mice(&(0x7f00000005c0)='/dev/input/mice\x00', 0x0, 0x20002) r3 = syz_open_dev$vcsn(&(0x7f0000000a40)='/dev/vcs#\x00', 0x7ff, 0x400042) openat$cgroup_procs(r3, &(0x7f0000000a80)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000600)=[@in={0x2, 0x4e22, @broadcast}], 0x10) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x3, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2487.543215][ T7158] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2487.555311][ T7158] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:02:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2487.667381][ T7365] FAULT_INJECTION: forcing a failure. [ 2487.667381][ T7365] name failslab, interval 1, probability 0, space 0, times 0 [ 2487.680122][ T7365] CPU: 1 PID: 7365 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2487.687927][ T7365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2487.698062][ T7365] Call Trace: [ 2487.701396][ T7365] dump_stack+0x11d/0x181 [ 2487.705753][ T7365] should_fail.cold+0xa/0x1a [ 2487.710362][ T7365] __should_failslab+0xee/0x130 [ 2487.715226][ T7365] should_failslab+0x9/0x14 [ 2487.719738][ T7365] kmem_cache_alloc+0x29/0x5d0 [ 2487.729914][ T7365] ? __read_once_size.constprop.0+0x20/0x20 [ 2487.735960][ T7365] skb_clone+0xf9/0x290 [ 2487.740129][ T7365] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2487.746483][ T7365] dev_queue_xmit_nit+0x24a/0x540 [ 2487.751620][ T7365] ? constant_test_bit+0x30/0x30 [ 2487.756575][ T7365] dev_hard_start_xmit+0x3f5/0x430 [ 2487.761702][ T7365] __dev_queue_xmit+0x14ab/0x1b40 [ 2487.766850][ T7365] ? ipt_do_table+0x8e9/0xe60 [ 2487.771530][ T7365] ? __this_cpu_preempt_check+0x4a/0x170 [ 2487.777300][ T7365] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2487.783318][ T7365] ? __rcu_read_unlock+0x66/0x3c0 [ 2487.788365][ T7365] ? nf_nat_packet+0xc2/0x110 [ 2487.793094][ T7365] dev_queue_xmit+0x21/0x30 [ 2487.797647][ T7365] ip_finish_output2+0x836/0xe40 [ 2487.802600][ T7365] __ip_finish_output+0x23a/0x490 [ 2487.807623][ T7365] ? ipv4_confirm+0xdc/0x160 [ 2487.812224][ T7365] ip_finish_output+0x41/0x160 04:02:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ec4a4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2487.817000][ T7365] ip_mc_output+0x143/0x620 [ 2487.821516][ T7365] ? __ip_finish_output+0x490/0x490 [ 2487.826738][ T7365] ip_local_out+0x74/0x90 [ 2487.831174][ T7365] __ip_queue_xmit+0x3a8/0xa40 [ 2487.835958][ T7365] l2tp_xmit_skb+0x574/0x8e0 [ 2487.840564][ T7365] ? skb_put+0xeb/0x110 [ 2487.844735][ T7365] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2487.849617][ T7365] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2487.854716][ T7365] sock_sendmsg+0x9f/0xc0 [ 2487.859053][ T7365] ___sys_sendmsg+0x2b7/0x5d0 [ 2487.863930][ T7365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2487.870195][ T7365] ? __rcu_read_unlock+0x66/0x3c0 [ 2487.875204][ T7365] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2487.881095][ T7365] ? __fget+0xb8/0x1d0 [ 2487.885178][ T7365] ? __fget_light+0xaf/0x190 [ 2487.889779][ T7365] ? __fdget+0x2c/0x40 [ 2487.893834][ T7365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2487.900162][ T7365] __sys_sendmmsg+0x123/0x350 [ 2487.904842][ T7365] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2487.911125][ T7365] ? fput_many+0xec/0x130 [ 2487.915451][ T7365] ? fput+0x29/0x30 [ 2487.919243][ T7365] ? ksys_write+0x145/0x1b0 [ 2487.923746][ T7365] __x64_sys_sendmmsg+0x64/0x80 [ 2487.928679][ T7365] do_syscall_64+0xcc/0x370 [ 2487.933225][ T7365] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2487.939100][ T7365] RIP: 0033:0x45a639 [ 2487.942983][ T7365] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2487.962578][ T7365] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2487.971077][ T7365] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2487.979085][ T7365] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2487.987049][ T7365] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2487.995049][ T7365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2488.003010][ T7365] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x3f000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x5, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xcc, 0x88a00) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) 04:02:43 executing program 5 (fault-call:9 fault-nth:43): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x4, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2488.205950][ T7637] FAULT_INJECTION: forcing a failure. [ 2488.205950][ T7637] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.218644][ T7637] CPU: 0 PID: 7637 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2488.226451][ T7637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2488.236508][ T7637] Call Trace: [ 2488.239889][ T7637] dump_stack+0x11d/0x181 [ 2488.244239][ T7637] should_fail.cold+0xa/0x1a [ 2488.248845][ T7637] __should_failslab+0xee/0x130 [ 2488.253714][ T7637] should_failslab+0x9/0x14 [ 2488.258225][ T7637] kmem_cache_alloc+0x29/0x5d0 [ 2488.263083][ T7637] skb_clone+0xf9/0x290 [ 2488.267258][ T7637] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2488.273743][ T7637] dev_queue_xmit_nit+0x24a/0x540 [ 2488.278788][ T7637] ? constant_test_bit+0x30/0x30 [ 2488.283741][ T7637] dev_hard_start_xmit+0x3f5/0x430 [ 2488.288904][ T7637] __dev_queue_xmit+0x14ab/0x1b40 [ 2488.293950][ T7637] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2488.300191][ T7637] ? nf_ct_bridge_post+0x22f/0xb50 [ 2488.305293][ T7637] ? debug_smp_processor_id+0x4c/0x172 [ 2488.311046][ T7637] dev_queue_xmit+0x21/0x30 [ 2488.315574][ T7637] br_dev_queue_push_xmit+0x2c1/0x330 [ 2488.320987][ T7637] ? nf_hook_slow+0xb8/0x160 [ 2488.325696][ T7637] br_forward_finish+0x177/0x190 [ 2488.330657][ T7637] ? br_fdb_add.cold+0x88/0x88 [ 2488.335428][ T7637] __br_forward+0x331/0x4a0 [ 2488.340021][ T7637] ? __read_once_size.constprop.0+0x20/0x20 [ 2488.345925][ T7637] br_flood+0x31a/0x330 [ 2488.350094][ T7637] br_dev_xmit+0x680/0x920 04:02:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x6, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:43 executing program 3: r0 = socket$kcm(0x10, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x5, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2488.354525][ T7637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2488.360844][ T7637] dev_hard_start_xmit+0xef/0x430 [ 2488.365927][ T7637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2488.372322][ T7637] __dev_queue_xmit+0x14ab/0x1b40 [ 2488.377419][ T7637] ? ipt_do_table+0x8e9/0xe60 [ 2488.382293][ T7637] ? __this_cpu_preempt_check+0x4a/0x170 [ 2488.387993][ T7637] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2488.393907][ T7637] ? __rcu_read_unlock+0x66/0x3c0 [ 2488.398971][ T7637] ? nf_nat_packet+0xc2/0x110 [ 2488.403688][ T7637] dev_queue_xmit+0x21/0x30 [ 2488.408201][ T7637] ip_finish_output2+0x836/0xe40 [ 2488.413212][ T7637] __ip_finish_output+0x23a/0x490 [ 2488.418243][ T7637] ? ipv4_confirm+0xdc/0x160 [ 2488.422864][ T7637] ip_finish_output+0x41/0x160 [ 2488.427647][ T7637] ip_mc_output+0x143/0x620 [ 2488.432248][ T7637] ? __ip_finish_output+0x490/0x490 [ 2488.437476][ T7637] ip_local_out+0x74/0x90 [ 2488.441826][ T7637] __ip_queue_xmit+0x3a8/0xa40 [ 2488.446629][ T7637] l2tp_xmit_skb+0x574/0x8e0 [ 2488.451226][ T7637] ? skb_put+0xeb/0x110 04:02:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x264, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x5}], 0x1}, 0x4) [ 2488.455397][ T7637] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2488.460264][ T7637] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2488.465389][ T7637] sock_sendmsg+0x9f/0xc0 [ 2488.469768][ T7637] ___sys_sendmsg+0x2b7/0x5d0 [ 2488.474460][ T7637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2488.480935][ T7637] ? __rcu_read_unlock+0x66/0x3c0 [ 2488.485973][ T7637] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2488.491886][ T7637] ? __fget+0xb8/0x1d0 [ 2488.495973][ T7637] ? __fget_light+0xaf/0x190 [ 2488.500664][ T7637] ? __fdget+0x2c/0x40 04:02:43 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x7, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2488.504846][ T7637] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2488.511154][ T7637] __sys_sendmmsg+0x123/0x350 [ 2488.515878][ T7637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2488.522268][ T7637] ? fput_many+0xec/0x130 [ 2488.526606][ T7637] ? fput+0x29/0x30 [ 2488.530429][ T7637] ? ksys_write+0x145/0x1b0 [ 2488.535101][ T7637] __x64_sys_sendmmsg+0x64/0x80 [ 2488.540053][ T7637] do_syscall_64+0xcc/0x370 [ 2488.544574][ T7637] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2488.550592][ T7637] RIP: 0033:0x45a639 [ 2488.554498][ T7637] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2488.574183][ T7637] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2488.582600][ T7637] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2488.590584][ T7637] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2488.598747][ T7637] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2488.606725][ T7637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2488.614840][ T7637] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:44 executing program 5 (fault-call:9 fault-nth:44): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2488.852219][ T7967] FAULT_INJECTION: forcing a failure. [ 2488.852219][ T7967] name failslab, interval 1, probability 0, space 0, times 0 [ 2488.864930][ T7967] CPU: 0 PID: 7967 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2488.872730][ T7967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2488.882774][ T7967] Call Trace: [ 2488.886071][ T7967] dump_stack+0x11d/0x181 [ 2488.890480][ T7967] should_fail.cold+0xa/0x1a [ 2488.895135][ T7967] __should_failslab+0xee/0x130 [ 2488.900007][ T7967] should_failslab+0x9/0x14 [ 2488.904498][ T7967] kmem_cache_alloc_node+0x39/0x660 [ 2488.909801][ T7967] __alloc_skb+0x8e/0x360 [ 2488.914131][ T7967] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2488.920367][ T7967] sock_wmalloc+0xb8/0x110 [ 2488.924783][ T7967] pppol2tp_sendmsg+0x15a/0x3c0 [ 2488.929626][ T7967] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2488.934730][ T7967] sock_sendmsg+0x9f/0xc0 [ 2488.939110][ T7967] ___sys_sendmsg+0x2b7/0x5d0 [ 2488.943792][ T7967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2488.950067][ T7967] ? __rcu_read_unlock+0x66/0x3c0 [ 2488.955077][ T7967] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2488.960975][ T7967] ? __fget+0xb8/0x1d0 [ 2488.965138][ T7967] ? __fget_light+0xaf/0x190 [ 2488.969792][ T7967] ? __fdget+0x2c/0x40 [ 2488.973863][ T7967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2488.980145][ T7967] __sys_sendmmsg+0x123/0x350 [ 2488.984925][ T7967] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2488.991166][ T7967] ? fput_many+0xec/0x130 [ 2488.995597][ T7967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2489.001839][ T7967] ? debug_smp_processor_id+0x4c/0x172 [ 2489.007296][ T7967] __x64_sys_sendmmsg+0x64/0x80 [ 2489.012221][ T7967] do_syscall_64+0xcc/0x370 [ 2489.016899][ T7967] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2489.022895][ T7967] RIP: 0033:0x45a639 [ 2489.026826][ T7967] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:02:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x40000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x8, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@ax25={{0x3, @default, 0x4}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="fa1a387f88bb14e7df26f483af218c3dc559a4008e1d13e03b1b5488a0cfac073e427abfddc57c4abb7c0e8fd36d99b424ea54cd404f6bf210a96fb5f06c8ff20c574ec5ab3dd2235ca492ec96098d1fc846f5a0d6d22ead3c7e38329b51903f8a87f10cfa69465142379fef535351ab75aaca5ed982a12ee64833557bb2087a294b32f72ae3", 0x86}, {&(0x7f0000000040)="c4be5b8279e9a48d658cecd6590e41f28512", 0x12}], 0x2}, 0x8000001) 04:02:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x6, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2489.046433][ T7967] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2489.054840][ T7967] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2489.063011][ T7967] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2489.070994][ T7967] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2489.078978][ T7967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2489.086959][ T7967] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2489.156006][ T8170] netlink: 'syz-executor.1': attribute type 8 has an invalid length. 04:02:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0xa3, "a5cef413302548d374445e6eb1a15c24fb0b986798d87faee694be8b9f7c52cd08e00dc7d14f54da5449c4b699e412ed49ac3791d2d5ef4e869339b862c28bf7a63ca9cf97326a3be10eaa06cf28aeda7fd73ff684cff79e506a2b247ea95de954e21af8689748705847aa041a5b0d59ea3d32b3214f4aecc1f5378da0cb1e922bead46ae6ef3e268b5b912f2fdc79b7fb7b5f04fe9ba4bfee10827829b3813e51afb5"}, &(0x7f0000000380)=0xab) sendmmsg$inet_sctp(r0, &(0x7f0000001840)=[{&(0x7f0000000040)=@in={0x2, 0x4e20, @empty}, 0x10, &(0x7f00000015c0)=[{&(0x7f00000000c0)="92802fa9e4a42346801ff45f8b9703", 0xf}, {&(0x7f0000000100)="c241e663be8e5f06a8769e28aa66ad076e0c11724cab23efd8fee3743f496c37cfe62f6e85d4910b6ce744ddba9c0f1aa0db263f7c86257a5cba4d7ce73e713fe44ab4edfdcc72d273655308bcdf78daafb523801a908533a7aea8ec9143", 0x5e}, {&(0x7f0000000180)="94b1ec5925b198bdcad092d59eb90e39c461c02cf666a2badd73532f63446a35c2366f6e6ba414e5a2138580f6cef59b8ff01a6ee23b9594970eb0ae3a49c7998dd1d9a9089fd6924e042e0eb71f5ff283b0145ade773705f345ecab45f7af4dbe7e23ffebe534eaff87009e20ef6bb79aa9e5061401c9e8e66f08ea4bbc1e4a0225dc6157dab6d44665886d13ac44d6f47debef320ac5592efdd65d3c5eae64", 0xa0}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000240)}, {&(0x7f0000000280)="180300b4edd7c615ca14eeed7a236eaf798e6f07169900c5d2581127a3d0317a73535c0a00d22d80f9bc37a164a6352874212548c474e1bd3103cf806ff1775c15227497b8458cf542aa5aef420111274f2745455429ada7b41eab87f86e2756a43c5af08ce484e709f190227b08a0f724eb34b750e8cc59a295788657e971e47678ce81cb1739320d07d2dc4650dc2a997f2412756198a11fb797e08119078fb53da5cbe4cbbf27f8d7d00aa5379081b363d1", 0xb3}, {&(0x7f0000001400)="dc2e42a6e407060dddb1419d863c5a86cb47bf02644e78d7234aa80211b60e82862346b590eff22f4e8fb55f71d6bbc38ad971ea13a905a5115f05245c22b301d27abb637cb5e4c82136f5faeeadda1ea0d17a2ecb5bf7860e59f93e7abee179ab637874628222fda99859d1de01dcfd943eb91a254174376b32431315f3a19df25c20ad519f6a70c42b282370187aeee7e02c105c683d24daaa28dbe8cfed22c9b10754973448b99a5a941ad63077bcf9c7ae3276f794425051156c3256899192a6f84044104553876743078427bf208bcc3c5c494105c4e5", 0xd9}, {&(0x7f0000001500)="1692af4e8994604cfb96daa8c44cd0695899041bd904f3bf976371b8fb58664541e270f892572cc09405c0b5109300a73618e9111d6805be8ea16f46b74b30c69a407a8a964b5d15cac7d33abc4d5d7135b0ea25c6e008e8b601105cdb5a82795326d7898e531a1b62faa71fc206b128d72922bb0aaec8101e150cfe8998383a34b2594e8081e6acb8920d17eb77c6", 0x8f}, {&(0x7f0000000340)="42633a99c08fe71d98277bc91f154ea48d72a83f0507493c09ac8da2493dda837a55a02fd32e68c63ea8beffd1cad14c5dbb6fa251", 0x35}], 0x9, &(0x7f0000001740)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @init={0x18, 0x84, 0x0, {0x20, 0x5, 0x7, 0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x82, 0x2, 0xc, 0x2, 0x9, 0x6, 0xffff, 0x9, r2}}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x7}}], 0xc8, 0x80}], 0x1, 0x8000080) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x7, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:44 executing program 5 (fault-call:9 fault-nth:45): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x9, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 2489.463012][ T8396] FAULT_INJECTION: forcing a failure. [ 2489.463012][ T8396] name failslab, interval 1, probability 0, space 0, times 0 04:02:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0xa, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2489.543555][ T8396] CPU: 0 PID: 8396 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2489.551411][ T8396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2489.561474][ T8396] Call Trace: [ 2489.564837][ T8396] dump_stack+0x11d/0x181 [ 2489.569183][ T8396] should_fail.cold+0xa/0x1a [ 2489.573797][ T8396] __should_failslab+0xee/0x130 [ 2489.578693][ T8396] should_failslab+0x9/0x14 [ 2489.583219][ T8396] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2489.589070][ T8396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2489.595340][ T8396] ? memcg_kmem_put_cache+0x91/0xe0 [ 2489.600673][ T8396] __kmalloc_node_track_caller+0x38/0x50 [ 2489.606332][ T8396] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2489.611726][ T8396] __alloc_skb+0xc2/0x360 [ 2489.616271][ T8396] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2489.622245][ T8396] sock_wmalloc+0xb8/0x110 [ 2489.626684][ T8396] pppol2tp_sendmsg+0x15a/0x3c0 [ 2489.631675][ T8396] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2489.637223][ T8396] sock_sendmsg+0x9f/0xc0 [ 2489.641573][ T8396] ___sys_sendmsg+0x2b7/0x5d0 [ 2489.646275][ T8396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2489.652553][ T8396] ? __rcu_read_unlock+0x66/0x3c0 [ 2489.657629][ T8396] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2489.663535][ T8396] ? __fget+0xb8/0x1d0 [ 2489.667621][ T8396] ? __fget_light+0xaf/0x190 [ 2489.672224][ T8396] ? __fdget+0x2c/0x40 [ 2489.676330][ T8396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2489.682713][ T8396] __sys_sendmmsg+0x123/0x350 [ 2489.687459][ T8396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2489.693712][ T8396] ? fput_many+0xec/0x130 [ 2489.698216][ T8396] ? fput+0x29/0x30 [ 2489.702098][ T8396] ? ksys_write+0x145/0x1b0 [ 2489.706617][ T8396] __x64_sys_sendmmsg+0x64/0x80 [ 2489.711485][ T8396] do_syscall_64+0xcc/0x370 [ 2489.716008][ T8396] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2489.721961][ T8396] RIP: 0033:0x45a639 [ 2489.725927][ T8396] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2489.745581][ T8396] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2489.754024][ T8396] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2489.762115][ T8396] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2489.770105][ T8396] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2489.778132][ T8396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2489.786255][ T8396] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r1}]) r2 = dup2(r0, r1) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000048c0)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/222, 0xde}, {&(0x7f0000000240)=""/164, 0xa4}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000300)=""/168, 0xa8}], 0x4, &(0x7f0000001400)=""/194, 0xc2}, 0x6}, {{&(0x7f0000001500)=@can, 0x80, &(0x7f0000001940)=[{&(0x7f0000001580)=""/126, 0x7e}, {&(0x7f0000001600)=""/178, 0xb2}, {&(0x7f00000016c0)=""/127, 0x7f}, {&(0x7f0000001740)=""/32, 0x20}, {&(0x7f0000001780)=""/98, 0x62}, {&(0x7f0000001800)=""/90, 0x5a}, {&(0x7f0000001880)=""/180, 0xb4}], 0x7, &(0x7f00000019c0)=""/187, 0xbb}, 0x8001}, {{&(0x7f0000001a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001b00)=""/48, 0x30}], 0x1, &(0x7f0000001b80)=""/4096, 0x1000}, 0xfff}, {{&(0x7f0000002b80)=@llc, 0x80, &(0x7f0000002d00)=[{&(0x7f0000002c00)=""/44, 0x2c}, {&(0x7f0000002c40)=""/161, 0xa1}], 0x2, &(0x7f0000002d40)=""/22, 0x16}, 0x6}, {{&(0x7f0000002d80)=@nfc_llcp, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002e00)=""/227, 0xe3}], 0x1, &(0x7f0000002f40)=""/26, 0x1a}, 0x70}, {{&(0x7f0000002f80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003480)=[{&(0x7f0000003000)=""/170, 0xaa}, {&(0x7f00000030c0)=""/225, 0xe1}, {&(0x7f00000031c0)=""/73, 0x49}, {&(0x7f0000003240)=""/194, 0xc2}, {&(0x7f0000003340)=""/134, 0x86}, {&(0x7f0000003400)=""/108, 0x6c}], 0x6, &(0x7f0000003500)=""/129, 0x81}, 0x400}, {{&(0x7f00000035c0)=@caif=@dgm, 0x80, &(0x7f00000047c0)=[{&(0x7f0000003640)=""/35, 0x23}, {&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f0000004680)=""/73, 0x49}, {&(0x7f0000004700)=""/111, 0x6f}, {&(0x7f0000004780)}], 0x5, &(0x7f0000004840)=""/110, 0x6e}, 0x9b2}], 0x7, 0x10000, &(0x7f0000004ac0)={r2, r3+30000000}) sendmsg$can_raw(r1, &(0x7f0000004bc0)={&(0x7f0000004b00)={0x1d, r4}, 0x10, &(0x7f0000004b80)={&(0x7f0000004b40)=@can={{0x1, 0x0, 0x1}, 0x1, 0x1, 0x0, 0x0, "d582bba9ba09b64c"}, 0x10}, 0x1, 0x0, 0x0, 0x2080}, 0x10085) 04:02:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x60000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x8, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:45 executing program 5 (fault-call:9 fault-nth:46): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0xb, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0xdf, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2490.209487][ T8829] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 04:02:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x9, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2490.368778][ T8840] FAULT_INJECTION: forcing a failure. [ 2490.368778][ T8840] name failslab, interval 1, probability 0, space 0, times 0 [ 2490.381568][ T8840] CPU: 1 PID: 8840 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2490.389465][ T8840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2490.399528][ T8840] Call Trace: [ 2490.402843][ T8840] dump_stack+0x11d/0x181 [ 2490.407215][ T8840] should_fail.cold+0xa/0x1a [ 2490.411836][ T8840] __should_failslab+0xee/0x130 [ 2490.416704][ T8840] should_failslab+0x9/0x14 [ 2490.421222][ T8840] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2490.427027][ T8840] ? should_fail+0xd4/0x45d [ 2490.431655][ T8840] __kmalloc_node_track_caller+0x38/0x50 [ 2490.437384][ T8840] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2490.442829][ T8840] pskb_expand_head+0x102/0x750 [ 2490.447714][ T8840] ? iov_iter_advance+0x211/0x9d0 [ 2490.452760][ T8840] l2tp_xmit_skb+0x754/0x8e0 [ 2490.457440][ T8840] ? skb_put+0xeb/0x110 [ 2490.461681][ T8840] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2490.466552][ T8840] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2490.471723][ T8840] sock_sendmsg+0x9f/0xc0 [ 2490.476070][ T8840] ___sys_sendmsg+0x2b7/0x5d0 [ 2490.480763][ T8840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2490.487102][ T8840] ? __rcu_read_unlock+0x66/0x3c0 [ 2490.492176][ T8840] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2490.498092][ T8840] ? __fget+0xb8/0x1d0 [ 2490.502270][ T8840] ? __fget_light+0xaf/0x190 [ 2490.506876][ T8840] ? __fdget+0x2c/0x40 [ 2490.510972][ T8840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2490.517231][ T8840] __sys_sendmmsg+0x123/0x350 [ 2490.521944][ T8840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2490.528204][ T8840] ? fput_many+0xec/0x130 [ 2490.532551][ T8840] ? fput+0x29/0x30 [ 2490.536467][ T8840] ? ksys_write+0x145/0x1b0 [ 2490.541059][ T8840] __x64_sys_sendmmsg+0x64/0x80 [ 2490.545952][ T8840] do_syscall_64+0xcc/0x370 [ 2490.550476][ T8840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2490.556446][ T8840] RIP: 0033:0x45a639 [ 2490.560368][ T8840] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2490.580221][ T8840] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2490.588726][ T8840] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2490.596744][ T8840] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2490.604745][ T8840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:02:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x10, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2490.612735][ T8840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2490.620725][ T8840] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xa, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:46 executing program 5 (fault-call:9 fault-nth:47): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2490.753945][ T8959] netlink: 'syz-executor.1': attribute type 16 has an invalid length. [ 2490.953384][ T9171] FAULT_INJECTION: forcing a failure. [ 2490.953384][ T9171] name failslab, interval 1, probability 0, space 0, times 0 [ 2490.966058][ T9171] CPU: 1 PID: 9171 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2490.973923][ T9171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2490.984055][ T9171] Call Trace: [ 2490.987389][ T9171] dump_stack+0x11d/0x181 [ 2490.991726][ T9171] should_fail.cold+0xa/0x1a [ 2490.996335][ T9171] __should_failslab+0xee/0x130 [ 2491.001201][ T9171] should_failslab+0x9/0x14 [ 2491.005781][ T9171] kmem_cache_alloc+0x29/0x5d0 [ 2491.010761][ T9171] skb_clone+0xf9/0x290 [ 2491.015010][ T9171] ip_mc_output+0x1fd/0x620 [ 2491.019544][ T9171] ? constant_test_bit+0x30/0x30 [ 2491.024565][ T9171] ip_local_out+0x74/0x90 [ 2491.028996][ T9171] __ip_queue_xmit+0x3a8/0xa40 [ 2491.033782][ T9171] l2tp_xmit_skb+0x574/0x8e0 [ 2491.038396][ T9171] ? skb_put+0xeb/0x110 [ 2491.042572][ T9171] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2491.047555][ T9171] ? pppol2tp_seq_show+0x6b0/0x6b0 04:02:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, 0x0) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffdfc, 0x2) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x3, r0, 0x1}) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2491.052727][ T9171] sock_sendmsg+0x9f/0xc0 [ 2491.057139][ T9171] ___sys_sendmsg+0x2b7/0x5d0 [ 2491.061905][ T9171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2491.068165][ T9171] ? __rcu_read_unlock+0x66/0x3c0 [ 2491.073213][ T9171] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2491.079197][ T9171] ? __fget+0xb8/0x1d0 [ 2491.083350][ T9171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2491.089652][ T9171] ? debug_smp_processor_id+0x4c/0x172 [ 2491.095224][ T9171] ? delay_tsc+0x8f/0xc0 [ 2491.099500][ T9171] ? __const_udelay+0x36/0x40 [ 2491.104202][ T9171] ? __udelay+0x10/0x20 [ 2491.108407][ T9171] __sys_sendmmsg+0x123/0x350 [ 2491.113103][ T9171] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2491.119353][ T9171] ? fput_many+0xec/0x130 [ 2491.123697][ T9171] ? fput+0x29/0x30 [ 2491.127606][ T9171] ? ksys_write+0x145/0x1b0 [ 2491.132122][ T9171] __x64_sys_sendmmsg+0x64/0x80 [ 2491.136990][ T9171] do_syscall_64+0xcc/0x370 [ 2491.141509][ T9171] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2491.147412][ T9171] RIP: 0033:0x45a639 04:02:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0x8dffffff}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x11, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x10, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:46 executing program 3: socket$kcm(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2491.170993][ T9171] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2491.179620][ T9171] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2491.187608][ T9171] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2491.195589][ T9171] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2491.203673][ T9171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2491.211649][ T9171] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2491.246291][ T9386] netlink: 'syz-executor.1': attribute type 17 has an invalid length. 04:02:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x12, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x78, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:46 executing program 5 (fault-call:9 fault-nth:48): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xe000, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'veth0\x00', 0x20}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000100)={0x80, 0x67fbd423, 0x9, 0x6, 0x8001}) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x1, 0x0, 0x1, 0x2, 0x38, "66c454d022f739809bd3d197ad19fdb2e6680a7c14b85e46bb860e85c060a1f907ff68dcc87c9196cf89aabdd742632fd073c04639750ce77560df66f5fa16", 0x29}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)="c301b94f5acc4c0ce5e07516c00fbf50ae5669bad46ec78f3fd16c539c3d8876d8c307591e18a4f1855fd01dee60159bfbb3a1020cffb7907c93908947d25aa5cb8ddf92f5194f900cc9dd77a786dd136e5871e2078b4edc51cbe1d5e77df682e01431f389e5f2f1e07e60ecf5c3ffe04d2f0474249376de199604461c7917136601bb8a8fd0d56723da00ffa4da20575a3db3df62de405a463bb39c36897a68b7d8abf673ae25177a1499e42c63747acd9b0d22c4a95a60a7305717cf4343a85b60b287cb243187216984b67acf977ea24fbf", 0xd3}, {&(0x7f00000002c0)="a1763a5afcf1b6ae8a792ee6807b3323ef13e065b2d4e052069c9e38306d3d49394a8decb34bcb4eea3ed4b858edba1f265cf4a25e9978a5386466182d628c2371760f91d90679b753af91afeedfdab98e7a407a5f4142990aa6ff62ed0d7d719276b146cfe46070fc0c289c96e1186b26aa90ba5da1806d207e33", 0x7b}, {&(0x7f0000000340)="d407bbbfdc1fcfd7e313a7ac500bcc48771930867108287a2725d6575b9e9dc2431512ab1c62ed08", 0x28}, {&(0x7f0000000400)="78a78a3c845c708fc7d18c3be5a2a7d4d906289a65d6afbf697dddfc31678ad064b2b82410ec77ec27812255f7f0591215ec22640d069dd32db1e021c7e85f17da9fcab5c5b789bf13d96d74315218b09b13c9ba8c46c10296a7ea5c40ee2c03299a8e336e0dfbe47afd0e67687b254e8230e220b5260e6b5145503e2d1cb6b12ece37565b", 0x85}, {&(0x7f00000004c0)="b1e88cc7d987bd6bfb94ec14e62f21e47b2c1799981913780afc13312b15738c7cf3244a374c343d6135511090d8e2b9f65708f6f0d71222b463d7a4503c4de452bcebbcdccbd5d1db721e97ac8fe1361b9ab7a0ceb56041e37fecc534f52114a1a0523690e7a3645503bac5a0b63fa86f57dd5cc5b8af9bae1a62f7bcdae707980aed7fdb6975e0812c498d498314010b5b621683b8fd4d9f67e5bb8f7e2540cb325b55a4b7449d3fbd249b2c9b3b533df363f73d75e6dbf22a1e15eef2f88fb3ac12cd168be8406409a43eda582e67d9aaddb490ab6a2b179dcf544a5d1b", 0xdf}], 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1118}, 0x2040) 04:02:46 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x13, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2491.525732][ T9790] FAULT_INJECTION: forcing a failure. [ 2491.525732][ T9790] name failslab, interval 1, probability 0, space 0, times 0 [ 2491.538444][ T9790] CPU: 0 PID: 9790 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2491.546272][ T9790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2491.556382][ T9790] Call Trace: [ 2491.559684][ T9790] dump_stack+0x11d/0x181 [ 2491.564029][ T9790] should_fail.cold+0xa/0x1a [ 2491.568721][ T9790] __should_failslab+0xee/0x130 [ 2491.573658][ T9790] should_failslab+0x9/0x14 [ 2491.578174][ T9790] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2491.583988][ T9790] ? should_fail+0xd4/0x45d [ 2491.588508][ T9790] __kmalloc_node_track_caller+0x38/0x50 [ 2491.594218][ T9790] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2491.599682][ T9790] pskb_expand_head+0x102/0x750 [ 2491.604649][ T9790] ? iov_iter_advance+0x211/0x9d0 [ 2491.609689][ T9790] l2tp_xmit_skb+0x754/0x8e0 [ 2491.614306][ T9790] ? skb_put+0xeb/0x110 [ 2491.618472][ T9790] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2491.623392][ T9790] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2491.628567][ T9790] sock_sendmsg+0x9f/0xc0 [ 2491.632986][ T9790] ___sys_sendmsg+0x2b7/0x5d0 [ 2491.637676][ T9790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2491.643937][ T9790] ? __rcu_read_unlock+0x66/0x3c0 [ 2491.649023][ T9790] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2491.654930][ T9790] ? __fget+0xb8/0x1d0 [ 2491.659123][ T9790] ? __fget_light+0xaf/0x190 [ 2491.663719][ T9790] ? __fdget+0x2c/0x40 [ 2491.667798][ T9790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2491.674065][ T9790] __sys_sendmmsg+0x123/0x350 [ 2491.678764][ T9790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2491.685012][ T9790] ? fput_many+0xec/0x130 [ 2491.689462][ T9790] ? fput+0x29/0x30 [ 2491.693283][ T9790] ? ksys_write+0x145/0x1b0 [ 2491.697847][ T9790] __x64_sys_sendmmsg+0x64/0x80 [ 2491.702725][ T9790] do_syscall_64+0xcc/0x370 [ 2491.707242][ T9790] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2491.713144][ T9790] RIP: 0033:0x45a639 04:02:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x14, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2491.717084][ T9790] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2491.736713][ T9790] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2491.745212][ T9790] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2491.753272][ T9790] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2491.761266][ T9790] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2491.769250][ T9790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2491.777232][ T9790] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2491.801178][ C0] net_ratelimit: 40 callbacks suppressed [ 2491.801186][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.812645][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, 0x0) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:47 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/l2cap\x00') getpeername$llc(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x98, r2, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x1}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14}}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xbb70}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffff80}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x101}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}]}, 0x98}, 0x1, 0x0, 0x0, 0x8804}, 0x4000000) 04:02:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x18, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xfc, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:47 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xc8050000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:47 executing program 5 (fault-call:9 fault-nth:49): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80880, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xdc, r2, 0x100, 0x8, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffeff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5c18}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x400}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4}, 0x4008040) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x5a, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2492.313060][T10258] should_fail.cold+0xa/0x1a [ 2492.317660][T10258] __should_failslab+0xee/0x130 [ 2492.322552][T10258] should_failslab+0x9/0x14 [ 2492.327068][T10258] kmem_cache_alloc+0x29/0x5d0 [ 2492.331960][T10258] ? __read_once_size.constprop.0+0x20/0x20 [ 2492.337957][T10258] skb_clone+0xf9/0x290 [ 2492.342140][T10258] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2492.348442][T10258] dev_queue_xmit_nit+0x24a/0x540 [ 2492.353564][T10258] ? constant_test_bit+0x30/0x30 [ 2492.358518][T10258] dev_hard_start_xmit+0x3f5/0x430 [ 2492.363648][T10258] __dev_queue_xmit+0x14ab/0x1b40 [ 2492.368726][T10258] ? ipt_do_table+0x8e9/0xe60 [ 2492.373420][T10258] ? __this_cpu_preempt_check+0x4a/0x170 [ 2492.379062][T10258] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2492.385038][T10258] ? __rcu_read_unlock+0x66/0x3c0 [ 2492.390091][T10258] ? nf_nat_packet+0xc2/0x110 [ 2492.394781][T10258] dev_queue_xmit+0x21/0x30 [ 2492.399313][T10258] ip_finish_output2+0x836/0xe40 [ 2492.404307][T10258] __ip_finish_output+0x23a/0x490 [ 2492.409352][T10258] ? ipv4_confirm+0xdc/0x160 04:02:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xef) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x902, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000400)=""/4096) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x2000}) r3 = socket(0xa, 0x0, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x10001, @remote, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x1f, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x4, 0x1f, 0x7fff}, &(0x7f00000001c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x7fff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r5}, 0xc) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x300, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2492.413989][T10258] ip_finish_output+0x41/0x160 [ 2492.419983][T10258] ip_mc_output+0x143/0x620 [ 2492.424559][T10258] ? __ip_finish_output+0x490/0x490 [ 2492.429782][T10258] ip_local_out+0x74/0x90 [ 2492.434205][T10258] __ip_queue_xmit+0x3a8/0xa40 [ 2492.439010][T10258] l2tp_xmit_skb+0x574/0x8e0 [ 2492.443620][T10258] ? skb_put+0xeb/0x110 [ 2492.447788][T10258] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2492.452671][T10258] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2492.457821][T10258] sock_sendmsg+0x9f/0xc0 [ 2492.462176][T10258] ___sys_sendmsg+0x2b7/0x5d0 [ 2492.466887][T10258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2492.473317][T10258] ? __rcu_read_unlock+0x66/0x3c0 [ 2492.478365][T10258] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2492.484299][T10258] ? __fget+0xb8/0x1d0 [ 2492.488385][T10258] ? __fget_light+0xaf/0x190 [ 2492.493006][T10258] ? __fdget+0x2c/0x40 [ 2492.497093][T10258] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2492.503350][T10258] __sys_sendmmsg+0x123/0x350 [ 2492.508160][T10258] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:02:47 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0xd000, 0x3f}]]}}}]}, 0x44}}, 0x0) [ 2492.514464][T10258] ? fput_many+0xec/0x130 [ 2492.518879][T10258] ? fput+0x29/0x30 [ 2492.522700][T10258] ? ksys_write+0x145/0x1b0 [ 2492.527306][T10258] __x64_sys_sendmmsg+0x64/0x80 [ 2492.532638][T10258] do_syscall_64+0xcc/0x370 [ 2492.537182][T10258] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2492.543180][T10258] RIP: 0033:0x45a639 [ 2492.547135][T10258] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2492.566758][T10258] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2492.575289][T10258] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2492.583632][T10258] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2492.591612][T10258] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2492.599593][T10258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2492.607572][T10258] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:47 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xf5ffffff}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2492.734953][T10784] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2492.748937][T10784] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:02:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, 0x0) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x500, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0xf800, 0x3f}]]}}}]}, 0x44}}, 0x0) 04:02:48 executing program 5 (fault-call:9 fault-nth:50): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x5, 0x1) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000001b01cfbffffa20305000a0002fffe2bda1b40d8797f86cac00083b80000000000000000000000002616ca6d649805007fff899cf38252fbe3f1086b2829120b3561150000000000000000000000a33c865a6c541e0787aa9066e94269499d6ab04b711cf31f869b6848ba616b509064cd2d1e353532b76c77ed71151d4e8a62a1e513681b", 0x88}], 0x1}, 0x0) [ 2493.001197][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.007198][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.016591][T11041] FAULT_INJECTION: forcing a failure. [ 2493.016591][T11041] name failslab, interval 1, probability 0, space 0, times 0 [ 2493.029358][T11041] CPU: 1 PID: 11041 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2493.037276][T11041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2493.047355][T11041] Call Trace: [ 2493.050662][T11041] dump_stack+0x11d/0x181 [ 2493.055107][T11041] should_fail.cold+0xa/0x1a [ 2493.059708][T11041] __should_failslab+0xee/0x130 [ 2493.064628][T11041] should_failslab+0x9/0x14 [ 2493.069154][T11041] kmem_cache_alloc+0x29/0x5d0 [ 2493.074033][T11041] skb_clone+0xf9/0x290 [ 2493.078197][T11041] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2493.084649][T11041] dev_queue_xmit_nit+0x24a/0x540 [ 2493.089726][T11041] ? constant_test_bit+0x30/0x30 [ 2493.094674][T11041] dev_hard_start_xmit+0x3f5/0x430 04:02:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x600, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2493.099873][T11041] __dev_queue_xmit+0x14ab/0x1b40 [ 2493.104915][T11041] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2493.111200][T11041] ? nf_ct_bridge_post+0x22f/0xb50 [ 2493.116368][T11041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2493.122657][T11041] dev_queue_xmit+0x21/0x30 [ 2493.127199][T11041] br_dev_queue_push_xmit+0x2c1/0x330 [ 2493.132585][T11041] ? nf_hook_slow+0xb8/0x160 [ 2493.137189][T11041] br_forward_finish+0x177/0x190 [ 2493.142403][T11041] ? br_fdb_add.cold+0x88/0x88 [ 2493.147205][T11041] __br_forward+0x331/0x4a0 04:02:48 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 04:02:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x5a}]]}}}]}, 0x44}}, 0x0) [ 2493.151720][T11041] ? __read_once_size.constprop.0+0x20/0x20 [ 2493.158061][T11041] br_flood+0x31a/0x330 [ 2493.162238][T11041] br_dev_xmit+0x680/0x920 [ 2493.166671][T11041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2493.173101][T11041] dev_hard_start_xmit+0xef/0x430 [ 2493.178149][T11041] __dev_queue_xmit+0x14ab/0x1b40 [ 2493.183184][T11041] ? ipt_do_table+0x8e9/0xe60 [ 2493.187873][T11041] ? __this_cpu_preempt_check+0x4a/0x170 [ 2493.193632][T11041] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2493.199545][T11041] ? __rcu_read_unlock+0x66/0x3c0 [ 2493.204591][T11041] ? nf_nat_packet+0xc2/0x110 [ 2493.209281][T11041] dev_queue_xmit+0x21/0x30 [ 2493.213889][T11041] ip_finish_output2+0x836/0xe40 [ 2493.218860][T11041] __ip_finish_output+0x23a/0x490 [ 2493.218885][T11113] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2493.223922][T11041] ? ipv4_confirm+0xdc/0x160 [ 2493.223947][T11041] ip_finish_output+0x41/0x160 [ 2493.223990][T11041] ip_mc_output+0x143/0x620 [ 2493.224019][T11041] ? __ip_finish_output+0x490/0x490 [ 2493.251501][T11041] ip_local_out+0x74/0x90 [ 2493.255877][T11041] __ip_queue_xmit+0x3a8/0xa40 [ 2493.260694][T11041] l2tp_xmit_skb+0x574/0x8e0 [ 2493.265298][T11041] ? skb_put+0xeb/0x110 [ 2493.269470][T11041] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2493.274334][T11041] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2493.279512][T11041] sock_sendmsg+0x9f/0xc0 [ 2493.283887][T11041] ___sys_sendmsg+0x2b7/0x5d0 [ 2493.288227][T11209] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) 04:02:48 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0xf}}, 0x0) [ 2493.288578][T11041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2493.306702][T11041] ? __rcu_read_unlock+0x66/0x3c0 [ 2493.311818][T11041] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2493.317597][T11209] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2493.317846][T11041] ? __fget+0xb8/0x1d0 [ 2493.333907][T11041] ? __fget_light+0xaf/0x190 [ 2493.338514][T11041] ? __fdget+0x2c/0x40 [ 2493.342725][T11041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2493.349004][T11041] __sys_sendmmsg+0x123/0x350 [ 2493.353709][T11041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2493.360018][T11041] ? fput_many+0xec/0x130 [ 2493.364393][T11041] ? fput+0x29/0x30 [ 2493.368280][T11041] ? ksys_write+0x145/0x1b0 [ 2493.372800][T11041] __x64_sys_sendmmsg+0x64/0x80 [ 2493.377680][T11041] do_syscall_64+0xcc/0x370 [ 2493.382199][T11041] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2493.388504][T11041] RIP: 0033:0x45a639 04:02:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x700, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2493.392440][T11041] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2493.412151][T11041] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2493.420599][T11041] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2493.428633][T11041] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2493.436619][T11041] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2493.444651][T11041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 04:02:48 executing program 3: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x9) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2493.452806][T11041] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:48 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xfc000000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, &(0x7f0000000600)) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:49 executing program 5 (fault-call:9 fault-nth:51): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x10}}, 0x0) 04:02:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1, 0x0, 0x3b0}, 0x1) 04:02:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x900, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2494.030718][T11753] FAULT_INJECTION: forcing a failure. [ 2494.030718][T11753] name failslab, interval 1, probability 0, space 0, times 0 [ 2494.087915][T11753] CPU: 0 PID: 11753 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2494.095852][T11753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2494.105918][T11753] Call Trace: [ 2494.109286][T11753] dump_stack+0x11d/0x181 [ 2494.113638][T11753] should_fail.cold+0xa/0x1a [ 2494.118260][T11753] __should_failslab+0xee/0x130 [ 2494.123137][T11753] should_failslab+0x9/0x14 [ 2494.127702][T11753] kmem_cache_alloc_node+0x39/0x660 [ 2494.132955][T11753] __alloc_skb+0x8e/0x360 04:02:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xa00, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2494.137364][T11753] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2494.143318][T11753] sock_wmalloc+0xb8/0x110 [ 2494.147832][T11753] pppol2tp_sendmsg+0x15a/0x3c0 [ 2494.152711][T11753] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2494.157833][T11753] sock_sendmsg+0x9f/0xc0 [ 2494.162283][T11753] ___sys_sendmsg+0x2b7/0x5d0 [ 2494.167708][T11753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2494.173970][T11753] ? __rcu_read_unlock+0x66/0x3c0 [ 2494.179008][T11753] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2494.184917][T11753] ? __fget+0xb8/0x1d0 [ 2494.189077][T11753] ? __fget_light+0xaf/0x190 [ 2494.193683][T11753] ? __fdget+0x2c/0x40 [ 2494.197765][T11753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2494.204019][T11753] __sys_sendmmsg+0x123/0x350 [ 2494.208741][T11753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2494.215020][T11753] ? fput_many+0xec/0x130 [ 2494.219431][T11753] ? fput+0x29/0x30 [ 2494.223248][T11753] ? ksys_write+0x145/0x1b0 [ 2494.228176][T11753] __x64_sys_sendmmsg+0x64/0x80 [ 2494.233152][T11753] do_syscall_64+0xcc/0x370 04:02:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) mlockall(0x2) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r2) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0], &(0x7f000095dffc)=0x8) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2494.267260][T11753] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2494.275761][T11753] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:02:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x5a}}, 0x0) [ 2494.284087][T11753] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2494.292069][T11753] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2494.300532][T11753] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2494.308523][T11753] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:49 executing program 5 (fault-call:9 fault-nth:52): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x3f00, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2494.382232][T11973] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xfe800000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2494.555023][T12183] FAULT_INJECTION: forcing a failure. [ 2494.555023][T12183] name failslab, interval 1, probability 0, space 0, times 0 [ 2494.570162][T12183] CPU: 0 PID: 12183 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2494.578058][T12183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2494.588256][T12183] Call Trace: [ 2494.591575][T12183] dump_stack+0x11d/0x181 [ 2494.595926][T12183] should_fail.cold+0xa/0x1a [ 2494.600581][T12183] __should_failslab+0xee/0x130 [ 2494.605450][T12183] should_failslab+0x9/0x14 [ 2494.610051][T12183] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2494.615799][T12183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2494.622198][T12183] ? memcg_kmem_put_cache+0x91/0xe0 [ 2494.627407][T12183] __kmalloc_node_track_caller+0x38/0x50 [ 2494.633075][T12183] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2494.638524][T12183] __alloc_skb+0xc2/0x360 [ 2494.642866][T12183] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2494.648822][T12183] sock_wmalloc+0xb8/0x110 [ 2494.653287][T12183] pppol2tp_sendmsg+0x15a/0x3c0 [ 2494.658139][T12183] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2494.663259][T12183] sock_sendmsg+0x9f/0xc0 [ 2494.667624][T12183] ___sys_sendmsg+0x2b7/0x5d0 [ 2494.672298][T12183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2494.678576][T12183] ? __rcu_read_unlock+0x66/0x3c0 [ 2494.683596][T12183] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2494.689485][T12183] ? __fget+0xb8/0x1d0 [ 2494.693588][T12183] ? __fget_light+0xaf/0x190 [ 2494.698163][T12183] ? __fdget+0x2c/0x40 [ 2494.702227][T12183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2494.708791][T12183] __sys_sendmmsg+0x123/0x350 [ 2494.713479][T12183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2494.719735][T12183] ? fput_many+0xec/0x130 [ 2494.724209][T12183] ? fput+0x29/0x30 [ 2494.728022][T12183] ? ksys_write+0x145/0x1b0 [ 2494.732574][T12183] __x64_sys_sendmmsg+0x64/0x80 [ 2494.737423][T12183] do_syscall_64+0xcc/0x370 [ 2494.741990][T12183] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2494.747981][T12183] RIP: 0033:0x45a639 [ 2494.751870][T12183] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2494.771642][T12183] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2494.780057][T12183] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2494.788025][T12183] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2494.795994][T12183] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2494.804124][T12183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2494.812095][T12183] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0xc0}}, 0x0) 04:02:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, &(0x7f0000000600)) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x4000, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2495.113118][T12301] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2495.139645][T12305] FAULT_INJECTION: forcing a failure. [ 2495.139645][T12305] name failslab, interval 1, probability 0, space 0, times 0 [ 2495.152364][T12305] CPU: 0 PID: 12305 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2495.160269][T12305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2495.170334][T12305] Call Trace: [ 2495.173680][T12305] dump_stack+0x11d/0x181 [ 2495.178024][T12305] should_fail.cold+0xa/0x1a [ 2495.182638][T12305] __should_failslab+0xee/0x130 [ 2495.187594][T12305] should_failslab+0x9/0x14 [ 2495.192153][T12305] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2495.197882][T12305] ? should_fail+0xd4/0x45d [ 2495.202412][T12305] __kmalloc_node_track_caller+0x38/0x50 [ 2495.208168][T12305] __kmalloc_reserve.isra.0+0x49/0xd0 04:02:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='+][\x00', 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) add_key$keyring(&(0x7f0000000240)='\xa3\xdfx\x86\xeaf\xfc\x00', &(0x7f0000000380)={'s\xf2\x82', 0x1}, 0x0, 0x0, r2) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$instantiate(0xc, r1, &(0x7f0000000140)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', '', 0x20, 0x8, 0x20, [0x34, 0x6e, 0x31, 0x37, 0x66]}, 0x32, r3) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0xec0}}, 0x0) [ 2495.262760][T12305] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2495.268741][T12305] ? __fget+0xb8/0x1d0 [ 2495.272863][T12305] ? __fget_light+0xaf/0x190 [ 2495.277481][T12305] ? __fdget+0x2c/0x40 [ 2495.281571][T12305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2495.287919][T12305] __sys_sendmmsg+0x123/0x350 [ 2495.292625][T12305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2495.298879][T12305] ? fput_many+0xec/0x130 [ 2495.303306][T12305] ? fput+0x29/0x30 [ 2495.307124][T12305] ? ksys_write+0x145/0x1b0 [ 2495.312851][T12305] __x64_sys_sendmmsg+0x64/0x80 [ 2495.317831][T12305] do_syscall_64+0xcc/0x370 [ 2495.322361][T12305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2495.328252][T12305] RIP: 0033:0x45a639 [ 2495.332226][T12305] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2495.352425][T12305] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 04:02:50 executing program 3: socket$kcm(0x10, 0x2, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x0, 0x3}, 0x10) write$FUSE_IOCTL(r0, &(0x7f00000000c0)={0x20, 0x0, 0x7, {0x7, 0x6, 0xe59a, 0x7ff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x7800, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xfec00000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:50 executing program 5 (fault-call:9 fault-nth:54): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x33fe0}}, 0x0) 04:02:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x80fe, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2495.664267][T12831] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2495.713334][T12988] FAULT_INJECTION: forcing a failure. [ 2495.713334][T12988] name failslab, interval 1, probability 0, space 0, times 0 [ 2495.726213][T12988] CPU: 1 PID: 12988 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2495.734124][T12988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2495.744267][T12988] Call Trace: [ 2495.747622][T12988] dump_stack+0x11d/0x181 [ 2495.752062][T12988] should_fail.cold+0xa/0x1a [ 2495.756761][T12988] __should_failslab+0xee/0x130 [ 2495.761637][T12988] should_failslab+0x9/0x14 [ 2495.766143][T12988] kmem_cache_alloc+0x29/0x5d0 [ 2495.770954][T12988] skb_clone+0xf9/0x290 [ 2495.775219][T12988] ip_mc_output+0x1fd/0x620 [ 2495.779736][T12988] ? constant_test_bit+0x30/0x30 [ 2495.784917][T12988] ip_local_out+0x74/0x90 [ 2495.789272][T12988] __ip_queue_xmit+0x3a8/0xa40 [ 2495.794156][T12988] l2tp_xmit_skb+0x574/0x8e0 [ 2495.798771][T12988] ? skb_put+0xeb/0x110 [ 2495.803051][T12988] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2495.808096][T12988] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2495.813493][T12988] sock_sendmsg+0x9f/0xc0 [ 2495.817855][T12988] ___sys_sendmsg+0x2b7/0x5d0 [ 2495.822573][T12988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2495.828932][T12988] ? __rcu_read_unlock+0x66/0x3c0 [ 2495.833973][T12988] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2495.839900][T12988] ? __fget+0xb8/0x1d0 [ 2495.843977][T12988] ? __fget_light+0xaf/0x190 [ 2495.848642][T12988] ? __fdget+0x2c/0x40 [ 2495.852718][T12988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2495.858967][T12988] __sys_sendmmsg+0x123/0x350 [ 2495.863663][T12988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2495.869990][T12988] ? fput_many+0xec/0x130 [ 2495.874444][T12988] ? fput+0x29/0x30 [ 2495.878259][T12988] ? ksys_write+0x145/0x1b0 [ 2495.882778][T12988] __x64_sys_sendmmsg+0x64/0x80 [ 2495.887721][T12988] do_syscall_64+0xcc/0x370 [ 2495.892234][T12988] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2495.898120][T12988] RIP: 0033:0x45a639 [ 2495.902026][T12988] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2495.921688][T12988] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2495.930205][T12988] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2495.938184][T12988] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2495.946158][T12988] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2495.954127][T12988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2495.962493][T12988] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x0, &(0x7f0000000600)) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 04:02:51 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x20000284}}, 0x0) 04:02:51 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xc0fe, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:51 executing program 5 (fault-call:9 fault-nth:55): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2496.213255][T13155] FAULT_INJECTION: forcing a failure. [ 2496.213255][T13155] name failslab, interval 1, probability 0, space 0, times 0 [ 2496.225932][T13155] CPU: 0 PID: 13155 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2496.233846][T13155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2496.243908][T13155] Call Trace: [ 2496.247212][T13155] dump_stack+0x11d/0x181 [ 2496.251586][T13155] should_fail.cold+0xa/0x1a [ 2496.256192][T13155] __should_failslab+0xee/0x130 [ 2496.261116][T13155] should_failslab+0x9/0x14 [ 2496.265642][T13155] kmem_cache_alloc+0x29/0x5d0 [ 2496.270427][T13155] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2496.276360][T13155] dst_alloc+0xad/0x149 [ 2496.280609][T13155] rt_dst_clone+0x5c/0x3b0 [ 2496.285053][T13155] ip_mc_finish_output+0x68/0x340 [ 2496.290141][T13155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2496.295879][T13155] ? nf_hook_slow+0xb8/0x160 [ 2496.300510][T13155] ip_mc_output+0x32c/0x620 [ 2496.305033][T13155] ? ip_copy_addrs+0x50/0x50 04:02:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) clone3(&(0x7f0000000200)={0x10000, &(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100), 0x2f, 0x0, &(0x7f0000000140)=""/21, 0x15, &(0x7f0000000180)=""/67}, 0x40) sched_getattr(r1, &(0x7f0000000240)={0x30}, 0x30, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x7ffff000}}, 0x0) [ 2496.309644][T13155] ip_local_out+0x74/0x90 [ 2496.314075][T13155] __ip_queue_xmit+0x3a8/0xa40 [ 2496.318855][T13155] l2tp_xmit_skb+0x574/0x8e0 [ 2496.323460][T13155] ? skb_put+0xeb/0x110 [ 2496.327650][T13155] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2496.332578][T13155] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2496.337704][T13155] sock_sendmsg+0x9f/0xc0 [ 2496.342045][T13155] ___sys_sendmsg+0x2b7/0x5d0 [ 2496.346744][T13155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2496.352999][T13155] ? __rcu_read_unlock+0x66/0x3c0 [ 2496.358044][T13155] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2496.363970][T13155] ? __fget+0xb8/0x1d0 [ 2496.368058][T13155] ? __fget_light+0xaf/0x190 [ 2496.372667][T13155] ? __fdget+0x2c/0x40 [ 2496.376794][T13155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2496.383054][T13155] __sys_sendmmsg+0x123/0x350 [ 2496.387803][T13155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2496.394053][T13155] ? fput_many+0xec/0x130 [ 2496.398413][T13155] ? fput+0x29/0x30 [ 2496.402409][T13155] ? ksys_write+0x145/0x1b0 [ 2496.406936][T13155] __x64_sys_sendmmsg+0x64/0x80 [ 2496.411802][T13155] do_syscall_64+0xcc/0x370 [ 2496.416365][T13155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2496.422292][T13155] RIP: 0033:0x45a639 [ 2496.426261][T13155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2496.445867][T13155] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2496.454285][T13155] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:02:51 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xfc00, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0xfffffdef}}, 0x0) [ 2496.721367][T13582] FAULT_INJECTION: forcing a failure. [ 2496.721367][T13582] name failslab, interval 1, probability 0, space 0, times 0 [ 2496.734069][T13582] CPU: 0 PID: 13582 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2496.742049][T13582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2496.752113][T13582] Call Trace: [ 2496.755450][T13582] dump_stack+0x11d/0x181 [ 2496.759967][T13582] should_fail.cold+0xa/0x1a [ 2496.764615][T13582] __should_failslab+0xee/0x130 [ 2496.769527][T13582] should_failslab+0x9/0x14 [ 2496.774033][T13582] kmem_cache_alloc+0x29/0x5d0 [ 2496.778870][T13582] ? __read_once_size.constprop.0+0x20/0x20 [ 2496.784798][T13582] skb_clone+0xf9/0x290 [ 2496.788969][T13582] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2496.795367][T13582] dev_queue_xmit_nit+0x24a/0x540 [ 2496.800387][T13582] ? constant_test_bit+0x30/0x30 [ 2496.805417][T13582] dev_hard_start_xmit+0x3f5/0x430 [ 2496.810551][T13582] __dev_queue_xmit+0x14ab/0x1b40 [ 2496.815670][T13582] ? ipt_do_table+0x8e9/0xe60 [ 2496.820380][T13582] ? __this_cpu_preempt_check+0x4a/0x170 [ 2496.826003][T13582] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2496.832157][T13582] ? __rcu_read_unlock+0x66/0x3c0 [ 2496.837262][T13582] ? nf_nat_packet+0xc2/0x110 [ 2496.841941][T13582] dev_queue_xmit+0x21/0x30 [ 2496.846637][T13582] ip_finish_output2+0x836/0xe40 [ 2496.851680][T13582] __ip_finish_output+0x23a/0x490 [ 2496.856694][T13582] ? ipv4_confirm+0xdc/0x160 [ 2496.861370][T13582] ip_finish_output+0x41/0x160 [ 2496.866169][T13582] ip_mc_output+0x143/0x620 [ 2496.870756][T13582] ? __ip_finish_output+0x490/0x490 [ 2496.875987][T13582] ip_local_out+0x74/0x90 [ 2496.880375][T13582] __ip_queue_xmit+0x3a8/0xa40 [ 2496.885142][T13582] l2tp_xmit_skb+0x574/0x8e0 [ 2496.889769][T13582] ? skb_put+0xeb/0x110 [ 2496.894045][T13582] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2496.898952][T13582] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2496.904335][T13582] sock_sendmsg+0x9f/0xc0 [ 2496.908715][T13582] ___sys_sendmsg+0x2b7/0x5d0 [ 2496.913425][T13582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2496.919745][T13582] ? __rcu_read_unlock+0x66/0x3c0 [ 2496.924782][T13582] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2496.930672][T13582] ? __fget+0xb8/0x1d0 [ 2496.934744][T13582] ? __fget_light+0xaf/0x190 [ 2496.939342][T13582] ? __fdget+0x2c/0x40 [ 2496.943451][T13582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2496.949756][T13582] __sys_sendmmsg+0x123/0x350 [ 2496.954509][T13582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2496.960745][T13582] ? fput_many+0xec/0x130 [ 2496.965078][T13582] ? fput+0x29/0x30 [ 2496.968999][T13582] ? ksys_write+0x145/0x1b0 [ 2496.973535][T13582] __x64_sys_sendmmsg+0x64/0x80 [ 2496.978465][T13582] do_syscall_64+0xcc/0x370 [ 2496.982977][T13582] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2496.988884][T13582] RIP: 0033:0x45a639 [ 2496.992931][T13582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2497.012558][T13582] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2497.021118][T13582] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2497.029208][T13582] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2497.037256][T13582] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2497.045211][T13582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2497.053171][T13582] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:52 executing program 3: socket$kcm(0x10, 0x2, 0x0) 04:02:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xfe80, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x2}, 0x0) 04:02:52 executing program 5 (fault-call:9 fault-nth:57): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2497.161208][ C0] net_ratelimit: 28 callbacks suppressed [ 2497.161218][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2497.172698][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2497.284715][T13695] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2497.317682][T13708] FAULT_INJECTION: forcing a failure. [ 2497.317682][T13708] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.330474][T13708] CPU: 0 PID: 13708 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2497.338409][T13708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2497.348539][T13708] Call Trace: [ 2497.351848][T13708] dump_stack+0x11d/0x181 [ 2497.356267][T13708] should_fail.cold+0xa/0x1a [ 2497.360961][T13708] __should_failslab+0xee/0x130 [ 2497.365882][T13708] should_failslab+0x9/0x14 [ 2497.370399][T13708] kmem_cache_alloc+0x29/0x5d0 [ 2497.375238][T13708] skb_clone+0xf9/0x290 04:02:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xfec0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x3}, 0x0) [ 2497.379445][T13708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2497.385721][T13708] dev_queue_xmit_nit+0x24a/0x540 [ 2497.390762][T13708] ? constant_test_bit+0x30/0x30 [ 2497.395711][T13708] dev_hard_start_xmit+0x3f5/0x430 [ 2497.400849][T13708] __dev_queue_xmit+0x14ab/0x1b40 [ 2497.405878][T13708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2497.412248][T13708] ? nf_ct_bridge_post+0x22f/0xb50 [ 2497.417645][T13708] dev_queue_xmit+0x21/0x30 [ 2497.422231][T13708] br_dev_queue_push_xmit+0x2c1/0x330 [ 2497.427609][T13708] ? nf_hook_slow+0xb8/0x160 [ 2497.432215][T13708] br_forward_finish+0x177/0x190 [ 2497.437158][T13708] ? br_fdb_add.cold+0x88/0x88 [ 2497.441927][T13708] __br_forward+0x331/0x4a0 [ 2497.446501][T13708] ? __read_once_size.constprop.0+0x20/0x20 [ 2497.452446][T13708] br_flood+0x31a/0x330 [ 2497.456671][T13708] br_dev_xmit+0x680/0x920 [ 2497.461092][T13708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2497.464735][T13806] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2497.467537][T13708] dev_hard_start_xmit+0xef/0x430 [ 2497.480675][T13708] __dev_queue_xmit+0x14ab/0x1b40 04:02:52 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000000c0)={{0x9, 0x9, 0x1, 0x2, 0xc1, 0x2}}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2497.485795][T13708] ? ipt_do_table+0x8e9/0xe60 [ 2497.490660][T13708] ? __this_cpu_preempt_check+0x4a/0x170 [ 2497.496324][T13708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2497.502444][T13708] ? __rcu_read_unlock+0x66/0x3c0 [ 2497.507475][T13708] ? nf_nat_packet+0xc2/0x110 [ 2497.512165][T13708] dev_queue_xmit+0x21/0x30 [ 2497.516734][T13708] ip_finish_output2+0x836/0xe40 [ 2497.521800][T13708] __ip_finish_output+0x23a/0x490 [ 2497.526839][T13708] ? ipv4_confirm+0xdc/0x160 [ 2497.531562][T13708] ip_finish_output+0x41/0x160 [ 2497.536339][T13708] ip_mc_output+0x143/0x620 [ 2497.540930][T13708] ? __ip_finish_output+0x490/0x490 [ 2497.546152][T13708] ip_local_out+0x74/0x90 [ 2497.550655][T13708] __ip_queue_xmit+0x3a8/0xa40 [ 2497.555438][T13708] l2tp_xmit_skb+0x574/0x8e0 [ 2497.560045][T13708] ? skb_put+0xeb/0x110 [ 2497.564278][T13708] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2497.569146][T13708] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2497.570863][T14015] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) 04:02:52 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x4}, 0x0) [ 2497.574325][T13708] sock_sendmsg+0x9f/0xc0 [ 2497.574352][T13708] ___sys_sendmsg+0x2b7/0x5d0 [ 2497.589726][T14015] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2497.590570][T13708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2497.590673][T13708] ? __rcu_read_unlock+0x66/0x3c0 [ 2497.618402][T13708] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2497.624351][T13708] ? __fget+0xb8/0x1d0 [ 2497.628447][T13708] ? __fget_light+0xaf/0x190 [ 2497.633053][T13708] ? __fdget+0x2c/0x40 [ 2497.637266][T13708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2497.643532][T13708] __sys_sendmmsg+0x123/0x350 [ 2497.649027][T13708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2497.655318][T13708] ? fput_many+0xec/0x130 [ 2497.659714][T13708] ? fput+0x29/0x30 [ 2497.663603][T13708] ? ksys_write+0x145/0x1b0 [ 2497.668116][T13708] __x64_sys_sendmmsg+0x64/0x80 [ 2497.671875][T14223] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2497.673057][T13708] do_syscall_64+0xcc/0x370 [ 2497.673187][T13708] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2497.691666][T13708] RIP: 0033:0x45a639 [ 2497.695612][T13708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2497.715291][T13708] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2497.723719][T13708] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:02:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xffffff7f}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:53 executing program 3: socket$kcm(0x10, 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x204100, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x90) 04:02:53 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x5}, 0x0) [ 2497.731708][T13708] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2497.739781][T13708] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2497.747775][T13708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2497.755760][T13708] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2497.771265][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2497.777064][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2498.041227][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2498.047026][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:53 executing program 5 (fault-call:9 fault-nth:58): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0xff00, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:02:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:53 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x6}, 0x0) 04:02:53 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r4], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r4}) socket$kcm(0x29, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@newtfilter={0x74, 0x2c, 0x0, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x10, 0x1}, {0xfffc, 0x3}, {0xa, 0x9}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x40, 0x2, [@TCA_FLOW_EMATCHES={0x34, 0xb, [@TCA_EMATCH_TREE_LIST={0x20, 0x2, @TCF_EM_CMP={0x1c, 0x7fff, {0x1, 0x1, 0x3, 0x0, {0xfffffe01, 0x8, 0xffff, 0x7, 0xf, 0x1, 0x7c2d56584caaa863}}}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1475}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}, @TCA_FLOW_ADDEND={0x8, 0x5, 0x5}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x40000}, 0x4008010) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2498.304673][T14543] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2498.338508][T14549] FAULT_INJECTION: forcing a failure. [ 2498.338508][T14549] name failslab, interval 1, probability 0, space 0, times 0 [ 2498.340653][T14543] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2498.361299][T14549] CPU: 0 PID: 14549 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2498.370968][T14549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2498.381029][T14549] Call Trace: [ 2498.384365][T14549] dump_stack+0x11d/0x181 [ 2498.388819][T14549] should_fail.cold+0xa/0x1a [ 2498.393450][T14549] __should_failslab+0xee/0x130 [ 2498.400356][T14549] should_failslab+0x9/0x14 [ 2498.404876][T14549] kmem_cache_alloc_node+0x39/0x660 [ 2498.410320][T14549] __alloc_skb+0x8e/0x360 [ 2498.414700][T14549] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2498.420649][T14549] sock_wmalloc+0xb8/0x110 [ 2498.425109][T14549] pppol2tp_sendmsg+0x15a/0x3c0 [ 2498.430088][T14549] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2498.435225][T14549] sock_sendmsg+0x9f/0xc0 [ 2498.439562][T14549] ___sys_sendmsg+0x2b7/0x5d0 [ 2498.444272][T14549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2498.450556][T14549] ? __rcu_read_unlock+0x66/0x3c0 [ 2498.455591][T14549] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2498.461491][T14549] ? __fget+0xb8/0x1d0 [ 2498.465624][T14549] ? __fget_light+0xaf/0x190 [ 2498.470218][T14549] ? __fdget+0x2c/0x40 [ 2498.474291][T14549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2498.480614][T14549] __sys_sendmmsg+0x123/0x350 [ 2498.485393][T14549] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2498.491661][T14549] ? fput_many+0xec/0x130 [ 2498.496005][T14549] ? fput+0x29/0x30 [ 2498.499878][T14549] ? ksys_write+0x145/0x1b0 04:02:53 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x8}, 0x0) 04:02:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x4000) 04:02:53 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2498.504412][T14549] __x64_sys_sendmmsg+0x64/0x80 [ 2498.509386][T14549] do_syscall_64+0xcc/0x370 [ 2498.513914][T14549] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2498.519900][T14549] RIP: 0033:0x45a639 [ 2498.523811][T14549] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2498.546805][T14549] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 04:02:53 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r1) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000140), 0x0, r2) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x8, 0x40040) connect$netlink(r3, &(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={r0, 0x2b, 0x1000}, 0x0, &(0x7f00000000c0)="f183b022443fc8e174e9ebab9a2b1fc2f332dfb0813a2b46eb93a6815d932bba3e004530b51bea2903dc5c", &(0x7f0000000400)="fbe348ca352d69288ba216047a16d08495cc3805b0f5416d9128ab30b27d191698b94b1c498f4c1e8f1d05b352c1688a1bc558d992847ebbd1725e123391976ca665eba44974328a52c502041be68c116accf68b85158259ffd71bdfeb0baf1046c36acd4af2e95324e6973a9975b55c344366f96c6f166c2265d889a0713c5ab28731c77ef7d7d59383d38aa8c0d236431b570f8f01ce38e7ede05f254c2f1e803a496343ae478f185b8e4bca2cd210154d53974d6bfdb59d184af3837d1089a74e7b7d4903947693cbbd51aa2054d52793395243783a85d85dd76f130696e03a206eba8e411165c1ab1e53cdfb4605e96cfc221a5188f39e127c16c9ae674aed2642cd2958519a45243f550d454c4a7157c44cf549fdc8da4a208af94189500a5179997ed41049d796956afe6e0467f7c54684e957abff61d2685835c923ae263e8676c62530f9a587138927da1ecde6fb4c0e833eeb24da3c95ea829dc299887eea8bd20a98c5cd975636807625345ea053fe0dbee39a20942c8c34b6dd13626f4700a248548028ed72c9fb6331ef6fb59b2c37c6a7f205fb1cecd49d84c6bea4ff62e2ede52f2ac1074d90787af55eaedb2dfebfb03ee3f2832feb178716039aa60fe38b3cbc9af4eeeede06b0620dfede6becf7f145a610fbea3856a0c634964d6784fc01d5e5f6368206bc7fde6144ae056d6787ba4a7bb2d467d681e715f950b4218fea68e290776fe1b327459b1cfec56e21cc7338fd96b7b799f81d6d3e6ce1f8cd17876aea4590c30826657cfcd529bcc213d82a4c7f801598992329eaf726356b92d6454d650ed9925d4f68643ecba67c401b22a96470f2355419b02fc6823bec6676c7f141100053225866c1849a81137829ee79c809b39a8cbdedaabd9d8d59dc72b725487e4e9c40f8d8ba49d985200326f38600a55a93d0d7555a59e4a16a51f9b708ff38d361aeef92b52f85776547e50646a0f3594089c1b9c87c261fe713d5257b2d1da5a173bc596a94137ff9f75e22737e8e5f1a6063e93fc55c63c3cd85c87a9aa4aa0b8ce3e18ba5dc695235e9c2c6555bce36dbff18aaa8f1b4b5f6a016d8c77d0139e7973569919e1f1f4487812c83faecf23cce93179947c90297603ff64f40d80c6f1fb1a791b05a3352efe4415a58965ae96186eab6636bcd27d484499f4d7c5b9d838f260d1178be5f30e8c1632fbc41dd4b75ab326724f716863f62fe72b53f7fc671757cbbcb39b541c0e77c3a5289a42da9df5b026e915c50bf84e3c677b8018482342ea7f438583e44207d7d48714b66365f310ffeb51aa9ad070f277f7860b7d3a169dd238c8e2b354df282d696fa366d7c40028f0f2a147d5d7c20697e74e7620dc689e403823369510861d382b4d62ba06a365bd37a204c943c7af2900acf18856bfd230ab6d280e5666f412ed14a88e1ed87ca4e825faac914e6d4492c39aef4d8a6b165f4d9929908b295894feb32dc7974295cdbdf7c701b61019d544acc7182863fba473e703be0879779d2a3b5fe0e15ac5b0838e51ac4611516384aa534ef24cbf3887250371e0723fd43b37de0db2fa0622641c0603045e3e48679677370a089f06b4f83d51ab60cae5ced05dd577589e2c0202b06783f4278ef20297e0918c5826a879c3f05f85f11dc2a6f795b6313860f9e8baa2e5710a6c0b4cb752bd88b3fd13c531277025dd49211e69924a5c98903551d775ef3d6f8ee60f8f217c1150839188d456630baf63c62911faa54e3c0753a59b2d056fe137b8d91747af0575ffa6da74c39960dc3675f2a71690d6774046eda801d3ad0ef1e64ffb76664ec113488a64abc6d265d0be5022a1af88dc43a1955bfb7ad540845a955c6eff86d21bafd53fbff7a7c61013e8991cee64a0c3f0fb90be08a92235cb42e5bdb7768e244cbff3b759297f11651f54d26a4dac1939f4b17b41f400a94791d0e7efa4ee5eaa86e445a1d371fb21a9001bb39a22051ab45d216f2c37bcd0e94968db1a9dbd2a462865f0f9a2bd9750adfe275e6ed57eed03c8c8154fd956b517d8bd32172b7f85feedaeb99eef1365ffddd4fd0a2c5109f52842d42dc9a04866355f0de7fcac33d99b1b07c7a25984053f586537258f89c700cdee8bc7abf97c0c69f8d3cffba5ad73019c8497ab2ecc38479a67109a774b773b90f6d7a3a00934e8d99f5a03abccd02f3d0cb268ce140b9f6741725b1e6226b26ec9b456df3c9b4fffb0ff8a46b5d218a3009df714ac0fc4bcce74207918f75f10b863119c3f58ff2f100dfc0f41f7a21b9646ee4951be3a5c6ea41ee9413224adcc32ac445cdf3d709ce9b263954ca4aa890f5c6559683a85629c5661889a65bbb8c697f8c1387faf4ea5fc1e7265aad6c961f830ca3ab3a0db113b8bf26e77425d2767faafa04ae686e5fa725ee43af7e98b1134c2cac2b3648b478589034bdd0206759aacf9e66403cf249e6b90890db9eca9fe1ded9ded29fa0f6cab5d9f4286c9b4f174a6cba09bdf9f537a1696cf0c4e7ea38f223d9259cda8a65892f40c089fd4527179b0fb877ae5cbaecb9d08da27e61d4253818169d4bbdb11ac0d8ecbe2c1f7ef902cffeae2fb3f74d52251c28fdd78c9d1e97bf704a52563bb31f9eab9670e6c4b054abc655e953ca2683b472e55b8b2d02f666f56fba40125a4b11d7c86e9cfc80d0b7fa73e739518148a7e8a92cef60c6819c44e7f0e5f0021e52ee3a4b8c458ff1c911261861170422bdbccbf3115af9d20634fa18ccc7b0edd1c84b4ddfe81b141c517c12f335b97e653b236bccd09ede6ffc0dabbeda0e84ba1311cf22cb27fa1120f123bcb3ad6bdd823af75a6509418691e7371cfcaccc0ca9ad5e366f8f82b9a544037c29c4732002e2a62ff9bf52a760abc931c423be6a85303867c3c5454cdd9539793f75c82eb2bf5c4304676cb27e884dae3e19fbad28a605c529151798e060885663ca3d5312576c737380554157a6cc24042b3be297e79497523cabd3be2ba42986557b68195d82336a3d57c5b46ecaa0c78335f02fade6efd9ba9cec062f2b8742052a163863aaae56f2f5e7ddac590aa4786de4ed559cf6a35fc19195e8534e077b3227325f840b89915bd90b18b7a8d7090fa8efd68ee8a04cebd2e6f4ef3847e86a513fade169c28ee1ff5e401126157f964290006939c0a8a8ac0b2246ff8924b714b0d96666a5737e23d7870aac620f69f84702c60ae260fd2be653ce5e76aa18632b2db901e2aa9c33cd5d0329639dea4596818da033a828c00708d1b77574a1561c997c6513effb8e0055eec9adfd45e8950b6a2ce26aa8a8a4c76e06b7cef59a77c888e39e07e8b638d72b3e2f57f3a9ee616eb6df2d89133a4dde6e8e701cffc9812087bb2c6248ae49902d58c71504665f849acf79f6cf741028b65a9811d76f90810b28f2d13937c4e145471bf2e94258e2a3b125f1a31790a4a65cca9596e2c4e13a143b1f32dbe83f8e012619ddbda24549bcdd3c212ef46c82ce5abe828e4b61bcea96b3e142a034019292fa421aad49ddea9245dc72467963a85e277eecbdefc9ff4145ec94fc083701a777a54efb66acf5963c904aefe921b185cc26c33a132104b4663126fe20960e637be0ae780ca21df6c7eeb0e05038e3e2032668024e5d3f111724ceb2c7acc6f92fb467ebbb488c0d011b7f2311a17719dac8238d66d03523f13990dbe46bb384db9e47d6fef77320c18dfa3b535403a378f68c9490687631d5eabe037fa3914cdba23001e8e44c007840dee7c2d0a321f6c7c4c3a289013b2b7457c2bf66cf5646397d7455aa213f8ab19ac01a4410856f0440afcb55230766484ae4b5a8d298ac2d7e775c3477c00fde5d7f11c6e37d8f323a40d6b08713a3f090f8953406044bee30753a3a768782ba106d277707bca833a6c45ca0d0df7a2389cc501ddb164314d488b39328c1d2dbd5e74a0fb233cfa905d307ef3d506f47a90298c02bc02ebbfc5222b46eef874c261537677e79b5ba8e90e2ce30fef5262ec20766b87a259326d23c0e06e8be234615b250d07d0edf8ece5160bb0a31d8a389d074b0e01221cae9984830334fd78d5f395a15cbe706cb01d7e0a210548eeafd65b7f2ede80f781935c3109ef2dcf290bbf41733a3f73bad66fbd4488f7895ccb170cde8098cd32fef84f3a9e3cf3cc6c87635c4f1bd010558f4b209f5c289c5ff4a9c042e5d65ae66ab83ad1aa19629524319ef9875ae9efe1760d908bd27eead6a8ef982f692bfdba52a7de31701b8aef0cc18dcba7fb180622d47c0ba7ef2b36f92f9a6eb8b88680ec5c18391b32d73ade871ac25d8b6c3c7ce48f3aec315764c35cc118d4c4b1cc3cc7a729e3c1584661bea43bc075d0e0d4a21d1c9ec5a17c9fa79bbcf68d76ecc6176db686da825afc5dff81150169b3c504cd552204e4cb3f848225ddbf47b46f7f79a7bc88cab81f97d06d55bde0b9cfc966575d6adf548be90ab967ed8a4f4d76afe046e3b36489af5135111c67775d528c2c18fba3c82ee46e70be2f6f5f309d6640e9ca76d2889a7b02c1939ff25a8e5e374ab20317cfa1063399300fdcb147396f0fedd1a02ed14fabaf2f616dcdc5997d9a515cce48ff491c87797834b18d919e6a5eabf508c84c046b93448dce056f23ad9c01f7e471251592fd55ca2a2b7f95b7b9836c4f401fde79a56de8c152c0ace7569d64645949e2b9d35ea3a87dd26512ed5db5ac9c5fe4cce22fba3d76f6a0296d2498b6a66d8733141988594cddce13714d11e86a3ac6194c5773eacdb996535bec501c508f3cc9a04a9c4fd2327aa396a5dffe7c7f22831e2e3b997673f437d604cd742283903287e92798c83e38b8a0d1574c2734b392661a7d4f3cd902dc675a2eec2bf8939234ed57d5d934b08d6410a0dfffc2676d93457b0fd3aae07976c1b1e099bc97a16b1812f59f7bd70d3e57b4747e2172f3b6be1a0dc680181ee63940cefd62372d328ba267acf358a696109e31732eccc76dd935793a751afb2565a8c3995109375a9b93c86c4252e01a237554338d0535f88c90eab987a82207ae3d2c8235f6395000162392fcda0f7c8acef35de0a4dca9b4c4b14909b4e3fdb3f6a534bbb910ba9c72521ba876cbb45c316a346215724b2a4c5cc55885ad4eb8464182c8e37eafdd33d002f6d4d93a86bae72722ecc825dcc780cf0d1eac0b0b693cbf8553e734da5b0330a057c5902c768c185e44060368bdd9b5d4dd0e5a2d70fed7d43b411952d084acf36fdd5ec2467cebbd1da50be8b26ca32e56b5723f50356225a016a557a4ea898b5779343ee159b10712458224e7dc6be6c941ec92e39d8f2789507df60b80adb6d70bc25ac2f02032735394a9d8f4e3d90c444a5e3f82aff3dcec36bd19c2df7b5ee56207fe334e9c22acc75cf62226a38d14e331e3166a67263545d54dd824288795f3a7dd1e7c3de525aacdcdebbd10873b6c4ac3ce4c6a681e54de664242e774038fe2ccbee149275c55486a87b13f5602ddbc40a29f5a0512c8154467dc6b004f30aaf78651513298dc88ae8690afde3b669eeb142119dcb016d9854563241ffbf9c0a8059ca4423616ef17c209e0d9c4ea38e31cf9af81682f9bb1fab783f84e5b7c05db39adfd87989d3d9e4e4346bbb9bedea70c2886bdef9838849f1dd1fd6b422dccb484a8be34e0e12b6e7dc33d8e01a313dd41399a3eb9cdb01aa4af7a2333ef1ad232c9ff7aeb453869b0833e65f136fee8b3d4b840fc8fa239a4666064fb3e2f4507517031a1c") r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2498.555314][T14549] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2498.563329][T14549] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2498.571335][T14549] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2498.579328][T14549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2498.587313][T14549] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xffffff8d}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:54 executing program 5 (fault-call:9 fault-nth:59): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x2, @mcast2={0x0}}, r1}}, 0x48) 04:02:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x9}, 0x0) 04:02:54 executing program 3: socket$kcm(0x10, 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x81, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1, 0x0, 0xffffffffffffff44}, 0x0) [ 2498.895700][T15166] FAULT_INJECTION: forcing a failure. [ 2498.895700][T15166] name failslab, interval 1, probability 0, space 0, times 0 [ 2498.949632][T15166] CPU: 1 PID: 15166 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2498.957767][T15166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2498.967922][T15166] Call Trace: [ 2498.971271][T15166] dump_stack+0x11d/0x181 [ 2498.975881][T15166] should_fail.cold+0xa/0x1a [ 2498.980505][T15166] __should_failslab+0xee/0x130 [ 2498.985649][T15166] should_failslab+0x9/0x14 [ 2498.990438][T15166] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2498.996188][T15166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2499.002534][T15166] ? memcg_kmem_put_cache+0x91/0xe0 [ 2499.008381][T15166] __kmalloc_node_track_caller+0x38/0x50 [ 2499.014048][T15166] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2499.019566][T15166] __alloc_skb+0xc2/0x360 [ 2499.023939][T15166] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2499.029838][T15166] sock_wmalloc+0xb8/0x110 [ 2499.034277][T15166] pppol2tp_sendmsg+0x15a/0x3c0 [ 2499.039180][T15166] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2499.044382][T15166] sock_sendmsg+0x9f/0xc0 [ 2499.048775][T15166] ___sys_sendmsg+0x2b7/0x5d0 [ 2499.053443][T15166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2499.059669][T15166] ? __rcu_read_unlock+0x66/0x3c0 [ 2499.064744][T15166] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2499.070708][T15166] ? __fget+0xb8/0x1d0 [ 2499.074800][T15166] ? __fget_light+0xaf/0x190 [ 2499.079376][T15166] ? __fdget+0x2c/0x40 [ 2499.083434][T15166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2499.089683][T15166] __sys_sendmmsg+0x123/0x350 [ 2499.094368][T15166] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2499.100690][T15166] ? fput_many+0xec/0x130 [ 2499.105056][T15166] ? fput+0x29/0x30 [ 2499.108878][T15166] ? ksys_write+0x145/0x1b0 [ 2499.113398][T15166] __x64_sys_sendmmsg+0x64/0x80 [ 2499.118247][T15166] do_syscall_64+0xcc/0x370 [ 2499.122771][T15166] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2499.128650][T15166] RIP: 0033:0x45a639 [ 2499.132534][T15166] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2499.152145][T15166] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2499.160740][T15166] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2499.168727][T15166] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2499.176715][T15166] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2499.184689][T15166] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2499.192660][T15166] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x10}, 0x0) 04:02:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x3, @mcast2={0x0}}, r1}}, 0x48) 04:02:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1000000000000055}, 0x2000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x0, 0x2, 0x62, "ba3278f0f21dc926bf887433d21370691bd88a42d1c9d64cc7d3095131c8132749605c9f8e0bc8aa728f791adc9dd08d48edd52087bdd988ff411cbb633635", 0x26}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)="394f7b309979432c6ef1d73e3424b6ff23bc99de1f0bc6e22bbf668d090f35932d09069d8afb5309044f51e06d7d69c4678d5492904988da", 0x38}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe0}, 0x20044) 04:02:54 executing program 5 (fault-call:9 fault-nth:60): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2499.460002][T15493] FAULT_INJECTION: forcing a failure. [ 2499.460002][T15493] name failslab, interval 1, probability 0, space 0, times 0 [ 2499.472684][T15493] CPU: 0 PID: 15493 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2499.480607][T15493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2499.490709][T15493] Call Trace: [ 2499.494143][T15493] dump_stack+0x11d/0x181 [ 2499.498500][T15493] should_fail.cold+0xa/0x1a [ 2499.503173][T15493] __should_failslab+0xee/0x130 [ 2499.508073][T15493] should_failslab+0x9/0x14 [ 2499.512600][T15493] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2499.518332][T15493] ? should_fail+0xd4/0x45d [ 2499.523036][T15493] __kmalloc_node_track_caller+0x38/0x50 [ 2499.528687][T15493] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2499.534125][T15493] pskb_expand_head+0x102/0x750 [ 2499.539384][T15493] ? iov_iter_advance+0x211/0x9d0 [ 2499.544445][T15493] l2tp_xmit_skb+0x754/0x8e0 [ 2499.549056][T15493] ? skb_put+0xeb/0x110 [ 2499.554023][T15493] pppol2tp_sendmsg+0x2fc/0x3c0 04:02:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x4, @mcast2={0x0}}, r1}}, 0x48) 04:02:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x14}, 0x0) [ 2499.558898][T15493] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2499.564192][T15493] sock_sendmsg+0x9f/0xc0 [ 2499.568606][T15493] ___sys_sendmsg+0x2b7/0x5d0 [ 2499.573308][T15493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2499.579609][T15493] ? __rcu_read_unlock+0x66/0x3c0 [ 2499.584665][T15493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2499.590589][T15493] ? __fget+0xb8/0x1d0 [ 2499.594745][T15493] ? __fget_light+0xaf/0x190 [ 2499.599350][T15493] ? __fdget+0x2c/0x40 [ 2499.603462][T15493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2499.609726][T15493] __sys_sendmmsg+0x123/0x350 [ 2499.614510][T15493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2499.621520][T15493] ? fput_many+0xec/0x130 [ 2499.625894][T15493] ? fput+0x29/0x30 [ 2499.629721][T15493] ? ksys_write+0x145/0x1b0 [ 2499.634248][T15493] __x64_sys_sendmmsg+0x64/0x80 [ 2499.639141][T15493] do_syscall_64+0xcc/0x370 [ 2499.643858][T15493] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2499.649744][T15493] RIP: 0033:0x45a639 [ 2499.653803][T15493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2499.673407][T15493] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2499.681921][T15493] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2499.689903][T15493] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2499.697888][T15493] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:02:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xfffffff5}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x5, @mcast2={0x0}}, r1}}, 0x48) [ 2499.705866][T15493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2499.713844][T15493] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:55 executing program 5 (fault-call:9 fault-nth:61): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x18}, 0x0) [ 2499.957077][T15824] FAULT_INJECTION: forcing a failure. [ 2499.957077][T15824] name failslab, interval 1, probability 0, space 0, times 0 [ 2499.969902][T15824] CPU: 1 PID: 15824 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2499.977948][T15824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2499.988006][T15824] Call Trace: [ 2499.991381][T15824] dump_stack+0x11d/0x181 [ 2499.995732][T15824] should_fail.cold+0xa/0x1a [ 2500.000449][T15824] __should_failslab+0xee/0x130 [ 2500.005426][T15824] should_failslab+0x9/0x14 [ 2500.009951][T15824] kmem_cache_alloc+0x29/0x5d0 [ 2500.014731][T15824] skb_clone+0xf9/0x290 [ 2500.018908][T15824] ip_mc_output+0x1fd/0x620 [ 2500.023487][T15824] ? constant_test_bit+0x30/0x30 [ 2500.028623][T15824] ip_local_out+0x74/0x90 [ 2500.033070][T15824] __ip_queue_xmit+0x3a8/0xa40 [ 2500.037844][T15824] l2tp_xmit_skb+0x574/0x8e0 [ 2500.042449][T15824] ? skb_put+0xeb/0x110 [ 2500.046618][T15824] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2500.051459][T15824] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2500.056576][T15824] sock_sendmsg+0x9f/0xc0 [ 2500.060922][T15824] ___sys_sendmsg+0x2b7/0x5d0 [ 2500.065591][T15824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2500.071904][T15824] ? __rcu_read_unlock+0x66/0x3c0 [ 2500.076952][T15824] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2500.082948][T15824] ? __fget+0xb8/0x1d0 [ 2500.087021][T15824] ? __fget_light+0xaf/0x190 [ 2500.091597][T15824] ? __fdget+0x2c/0x40 [ 2500.095659][T15824] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2500.101909][T15824] __sys_sendmmsg+0x123/0x350 [ 2500.106600][T15824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2500.112846][T15824] ? fput_many+0xec/0x130 [ 2500.118036][T15824] ? fput+0x29/0x30 [ 2500.121833][T15824] ? ksys_write+0x145/0x1b0 [ 2500.126326][T15824] __x64_sys_sendmmsg+0x64/0x80 [ 2500.131307][T15824] do_syscall_64+0xcc/0x370 [ 2500.135850][T15824] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2500.141736][T15824] RIP: 0033:0x45a639 [ 2500.145670][T15824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2500.165362][T15824] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2500.175865][T15824] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2500.183831][T15824] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2500.191804][T15824] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2500.199918][T15824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2500.207876][T15824] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x242002, 0x0) statx(r1, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x40, &(0x7f0000000100)) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x6, @mcast2={0x0}}, r1}}, 0x48) 04:02:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x25}, 0x0) 04:02:55 executing program 5 (fault-call:9 fault-nth:62): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:55 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x5a}, 0x0) [ 2500.460380][T16133] FAULT_INJECTION: forcing a failure. [ 2500.460380][T16133] name failslab, interval 1, probability 0, space 0, times 0 [ 2500.473324][T16133] CPU: 0 PID: 16133 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2500.481229][T16133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2500.491380][T16133] Call Trace: [ 2500.494690][T16133] dump_stack+0x11d/0x181 [ 2500.499052][T16133] should_fail.cold+0xa/0x1a [ 2500.503689][T16133] __should_failslab+0xee/0x130 04:02:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x120, &(0x7f0000000080)=[{&(0x7f00000001c0)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8a01bca89086b3f7f6b075969e65d5d50bc29882a9bdb1993a0f84273be1a496a4db4866844b6a818a110eae557581ff2d91008faa15ae22f919d396574afa7527291b69aeeb43bf5ddacff85874d4031b6d974462c0f72384f2aca1b57dc723804441ad010e182df1ba977a29e1ab5cb830918f933d7a18fd4bfccdaa5065d", 0x2e}], 0x39b}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, 0xffffffffffffffff, 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f00000000c0)={0x6, 0x0, 0x5001, 0x52, 0x7fff, {0x250d, 0x5}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000140)) setrlimit(0xd, &(0x7f0000000040)={0x3, 0x1f71}) [ 2500.508561][T16133] should_failslab+0x9/0x14 [ 2500.513085][T16133] kmem_cache_alloc+0x29/0x5d0 [ 2500.517891][T16133] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2500.523885][T16133] dst_alloc+0xad/0x149 [ 2500.528053][T16133] rt_dst_clone+0x5c/0x3b0 [ 2500.532486][T16133] ip_mc_finish_output+0x68/0x340 [ 2500.537593][T16133] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2500.543322][T16133] ? nf_hook_slow+0xb8/0x160 [ 2500.547975][T16133] ip_mc_output+0x32c/0x620 [ 2500.552491][T16133] ? ip_copy_addrs+0x50/0x50 [ 2500.557097][T16133] ip_local_out+0x74/0x90 [ 2500.561499][T16133] __ip_queue_xmit+0x3a8/0xa40 [ 2500.566344][T16133] l2tp_xmit_skb+0x574/0x8e0 [ 2500.571000][T16133] ? skb_put+0xeb/0x110 [ 2500.575309][T16133] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2500.580290][T16133] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2500.586035][T16133] sock_sendmsg+0x9f/0xc0 [ 2500.590382][T16133] ___sys_sendmsg+0x2b7/0x5d0 [ 2500.595244][T16133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2500.601499][T16133] ? __rcu_read_unlock+0x66/0x3c0 [ 2500.606564][T16133] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2500.612505][T16133] ? __fget+0xb8/0x1d0 [ 2500.616591][T16133] ? __fget_light+0xaf/0x190 [ 2500.621193][T16133] ? __fdget+0x2c/0x40 [ 2500.625278][T16133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2500.631553][T16133] __sys_sendmmsg+0x123/0x350 [ 2500.636273][T16133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2500.642815][T16133] ? fput_many+0xec/0x130 [ 2500.647178][T16133] ? fput+0x29/0x30 [ 2500.650991][T16133] ? ksys_write+0x145/0x1b0 [ 2500.655513][T16133] __x64_sys_sendmmsg+0x64/0x80 [ 2500.660382][T16133] do_syscall_64+0xcc/0x370 [ 2500.664915][T16133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2500.670808][T16133] RIP: 0033:0x45a639 [ 2500.674970][T16133] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2500.695011][T16133] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2500.703532][T16133] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:02:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x2, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x7, @mcast2={0x0}}, r1}}, 0x48) 04:02:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x81, &(0x7f0000000200)}, 0x225) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) 04:02:56 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1f6}, 0x0) [ 2500.711538][T16133] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2500.719539][T16133] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2500.727516][T16133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2500.735494][T16133] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:56 executing program 5 (fault-call:9 fault-nth:63): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2501.060950][T16679] FAULT_INJECTION: forcing a failure. [ 2501.060950][T16679] name failslab, interval 1, probability 0, space 0, times 0 [ 2501.073831][T16679] CPU: 1 PID: 16679 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2501.081720][T16679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2501.091774][T16679] Call Trace: [ 2501.095074][T16679] dump_stack+0x11d/0x181 [ 2501.099414][T16679] should_fail.cold+0xa/0x1a [ 2501.104029][T16679] __should_failslab+0xee/0x130 [ 2501.108948][T16679] should_failslab+0x9/0x14 [ 2501.113505][T16679] kmem_cache_alloc+0x29/0x5d0 [ 2501.118275][T16679] ? __read_once_size.constprop.0+0x20/0x20 [ 2501.124199][T16679] skb_clone+0xf9/0x290 [ 2501.128401][T16679] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2501.134665][T16679] dev_queue_xmit_nit+0x24a/0x540 [ 2501.139710][T16679] ? constant_test_bit+0x30/0x30 [ 2501.144658][T16679] dev_hard_start_xmit+0x3f5/0x430 [ 2501.149795][T16679] __dev_queue_xmit+0x14ab/0x1b40 [ 2501.154925][T16679] ? ipt_do_table+0x8e9/0xe60 [ 2501.159746][T16679] ? __this_cpu_preempt_check+0x4a/0x170 [ 2501.165400][T16679] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2501.171327][T16679] ? __rcu_read_unlock+0x66/0x3c0 [ 2501.176376][T16679] ? nf_nat_packet+0xc2/0x110 [ 2501.181104][T16679] dev_queue_xmit+0x21/0x30 [ 2501.185634][T16679] ip_finish_output2+0x836/0xe40 [ 2501.190598][T16679] __ip_finish_output+0x23a/0x490 [ 2501.195635][T16679] ? ipv4_confirm+0xdc/0x160 [ 2501.200235][T16679] ip_finish_output+0x41/0x160 [ 2501.205013][T16679] ip_mc_output+0x143/0x620 [ 2501.209528][T16679] ? __ip_finish_output+0x490/0x490 [ 2501.214828][T16679] ip_local_out+0x74/0x90 [ 2501.219247][T16679] __ip_queue_xmit+0x3a8/0xa40 [ 2501.224041][T16679] l2tp_xmit_skb+0x574/0x8e0 [ 2501.228640][T16679] ? skb_put+0xeb/0x110 [ 2501.232866][T16679] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2501.237809][T16679] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2501.243033][T16679] sock_sendmsg+0x9f/0xc0 [ 2501.247362][T16679] ___sys_sendmsg+0x2b7/0x5d0 [ 2501.252056][T16679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2501.258303][T16679] ? __rcu_read_unlock+0x66/0x3c0 [ 2501.263372][T16679] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2501.269396][T16679] ? __fget+0xb8/0x1d0 [ 2501.273473][T16679] ? __fget_light+0xaf/0x190 [ 2501.278063][T16679] ? __fdget+0x2c/0x40 [ 2501.282257][T16679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2501.288503][T16679] __sys_sendmmsg+0x123/0x350 [ 2501.293368][T16679] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2501.299712][T16679] ? fput_many+0xec/0x130 [ 2501.304044][T16679] ? fput+0x29/0x30 [ 2501.307905][T16679] ? ksys_write+0x145/0x1b0 [ 2501.312496][T16679] __x64_sys_sendmmsg+0x64/0x80 [ 2501.317426][T16679] do_syscall_64+0xcc/0x370 [ 2501.321956][T16679] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2501.327873][T16679] RIP: 0033:0x45a639 [ 2501.331826][T16679] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2501.351506][T16679] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2501.360011][T16679] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2501.368609][T16679] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2501.376707][T16679] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2501.384721][T16679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2501.392797][T16679] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:56 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x8, @mcast2={0x0}}, r1}}, 0x48) 04:02:56 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x600}, 0x0) 04:02:56 executing program 5 (fault-call:9 fault-nth:64): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2501.635383][T16719] FAULT_INJECTION: forcing a failure. [ 2501.635383][T16719] name failslab, interval 1, probability 0, space 0, times 0 [ 2501.648044][T16719] CPU: 0 PID: 16719 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2501.656008][T16719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2501.666070][T16719] Call Trace: [ 2501.669379][T16719] dump_stack+0x11d/0x181 [ 2501.673727][T16719] should_fail.cold+0xa/0x1a [ 2501.678365][T16719] __should_failslab+0xee/0x130 [ 2501.683259][T16719] should_failslab+0x9/0x14 [ 2501.687772][T16719] kmem_cache_alloc+0x29/0x5d0 [ 2501.692653][T16719] skb_clone+0xf9/0x290 [ 2501.696910][T16719] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2501.703171][T16719] dev_queue_xmit_nit+0x24a/0x540 [ 2501.708245][T16719] ? constant_test_bit+0x30/0x30 [ 2501.713231][T16719] dev_hard_start_xmit+0x3f5/0x430 [ 2501.718364][T16719] __dev_queue_xmit+0x14ab/0x1b40 [ 2501.723408][T16719] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2501.729706][T16719] ? nf_ct_bridge_post+0x22f/0xb50 [ 2501.734905][T16719] dev_queue_xmit+0x21/0x30 [ 2501.739587][T16719] br_dev_queue_push_xmit+0x2c1/0x330 [ 2501.744968][T16719] ? nf_hook_slow+0xb8/0x160 [ 2501.750005][T16719] br_forward_finish+0x177/0x190 [ 2501.754957][T16719] ? br_fdb_add.cold+0x88/0x88 [ 2501.759834][T16719] __br_forward+0x331/0x4a0 [ 2501.764352][T16719] ? __read_once_size.constprop.0+0x20/0x20 [ 2501.770300][T16719] br_flood+0x31a/0x330 [ 2501.774503][T16719] br_dev_xmit+0x680/0x920 [ 2501.778995][T16719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2501.785422][T16719] dev_hard_start_xmit+0xef/0x430 [ 2501.790485][T16719] __dev_queue_xmit+0x14ab/0x1b40 [ 2501.795639][T16719] ? ipt_do_table+0x8e9/0xe60 [ 2501.800441][T16719] ? __this_cpu_preempt_check+0x4a/0x170 [ 2501.806129][T16719] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2501.812022][T16719] ? __rcu_read_unlock+0x66/0x3c0 [ 2501.817288][T16719] ? nf_nat_packet+0xc2/0x110 [ 2501.822081][T16719] dev_queue_xmit+0x21/0x30 [ 2501.826613][T16719] ip_finish_output2+0x836/0xe40 [ 2501.831694][T16719] __ip_finish_output+0x23a/0x490 [ 2501.836818][T16719] ? ipv4_confirm+0xdc/0x160 [ 2501.841421][T16719] ip_finish_output+0x41/0x160 [ 2501.846303][T16719] ip_mc_output+0x143/0x620 [ 2501.850860][T16719] ? __ip_finish_output+0x490/0x490 [ 2501.856061][T16719] ip_local_out+0x74/0x90 [ 2501.860452][T16719] __ip_queue_xmit+0x3a8/0xa40 [ 2501.865290][T16719] l2tp_xmit_skb+0x574/0x8e0 [ 2501.869943][T16719] ? skb_put+0xeb/0x110 [ 2501.874194][T16719] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2501.879083][T16719] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2501.884294][T16719] sock_sendmsg+0x9f/0xc0 [ 2501.888636][T16719] ___sys_sendmsg+0x2b7/0x5d0 [ 2501.893328][T16719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2501.899630][T16719] ? __rcu_read_unlock+0x66/0x3c0 [ 2501.904803][T16719] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2501.910728][T16719] ? __fget+0xb8/0x1d0 [ 2501.914870][T16719] ? __fget_light+0xaf/0x190 [ 2501.919466][T16719] ? __fdget+0x2c/0x40 [ 2501.923663][T16719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2501.929936][T16719] __sys_sendmmsg+0x123/0x350 [ 2501.934795][T16719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2501.941304][T16719] ? fput_many+0xec/0x130 [ 2501.945640][T16719] ? fput+0x29/0x30 [ 2501.949473][T16719] ? ksys_write+0x145/0x1b0 [ 2501.953986][T16719] __x64_sys_sendmmsg+0x64/0x80 [ 2501.958911][T16719] do_syscall_64+0xcc/0x370 [ 2501.963444][T16719] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2501.969372][T16719] RIP: 0033:0x45a639 [ 2501.973306][T16719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2501.993038][T16719] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2502.001470][T16719] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2502.009458][T16719] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2502.017468][T16719] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2502.025448][T16719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 04:02:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x283, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000001c008105e00f80ecdb4c5df207c804a00c000000a30305000a0002008a0ada1b40d805000500c50083b8014e5d530c99ccc3f996fbdeefd92d9a7f10c311dbd61c2a16b06569b977a642fa2a344511a49e959948130992", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r5], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r5}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6tnl0\x00', r5}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r9, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r9], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r9}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r12, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r12], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r12}) r13 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000240)=0xe8) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001440)=ANY=[@ANYBLOB="44040000240007050000000000000000000000001033fe21ea60a00558c5ed382776cc117c5b606b84cdc82e2caaa7c1e1b6de8b5a361d2ec3d39f4ac7bda38aaf36ffe188acc1b5590efc1ae862b5ceb13769ed20c3b182ce4ffe03bcdaabd2", @ANYRES32=r17, @ANYBLOB="00000e00ffffffff0000000008000100636271001804020004040600000000000000000000000000000000000000000000000000000000000000001842a762577e66670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0dd4c0a7e0900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100005000600000000000000050000003d"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r17], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r17}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @multicast2}, &(0x7f0000000440)=0xc) r20 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r21, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r23, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002800070400"/20, @ANYRES32=r23], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r23}) r24 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14, 0x80000) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r26, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r28, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="2400000028000704000000e086000000000000000000", @ANYRES32=r28], 0x2}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, r28}) r29 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f00000008c0)=0xc) r31 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000940)=0xc) r33 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in6=@loopback}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001400)=0xe8) r36 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in=@loopback}}}, &(0x7f0000003bc0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000008200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008240)=0x14) r39 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, @dev, @initdev}, &(0x7f00000082c0)=0xc) r41 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000008400)=0xe8) r43 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000b080)=[{&(0x7f000000acc0)=""/39, 0x27}, {&(0x7f000000ad00)=""/76, 0x4c}, {&(0x7f000000ad80)=""/147, 0x93}, {&(0x7f000000ae40)=""/130, 0x82}, {&(0x7f000000af00)}, {&(0x7f000000af40)=""/47, 0x2f}, {&(0x7f000000af80)=""/7, 0x7}, {&(0x7f000000afc0)=""/158, 0x9e}], 0x8, &(0x7f000000b100)=""/232, 0xe8}, 0x23ff}, {{&(0x7f000000b200)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f000000b840)=[{&(0x7f0000000f40)=""/266, 0x10a}, {&(0x7f000000b380)}, {&(0x7f000000b3c0)=""/187, 0xbb}, {&(0x7f000000b480)=""/93, 0x5d}, {&(0x7f000000b500)=""/154, 0x9a}, {&(0x7f000000b5c0)=""/30, 0x1e}, {&(0x7f000000b600)=""/94, 0x5e}, {&(0x7f000000b680)=""/93, 0x5d}, {&(0x7f000000b700)=""/96, 0x60}, {&(0x7f000000b780)=""/152, 0x98}], 0xa, &(0x7f000000b900)=""/181, 0xb5}, 0x646}], 0x7, 0x1, &(0x7f000000bb80)={0x0, 0x1c9c380}) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000c2c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000c280)={&(0x7f000000bbc0)={0x6b0, r2, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r9}, {0x168, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x61, 0xd, 0x1, 0xfff}, {0x6, 0x3f, 0x8}, {0x98c4, 0x0, 0xc6, 0x81}, {0x286, 0x2, 0xf, 0x45a}, {0x3e, 0x9, 0x2, 0x6}, {0x101, 0x0, 0x5, 0xfffffff8}, {0x9, 0x1f, 0x1, 0x4}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x77c4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xb166}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r17}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x39c}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r25}, {0xe8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r30}, {0xf4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7651}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r34}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x178, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r37}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r40}}}]}}, {{0x8, 0x1, r42}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r44}}}]}}]}, 0x6b0}, 0x1, 0x0, 0x0, 0x80}, 0x10) 04:02:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x3, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x7d00}, 0x0) 04:02:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x9, @mcast2={0x0}}, r1}}, 0x48) 04:02:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x7ffffff2}, 0x0) 04:02:57 executing program 5 (fault-call:9 fault-nth:65): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2502.188194][T17361] net_ratelimit: 20 callbacks suppressed [ 2502.188213][T17361] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2502.218212][T17361] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2502.281205][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2502.287031][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2502.298463][T17383] FAULT_INJECTION: forcing a failure. [ 2502.298463][T17383] name failslab, interval 1, probability 0, space 0, times 0 [ 2502.311285][T17383] CPU: 0 PID: 17383 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2502.319180][T17383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2502.329270][T17383] Call Trace: [ 2502.332579][T17383] dump_stack+0x11d/0x181 [ 2502.336987][T17383] should_fail.cold+0xa/0x1a [ 2502.341729][T17383] __should_failslab+0xee/0x130 [ 2502.346579][T17383] should_failslab+0x9/0x14 [ 2502.351075][T17383] kmem_cache_alloc_node+0x39/0x660 [ 2502.356284][T17383] __alloc_skb+0x8e/0x360 [ 2502.360717][T17383] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2502.366608][T17383] sock_wmalloc+0xb8/0x110 [ 2502.371297][T17383] pppol2tp_sendmsg+0x15a/0x3c0 [ 2502.376161][T17383] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2502.381347][T17383] sock_sendmsg+0x9f/0xc0 [ 2502.385684][T17383] ___sys_sendmsg+0x2b7/0x5d0 [ 2502.390405][T17383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2502.396678][T17383] ? __rcu_read_unlock+0x66/0x3c0 [ 2502.401707][T17383] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2502.407724][T17383] ? __fget+0xb8/0x1d0 [ 2502.411808][T17383] ? __fget_light+0xaf/0x190 [ 2502.416426][T17383] ? __fdget+0x2c/0x40 [ 2502.420545][T17383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2502.426804][T17383] __sys_sendmmsg+0x123/0x350 [ 2502.431501][T17383] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2502.437924][T17383] ? fput_many+0xec/0x130 [ 2502.442300][T17383] ? fput+0x29/0x30 [ 2502.446109][T17383] ? ksys_write+0x145/0x1b0 [ 2502.450606][T17383] __x64_sys_sendmmsg+0x64/0x80 [ 2502.455562][T17383] do_syscall_64+0xcc/0x370 [ 2502.460058][T17383] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2502.466040][T17383] RIP: 0033:0x45a639 [ 2502.469960][T17383] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2502.489566][T17383] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2502.498132][T17383] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2502.506101][T17383] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2502.514069][T17383] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2502.522050][T17383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2502.530039][T17383] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:02:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xa, @mcast2={0x0}}, r1}}, 0x48) 04:02:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x7ffffff8}, 0x0) 04:02:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) 04:02:57 executing program 5 (fault-call:9 fault-nth:66): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2502.694791][T17534] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2502.730874][T17534] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:02:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x7ffffff9}, 0x0) 04:02:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x10, @mcast2={0x0}}, r1}}, 0x48) 04:02:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x78, @mcast2={0x0}}, r1}}, 0x48) [ 2503.002236][T17747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2503.008496][T17747] __sys_sendmmsg+0x123/0x350 [ 2503.013253][T17747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2503.019553][T17747] ? fput_many+0xec/0x130 [ 2503.023891][T17747] ? fput+0x29/0x30 [ 2503.027707][T17747] ? ksys_write+0x145/0x1b0 [ 2503.032225][T17747] __x64_sys_sendmmsg+0x64/0x80 [ 2503.037199][T17747] do_syscall_64+0xcc/0x370 [ 2503.041715][T17747] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2503.047754][T17747] RIP: 0033:0x45a639 04:02:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x5, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000480)={r3, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r3, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r5, 0x20}, &(0x7f0000000180)=0x8) [ 2503.051671][T17747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2503.071585][T17747] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2503.080102][T17747] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2503.088075][T17747] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2503.096054][T17747] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2503.104142][T17747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2503.112126][T17747] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2503.119951][T18063] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) 04:02:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x2}, 0x0) [ 2503.175251][T18063] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2503.217146][T18172] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x0, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfc, @mcast2={0x0}}, r1}}, 0x48) 04:02:58 executing program 5 (fault-call:9 fault-nth:67): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x3}, 0x0) 04:02:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x4, 0x301820) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x20a201) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x1, 0x4) [ 2503.674432][T18375] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x4, 0x0) 04:02:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4}, 0x0) [ 2503.764571][T18591] FAULT_INJECTION: forcing a failure. [ 2503.764571][T18591] name failslab, interval 1, probability 0, space 0, times 0 [ 2503.777301][T18591] CPU: 1 PID: 18591 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2503.785197][T18591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2503.795253][T18591] Call Trace: [ 2503.798627][T18591] dump_stack+0x11d/0x181 [ 2503.802971][T18591] should_fail.cold+0xa/0x1a [ 2503.807580][T18591] __should_failslab+0xee/0x130 04:02:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x300, @mcast2={0x0}}, r1}}, 0x48) [ 2503.812453][T18591] should_failslab+0x9/0x14 [ 2503.816974][T18591] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2503.822718][T18591] ? should_fail+0xd4/0x45d [ 2503.827241][T18591] __kmalloc_node_track_caller+0x38/0x50 [ 2503.832924][T18591] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2503.838351][T18591] pskb_expand_head+0x102/0x750 [ 2503.843225][T18591] ? iov_iter_advance+0x211/0x9d0 [ 2503.844998][T18596] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2503.848276][T18591] l2tp_xmit_skb+0x754/0x8e0 [ 2503.848296][T18591] ? skb_put+0xeb/0x110 [ 2503.848402][T18591] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2503.870143][T18591] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2503.875272][T18591] sock_sendmsg+0x9f/0xc0 [ 2503.879717][T18591] ___sys_sendmsg+0x2b7/0x5d0 [ 2503.884461][T18591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2503.890730][T18591] ? __rcu_read_unlock+0x66/0x3c0 [ 2503.895941][T18591] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2503.901847][T18591] ? __fget+0xb8/0x1d0 [ 2503.905949][T18591] ? __fget_light+0xaf/0x190 [ 2503.910548][T18591] ? __fdget+0x2c/0x40 04:02:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x5}, 0x0) [ 2503.914624][T18591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2503.920918][T18591] __sys_sendmmsg+0x123/0x350 [ 2503.925615][T18591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2503.931947][T18591] ? fput_many+0xec/0x130 [ 2503.936283][T18591] ? fput+0x29/0x30 [ 2503.940120][T18591] ? ksys_write+0x145/0x1b0 [ 2503.944661][T18591] __x64_sys_sendmmsg+0x64/0x80 [ 2503.949531][T18591] do_syscall_64+0xcc/0x370 [ 2503.954113][T18591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2503.960023][T18591] RIP: 0033:0x45a639 [ 2503.963965][T18591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2503.983724][T18591] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2503.992151][T18591] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2504.000289][T18591] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 04:02:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x6, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:02:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) r2 = dup(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x6, 0x115122, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x7fff, 0x6}, 0x9000, 0xc41, 0x9, 0x0, 0xffff, 0x1000}, r1, 0xd, r2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:02:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x500, @mcast2={0x0}}, r1}}, 0x48) [ 2504.008366][T18591] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2504.016355][T18591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2504.024335][T18591] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2504.037029][T18939] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:02:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x0, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:02:59 executing program 5 (fault-call:9 fault-nth:68): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:02:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6}, 0x0) 04:02:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x600, @mcast2={0x0}}, r1}}, 0x48) 04:02:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0xd0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) prctl$PR_GET_FP_MODE(0x2e) [ 2504.676255][T19317] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2504.710626][T19331] FAULT_INJECTION: forcing a failure. [ 2504.710626][T19331] name failslab, interval 1, probability 0, space 0, times 0 04:03:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x700, @mcast2={0x0}}, r1}}, 0x48) [ 2504.723339][T19331] CPU: 1 PID: 19331 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2504.731234][T19331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2504.741298][T19331] Call Trace: [ 2504.744624][T19331] dump_stack+0x11d/0x181 [ 2504.748971][T19331] should_fail.cold+0xa/0x1a [ 2504.753742][T19331] __should_failslab+0xee/0x130 [ 2504.758608][T19331] should_failslab+0x9/0x14 [ 2504.763122][T19331] kmem_cache_alloc+0x29/0x5d0 [ 2504.767905][T19331] skb_clone+0xf9/0x290 [ 2504.772080][T19331] ip_mc_output+0x1fd/0x620 04:03:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x5, 0x800) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a394a19a48a736c851b8055d9b7f020305000a0002000a0ada1b40d805000500c50083b8", 0xfffffffffffffdc2}], 0x10000178, 0x0, 0xfffffffffffffe5c}, 0x80) [ 2504.776652][T19331] ? constant_test_bit+0x30/0x30 [ 2504.781893][T19331] ip_local_out+0x74/0x90 [ 2504.786271][T19331] __ip_queue_xmit+0x3a8/0xa40 [ 2504.791061][T19331] l2tp_xmit_skb+0x574/0x8e0 [ 2504.795767][T19331] ? skb_put+0xeb/0x110 [ 2504.799991][T19331] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2504.804853][T19331] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2504.810056][T19331] sock_sendmsg+0x9f/0xc0 [ 2504.814403][T19331] ___sys_sendmsg+0x2b7/0x5d0 [ 2504.819126][T19331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2504.825421][T19331] ? __rcu_read_unlock+0x66/0x3c0 [ 2504.830461][T19331] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2504.836373][T19331] ? __fget+0xb8/0x1d0 [ 2504.840619][T19331] ? __fget_light+0xaf/0x190 [ 2504.845251][T19331] ? __fdget+0x2c/0x40 [ 2504.849360][T19331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2504.855625][T19331] __sys_sendmmsg+0x123/0x350 [ 2504.860331][T19331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2504.866606][T19331] ? fput_many+0xec/0x130 [ 2504.870951][T19331] ? fput+0x29/0x30 [ 2504.874776][T19331] ? ksys_write+0x145/0x1b0 [ 2504.879327][T19331] __x64_sys_sendmmsg+0x64/0x80 [ 2504.884237][T19331] do_syscall_64+0xcc/0x370 [ 2504.888918][T19331] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2504.894809][T19331] RIP: 0033:0x45a639 [ 2504.898772][T19331] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2504.918481][T19331] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 04:03:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7}, 0x0) [ 2504.926990][T19331] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2504.934986][T19331] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2504.942965][T19331] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2504.951001][T19331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2504.958993][T19331] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x7, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) lseek(r2, 0xfffffffffffffff7, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffff60, &(0x7f0000000340)=[{&(0x7f0000000540)="1a7d455cab2c44fde9eea6de83912eefcbc696f0c13f0b9b3d75fed048e76aa6aa83c8afcc2e3096c712fdb6d998e741b5ea0e7b4e30781d86245494a13c18017579da96ae5e081a7fe3c56f44e9aaddb0bfc0b9ddf4c178b87f1e11fcda83c5301fadc6866a2e902f72986b4e95128815af3a01b07dea565ba710242afe0e922f84a52a5326bba4375b2426d757b7507e81892553c5cfeb59480bdbf203be2dedfdcd0bb802dc653c11e4790e3be433113ad67ffebf30227659b5da68689520771c114bf72c4d0a870fd90a15575fe4a790411d072af0690488113b80185fb880d6bf04478590c4a28b557b0a126d1ea826d5c5bd4fa5", 0x1007a}], 0x100000000000017f, 0x0, 0xddd8fd812fd5359d}, 0x80) 04:03:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x900, @mcast2={0x0}}, r1}}, 0x48) 04:03:00 executing program 5 (fault-call:9 fault-nth:69): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2505.065197][T19648] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2505.204391][T19771] FAULT_INJECTION: forcing a failure. [ 2505.204391][T19771] name failslab, interval 1, probability 0, space 0, times 0 [ 2505.217517][T19771] CPU: 1 PID: 19771 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2505.225751][T19771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2505.235804][T19771] Call Trace: [ 2505.239110][T19771] dump_stack+0x11d/0x181 [ 2505.243456][T19771] should_fail.cold+0xa/0x1a [ 2505.248092][T19771] __should_failslab+0xee/0x130 [ 2505.252974][T19771] should_failslab+0x9/0x14 [ 2505.257497][T19771] kmem_cache_alloc+0x29/0x5d0 [ 2505.262269][T19771] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2505.268235][T19771] dst_alloc+0xad/0x149 [ 2505.272409][T19771] rt_dst_clone+0x5c/0x3b0 [ 2505.276864][T19771] ip_mc_finish_output+0x68/0x340 [ 2505.281905][T19771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2505.287686][T19771] ? nf_hook_slow+0xb8/0x160 [ 2505.292385][T19771] ip_mc_output+0x32c/0x620 [ 2505.297032][T19771] ? ip_copy_addrs+0x50/0x50 [ 2505.301658][T19771] ip_local_out+0x74/0x90 [ 2505.306057][T19771] __ip_queue_xmit+0x3a8/0xa40 [ 2505.310867][T19771] l2tp_xmit_skb+0x574/0x8e0 [ 2505.315512][T19771] ? skb_put+0xeb/0x110 [ 2505.319680][T19771] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2505.324549][T19771] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2505.329753][T19771] sock_sendmsg+0x9f/0xc0 [ 2505.334070][T19771] ___sys_sendmsg+0x2b7/0x5d0 [ 2505.338737][T19771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2505.344968][T19771] ? __rcu_read_unlock+0x66/0x3c0 [ 2505.349981][T19771] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2505.355858][T19771] ? __fget+0xb8/0x1d0 [ 2505.359915][T19771] ? __fget_light+0xaf/0x190 [ 2505.364492][T19771] ? __fdget+0x2c/0x40 [ 2505.368613][T19771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2505.375711][T19771] __sys_sendmmsg+0x123/0x350 [ 2505.380563][T19771] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2505.386830][T19771] ? fput_many+0xec/0x130 [ 2505.391347][T19771] ? fput+0x29/0x30 [ 2505.395208][T19771] ? ksys_write+0x145/0x1b0 [ 2505.399722][T19771] __x64_sys_sendmmsg+0x64/0x80 [ 2505.404594][T19771] do_syscall_64+0xcc/0x370 [ 2505.409220][T19771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2505.415138][T19771] RIP: 0033:0x45a639 [ 2505.419097][T19771] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2505.438785][T19771] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2505.447239][T19771] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2505.455195][T19771] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2505.463167][T19771] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2505.471238][T19771] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2505.479330][T19771] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x0, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xa00, @mcast2={0x0}}, r1}}, 0x48) 04:03:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf}, 0x0) 04:03:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x3f00, @mcast2={0x0}}, r1}}, 0x48) [ 2505.727002][T20045] FAULT_INJECTION: forcing a failure. [ 2505.727002][T20045] name failslab, interval 1, probability 0, space 0, times 0 [ 2505.739810][T20045] CPU: 0 PID: 20045 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2505.747698][T20045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2505.757789][T20045] Call Trace: [ 2505.761167][T20045] dump_stack+0x11d/0x181 [ 2505.765840][T20045] should_fail.cold+0xa/0x1a [ 2505.770447][T20045] __should_failslab+0xee/0x130 [ 2505.775299][T20045] should_failslab+0x9/0x14 [ 2505.779809][T20045] kmem_cache_alloc+0x29/0x5d0 [ 2505.784582][T20045] ? __read_once_size.constprop.0+0x20/0x20 [ 2505.790572][T20045] skb_clone+0xf9/0x290 [ 2505.794744][T20045] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2505.801002][T20045] dev_queue_xmit_nit+0x24a/0x540 [ 2505.806126][T20045] ? constant_test_bit+0x30/0x30 [ 2505.811081][T20045] dev_hard_start_xmit+0x3f5/0x430 [ 2505.816309][T20045] __dev_queue_xmit+0x14ab/0x1b40 [ 2505.821359][T20045] ? ipt_do_table+0x8e9/0xe60 [ 2505.826048][T20045] ? __this_cpu_preempt_check+0x4a/0x170 [ 2505.831681][T20045] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2505.837596][T20045] ? __rcu_read_unlock+0x66/0x3c0 [ 2505.842644][T20045] ? nf_nat_packet+0xc2/0x110 [ 2505.847371][T20045] dev_queue_xmit+0x21/0x30 [ 2505.851888][T20045] ip_finish_output2+0x836/0xe40 [ 2505.856908][T20045] __ip_finish_output+0x23a/0x490 [ 2505.858198][T20089] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2505.862022][T20045] ? ipv4_confirm+0xdc/0x160 [ 2505.862125][T20045] ip_finish_output+0x41/0x160 [ 2505.882577][T20045] ip_mc_output+0x143/0x620 [ 2505.887100][T20045] ? __ip_finish_output+0x490/0x490 [ 2505.892319][T20045] ip_local_out+0x74/0x90 [ 2505.896661][T20045] __ip_queue_xmit+0x3a8/0xa40 [ 2505.901512][T20045] l2tp_xmit_skb+0x574/0x8e0 [ 2505.906123][T20045] ? skb_put+0xeb/0x110 [ 2505.910301][T20045] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2505.915210][T20045] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2505.920330][T20045] sock_sendmsg+0x9f/0xc0 [ 2505.924678][T20045] ___sys_sendmsg+0x2b7/0x5d0 [ 2505.929463][T20045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2505.935707][T20045] ? __rcu_read_unlock+0x66/0x3c0 [ 2505.940734][T20045] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2505.946816][T20045] ? __fget+0xb8/0x1d0 [ 2505.950893][T20045] ? __fget_light+0xaf/0x190 [ 2505.955504][T20045] ? __fdget+0x2c/0x40 [ 2505.959598][T20045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2505.965907][T20045] __sys_sendmmsg+0x123/0x350 [ 2505.970621][T20045] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2505.976877][T20045] ? fput_many+0xec/0x130 [ 2505.981218][T20045] ? fput+0x29/0x30 [ 2505.985107][T20045] ? ksys_write+0x145/0x1b0 [ 2505.989759][T20045] __x64_sys_sendmmsg+0x64/0x80 [ 2505.994715][T20045] do_syscall_64+0xcc/0x370 [ 2505.999242][T20045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2506.005207][T20045] RIP: 0033:0x45a639 [ 2506.009305][T20045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2506.019688][T20292] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2506.028920][T20045] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2506.028937][T20045] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2506.029012][T20045] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2506.029072][T20045] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2506.029092][T20045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 04:03:01 executing program 3: socket$kcm(0x10, 0x1, 0x0) 04:03:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x48}, 0x0) 04:03:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x8, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4c}, 0x0) 04:03:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4d}, 0x0) 04:03:01 executing program 3: socket$kcm(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:01 executing program 5 (fault-call:9 fault-nth:71): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x4000, @mcast2={0x0}}, r1}}, 0x48) 04:03:01 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x60}, 0x0) 04:03:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4ae8, 0x8000) [ 2506.668646][T20782] FAULT_INJECTION: forcing a failure. [ 2506.668646][T20782] name failslab, interval 1, probability 0, space 0, times 0 [ 2506.681315][T20782] CPU: 1 PID: 20782 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2506.689209][T20782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2506.699268][T20782] Call Trace: [ 2506.702583][T20782] dump_stack+0x11d/0x181 [ 2506.706933][T20782] should_fail.cold+0xa/0x1a [ 2506.711623][T20782] __should_failslab+0xee/0x130 04:03:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x68}, 0x0) 04:03:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x7800, @mcast2={0x0}}, r1}}, 0x48) 04:03:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{}, {0x20, '\xd0nodev.mime_type^*'}, {0x20, ']posix_acl_access'}, {0x20, 'trusted!'}, {}, {}, {0x20, 'wlan1\xe7!@,'}, {0x20, 'em1\'#self'}, {0x20, '{!@trusted'}], 0xa, "a65d3585c5938bf6611675af4a3e7e1a4e76b9a0c69a0961a0f2e094c05eed22a4bc737cf57ce146845499f772b3a91549bcffd11ff313c9ee286552ba2e0452f00944e3f07fe983774199a445ace69350f4b591640938af168591c4eca40c8a22f932c111c945ac236820e8bf7fc4b4e2"}, 0xcc) [ 2506.716524][T20782] should_failslab+0x9/0x14 [ 2506.721049][T20782] kmem_cache_alloc+0x29/0x5d0 [ 2506.725847][T20782] skb_clone+0xf9/0x290 [ 2506.730096][T20782] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2506.736447][T20782] dev_queue_xmit_nit+0x24a/0x540 [ 2506.741530][T20782] ? constant_test_bit+0x30/0x30 [ 2506.746475][T20782] dev_hard_start_xmit+0x3f5/0x430 [ 2506.751728][T20782] __dev_queue_xmit+0x14ab/0x1b40 [ 2506.756836][T20782] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2506.763096][T20782] ? nf_ct_bridge_post+0x22f/0xb50 [ 2506.768226][T20782] dev_queue_xmit+0x21/0x30 [ 2506.772762][T20782] br_dev_queue_push_xmit+0x2c1/0x330 [ 2506.778162][T20782] ? nf_hook_slow+0xb8/0x160 [ 2506.782767][T20782] br_forward_finish+0x177/0x190 [ 2506.787731][T20782] ? br_fdb_add.cold+0x88/0x88 [ 2506.792546][T20782] __br_forward+0x331/0x4a0 [ 2506.797171][T20782] ? __read_once_size.constprop.0+0x20/0x20 [ 2506.803162][T20782] br_flood+0x31a/0x330 [ 2506.807336][T20782] br_dev_xmit+0x680/0x920 [ 2506.811782][T20782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2506.818128][T20782] dev_hard_start_xmit+0xef/0x430 [ 2506.823172][T20782] __dev_queue_xmit+0x14ab/0x1b40 [ 2506.828312][T20782] ? ipt_do_table+0x8e9/0xe60 [ 2506.833029][T20782] ? __this_cpu_preempt_check+0x4a/0x170 [ 2506.838671][T20782] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2506.844647][T20782] ? __rcu_read_unlock+0x66/0x3c0 [ 2506.849684][T20782] ? nf_nat_packet+0xc2/0x110 [ 2506.854371][T20782] dev_queue_xmit+0x21/0x30 [ 2506.858995][T20782] ip_finish_output2+0x836/0xe40 [ 2506.863978][T20782] __ip_finish_output+0x23a/0x490 [ 2506.869008][T20782] ? ipv4_confirm+0xdc/0x160 [ 2506.873612][T20782] ip_finish_output+0x41/0x160 [ 2506.878827][T20782] ip_mc_output+0x143/0x620 [ 2506.883336][T20782] ? __ip_finish_output+0x490/0x490 [ 2506.888549][T20782] ip_local_out+0x74/0x90 [ 2506.892935][T20782] __ip_queue_xmit+0x3a8/0xa40 [ 2506.897735][T20782] l2tp_xmit_skb+0x574/0x8e0 [ 2506.902337][T20782] ? skb_put+0xeb/0x110 [ 2506.906595][T20782] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2506.911527][T20782] ? pppol2tp_seq_show+0x6b0/0x6b0 04:03:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x9, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:02 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x600000, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000380)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6c}, 0x0) [ 2506.966884][T20782] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2506.973221][T20782] ? fput_many+0xec/0x130 [ 2506.977672][T20782] ? fput+0x29/0x30 [ 2506.981496][T20782] ? ksys_write+0x145/0x1b0 [ 2506.986022][T20782] __x64_sys_sendmmsg+0x64/0x80 [ 2506.991083][T20782] do_syscall_64+0xcc/0x370 [ 2506.995607][T20782] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2507.001828][T20782] RIP: 0033:0x45a639 [ 2507.005801][T20782] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2507.025487][T20782] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2507.034124][T20782] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2507.042117][T20782] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2507.050215][T20782] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2507.058204][T20782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2507.066291][T20782] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:02 executing program 5 (fault-call:9 fault-nth:72): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2507.232662][T21341] FAULT_INJECTION: forcing a failure. [ 2507.232662][T21341] name failslab, interval 1, probability 0, space 0, times 0 [ 2507.245374][T21341] CPU: 1 PID: 21341 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2507.253264][T21341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2507.263376][T21341] Call Trace: [ 2507.266675][T21341] dump_stack+0x11d/0x181 [ 2507.270997][T21341] should_fail.cold+0xa/0x1a [ 2507.275576][T21341] __should_failslab+0xee/0x130 [ 2507.280544][T21341] should_failslab+0x9/0x14 [ 2507.285044][T21341] kmem_cache_alloc_node+0x39/0x660 [ 2507.290408][T21341] __alloc_skb+0x8e/0x360 [ 2507.294778][T21341] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2507.300726][T21341] sock_wmalloc+0xb8/0x110 [ 2507.305227][T21341] pppol2tp_sendmsg+0x15a/0x3c0 [ 2507.310234][T21341] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2507.315334][T21341] sock_sendmsg+0x9f/0xc0 [ 2507.319769][T21341] ___sys_sendmsg+0x2b7/0x5d0 [ 2507.324449][T21341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2507.330690][T21341] ? __rcu_read_unlock+0x66/0x3c0 [ 2507.335728][T21341] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2507.341619][T21341] ? __fget+0xb8/0x1d0 [ 2507.345689][T21341] ? __fget_light+0xaf/0x190 [ 2507.350308][T21341] ? __fdget+0x2c/0x40 [ 2507.355424][T21341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2507.361687][T21341] __sys_sendmmsg+0x123/0x350 [ 2507.366378][T21341] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2507.372663][T21341] ? fput_many+0xec/0x130 [ 2507.376990][T21341] ? fput+0x29/0x30 [ 2507.380841][T21341] ? ksys_write+0x145/0x1b0 [ 2507.385398][T21341] __x64_sys_sendmmsg+0x64/0x80 [ 2507.390455][T21341] do_syscall_64+0xcc/0x370 [ 2507.395122][T21341] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2507.401076][T21341] RIP: 0033:0x45a639 [ 2507.404974][T21341] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2507.424645][T21341] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2507.433258][T21341] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2507.441257][T21341] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2507.449253][T21341] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2507.457249][T21341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2507.465344][T21341] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x80fe, @mcast2={0x0}}, r1}}, 0x48) 04:03:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x74}, 0x0) 04:03:02 executing program 5 (fault-call:9 fault-nth:73): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2507.641256][ C0] net_ratelimit: 36 callbacks suppressed [ 2507.641265][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2507.652905][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xc0fe, @mcast2={0x0}}, r1}}, 0x48) 04:03:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7a}, 0x0) [ 2507.689431][T21457] FAULT_INJECTION: forcing a failure. [ 2507.689431][T21457] name failslab, interval 1, probability 0, space 0, times 0 [ 2507.721316][T21457] CPU: 1 PID: 21457 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2507.729377][T21457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2507.739448][T21457] Call Trace: [ 2507.742887][T21457] dump_stack+0x11d/0x181 [ 2507.747294][T21457] should_fail.cold+0xa/0x1a [ 2507.752067][T21457] __should_failslab+0xee/0x130 [ 2507.756996][T21457] should_failslab+0x9/0x14 [ 2507.761563][T21457] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2507.767312][T21457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2507.773634][T21457] ? memcg_kmem_put_cache+0x91/0xe0 [ 2507.778919][T21457] __kmalloc_node_track_caller+0x38/0x50 [ 2507.784613][T21457] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2507.790005][T21457] __alloc_skb+0xc2/0x360 [ 2507.794385][T21457] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2507.800290][T21457] sock_wmalloc+0xb8/0x110 [ 2507.804789][T21457] pppol2tp_sendmsg+0x15a/0x3c0 [ 2507.809682][T21457] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2507.814921][T21457] sock_sendmsg+0x9f/0xc0 [ 2507.819273][T21457] ___sys_sendmsg+0x2b7/0x5d0 [ 2507.824032][T21457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2507.830386][T21457] ? __rcu_read_unlock+0x66/0x3c0 04:03:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x300}, 0x0) [ 2507.835425][T21457] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2507.841598][T21457] ? __fget+0xb8/0x1d0 [ 2507.845681][T21457] ? __fget_light+0xaf/0x190 [ 2507.850401][T21457] ? __fdget+0x2c/0x40 [ 2507.854488][T21457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2507.860776][T21457] __sys_sendmmsg+0x123/0x350 [ 2507.865562][T21457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2507.871817][T21457] ? fput_many+0xec/0x130 [ 2507.876163][T21457] ? fput+0x29/0x30 [ 2507.880082][T21457] ? ksys_write+0x145/0x1b0 [ 2507.884797][T21457] __x64_sys_sendmmsg+0x64/0x80 [ 2507.889674][T21457] do_syscall_64+0xcc/0x370 [ 2507.894202][T21457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2507.900280][T21457] RIP: 0033:0x45a639 [ 2507.904190][T21457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2507.923802][T21457] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2507.932289][T21457] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:03:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x500}, 0x0) [ 2507.940442][T21457] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2507.948428][T21457] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2507.956512][T21457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2507.964514][T21457] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xb, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x303000, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000000c0)=0x1) 04:03:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfc00, @mcast2={0x0}}, r1}}, 0x48) 04:03:03 executing program 5 (fault-call:9 fault-nth:74): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2508.131233][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2508.137149][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2508.179758][T22094] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2508.192846][T22094] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2508.211920][T22095] FAULT_INJECTION: forcing a failure. [ 2508.211920][T22095] name failslab, interval 1, probability 0, space 0, times 0 [ 2508.224590][T22095] CPU: 1 PID: 22095 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2508.232483][T22095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2508.242541][T22095] Call Trace: [ 2508.246061][T22095] dump_stack+0x11d/0x181 [ 2508.250421][T22095] should_fail.cold+0xa/0x1a [ 2508.255113][T22095] __should_failslab+0xee/0x130 [ 2508.259988][T22095] should_failslab+0x9/0x14 [ 2508.262514][T22094] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2508.264635][T22095] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2508.264754][T22095] ? should_fail+0xd4/0x45d [ 2508.277753][T22094] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2508.283626][T22095] __kmalloc_node_track_caller+0x38/0x50 [ 2508.283668][T22095] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2508.283688][T22095] pskb_expand_head+0x102/0x750 [ 2508.283707][T22095] ? iov_iter_advance+0x211/0x9d0 [ 2508.283764][T22095] l2tp_xmit_skb+0x754/0x8e0 [ 2508.325574][T22095] ? skb_put+0xeb/0x110 [ 2508.329751][T22095] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2508.334608][T22095] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2508.339776][T22095] sock_sendmsg+0x9f/0xc0 [ 2508.344189][T22095] ___sys_sendmsg+0x2b7/0x5d0 [ 2508.348912][T22095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2508.355298][T22095] ? __rcu_read_unlock+0x66/0x3c0 [ 2508.360328][T22095] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2508.366215][T22095] ? __fget+0xb8/0x1d0 [ 2508.370300][T22095] ? __fget_light+0xaf/0x190 [ 2508.374874][T22095] ? __fdget+0x2c/0x40 [ 2508.379161][T22095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2508.385437][T22095] __sys_sendmmsg+0x123/0x350 [ 2508.390162][T22095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2508.396471][T22095] ? fput_many+0xec/0x130 [ 2508.401047][T22095] ? fput+0x29/0x30 [ 2508.404848][T22095] ? ksys_write+0x145/0x1b0 [ 2508.409843][T22095] __x64_sys_sendmmsg+0x64/0x80 [ 2508.415024][T22095] do_syscall_64+0xcc/0x370 [ 2508.419578][T22095] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2508.425514][T22095] RIP: 0033:0x45a639 [ 2508.429458][T22095] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2508.449577][T22095] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2508.457996][T22095] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2508.465982][T22095] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2508.473939][T22095] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2508.482200][T22095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2508.490195][T22095] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2508.521280][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2508.527183][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x600}, 0x0) 04:03:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfe80, @mcast2={0x0}}, r1}}, 0x48) 04:03:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7de, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) 04:03:03 executing program 5 (fault-call:9 fault-nth:75): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2508.701394][T22211] validate_nla: 7 callbacks suppressed [ 2508.701405][T22211] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2508.726515][T22215] FAULT_INJECTION: forcing a failure. [ 2508.726515][T22215] name failslab, interval 1, probability 0, space 0, times 0 [ 2508.739293][T22215] CPU: 0 PID: 22215 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2508.747188][T22215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2508.757253][T22215] Call Trace: [ 2508.760586][T22215] dump_stack+0x11d/0x181 [ 2508.764933][T22215] should_fail.cold+0xa/0x1a [ 2508.769699][T22215] __should_failslab+0xee/0x130 [ 2508.774568][T22215] should_failslab+0x9/0x14 [ 2508.779129][T22215] kmem_cache_alloc+0x29/0x5d0 [ 2508.785084][T22215] skb_clone+0xf9/0x290 [ 2508.789552][T22215] ip_mc_output+0x1fd/0x620 [ 2508.794127][T22215] ? constant_test_bit+0x30/0x30 [ 2508.799066][T22215] ip_local_out+0x74/0x90 [ 2508.803447][T22215] __ip_queue_xmit+0x3a8/0xa40 [ 2508.808266][T22215] l2tp_xmit_skb+0x574/0x8e0 [ 2508.812968][T22215] ? skb_put+0xeb/0x110 [ 2508.817123][T22215] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2508.821980][T22215] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2508.827112][T22215] sock_sendmsg+0x9f/0xc0 [ 2508.831459][T22215] ___sys_sendmsg+0x2b7/0x5d0 [ 2508.836209][T22215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2508.842461][T22215] ? __rcu_read_unlock+0x66/0x3c0 [ 2508.847498][T22215] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2508.853431][T22215] ? __fget+0xb8/0x1d0 [ 2508.857541][T22215] ? __fget_light+0xaf/0x190 [ 2508.862135][T22215] ? __fdget+0x2c/0x40 [ 2508.866200][T22215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2508.872512][T22215] __sys_sendmmsg+0x123/0x350 [ 2508.877185][T22215] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2508.883435][T22215] ? fput_many+0xec/0x130 [ 2508.887769][T22215] ? fput+0x29/0x30 [ 2508.891590][T22215] ? ksys_write+0x145/0x1b0 [ 2508.896187][T22215] __x64_sys_sendmmsg+0x64/0x80 [ 2508.901147][T22215] do_syscall_64+0xcc/0x370 [ 2508.905720][T22215] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2508.911668][T22215] RIP: 0033:0x45a639 [ 2508.915550][T22215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2508.935150][T22215] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2508.943567][T22215] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:03:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfec0, @mcast2={0x0}}, r1}}, 0x48) 04:03:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x10, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340)={0x43, 0x7, 0x4, 0x6a1, 0xd6bb, 0x3, 0x8, 0x1000}, &(0x7f0000000380)=0x20) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x700}, 0x0) 04:03:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xff00, @mcast2={0x0}}, r1}}, 0x48) [ 2509.154314][T22632] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:04 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xbf8}, 0x0) [ 2509.267475][T22742] FAULT_INJECTION: forcing a failure. [ 2509.267475][T22742] name failslab, interval 1, probability 0, space 0, times 0 [ 2509.280215][T22742] CPU: 1 PID: 22742 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2509.288120][T22742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2509.298209][T22742] Call Trace: [ 2509.300824][T22744] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2509.301612][T22742] dump_stack+0x11d/0x181 [ 2509.301635][T22742] should_fail.cold+0xa/0x1a [ 2509.301658][T22742] __should_failslab+0xee/0x130 [ 2509.301682][T22742] should_failslab+0x9/0x14 [ 2509.301707][T22742] kmem_cache_alloc+0x29/0x5d0 [ 2509.332977][T22742] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2509.338909][T22742] dst_alloc+0xad/0x149 [ 2509.343104][T22742] rt_dst_clone+0x5c/0x3b0 [ 2509.347530][T22742] ip_mc_finish_output+0x68/0x340 [ 2509.355084][T22742] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2509.360880][T22742] ? nf_hook_slow+0xb8/0x160 [ 2509.365486][T22742] ip_mc_output+0x32c/0x620 [ 2509.370011][T22742] ? ip_copy_addrs+0x50/0x50 [ 2509.374620][T22742] ip_local_out+0x74/0x90 [ 2509.379044][T22742] __ip_queue_xmit+0x3a8/0xa40 [ 2509.383847][T22742] l2tp_xmit_skb+0x574/0x8e0 [ 2509.388643][T22742] ? skb_put+0xeb/0x110 [ 2509.392817][T22742] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2509.397697][T22742] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2509.402829][T22742] sock_sendmsg+0x9f/0xc0 [ 2509.407225][T22742] ___sys_sendmsg+0x2b7/0x5d0 [ 2509.412078][T22742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2509.418349][T22742] ? __rcu_read_unlock+0x66/0x3c0 [ 2509.423396][T22742] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2509.429307][T22742] ? __fget+0xb8/0x1d0 [ 2509.433439][T22742] ? __fget_light+0xaf/0x190 [ 2509.438115][T22742] ? __fdget+0x2c/0x40 [ 2509.442202][T22742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2509.448526][T22742] __sys_sendmmsg+0x123/0x350 [ 2509.453413][T22742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2509.459663][T22742] ? fput_many+0xec/0x130 [ 2509.464005][T22742] ? fput+0x29/0x30 [ 2509.467906][T22742] ? ksys_write+0x145/0x1b0 [ 2509.472434][T22742] __x64_sys_sendmmsg+0x64/0x80 [ 2509.477381][T22742] do_syscall_64+0xcc/0x370 [ 2509.481910][T22742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2509.487816][T22742] RIP: 0033:0x45a639 [ 2509.491729][T22742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2509.511336][T22742] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2509.519746][T22742] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2509.527760][T22742] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2509.535728][T22742] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2509.543855][T22742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2509.551809][T22742] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:04 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="ec14477787fa3db02796dc3fd1413887a89ffe02b9a05f532eaff7e5c30c1aaed00b299fcf2fd21e3f19409ded4bc437884ba44d2bf8bd7e6c63d90984c83d37802a8813041ecf2eea4f071e19f980205b31ccc264fabdab489246104c700916272faec3eef1b3a842a22168ce79b35fd63ab7c5a13004b7828dd770564eceb439e7b686f6b8d3f76427bf41798da17e9efe288275955e7b5a8425a8b5b619992c0abb5e0a011398741d185d65b1", 0xae}, {&(0x7f0000000180)="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", 0xfc}, {&(0x7f0000000040)="74a0732842fc55b2486965e0fce804cf4128d699e18272b3014a74d323f1e93a02a7cb65b65db70a8781a0c82ad4e365dfeeda564b63b4c496e076", 0x3b}], 0x3}, 0x0) r0 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmdt(r0) shmdt(r0) 04:03:04 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xbfb}, 0x0) 04:03:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x20000, @mcast2={0x0}}, r1}}, 0x48) 04:03:04 executing program 5 (fault-call:9 fault-nth:77): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2509.707853][T22850] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2509.800226][T23059] FAULT_INJECTION: forcing a failure. [ 2509.800226][T23059] name failslab, interval 1, probability 0, space 0, times 0 [ 2509.812917][T23059] CPU: 1 PID: 23059 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2509.820805][T23059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2509.830945][T23059] Call Trace: [ 2509.834252][T23059] dump_stack+0x11d/0x181 [ 2509.838627][T23059] should_fail.cold+0xa/0x1a [ 2509.843234][T23059] __should_failslab+0xee/0x130 [ 2509.848158][T23059] should_failslab+0x9/0x14 [ 2509.852666][T23059] kmem_cache_alloc+0x29/0x5d0 [ 2509.857617][T23059] ? __read_once_size.constprop.0+0x20/0x20 [ 2509.863591][T23059] skb_clone+0xf9/0x290 [ 2509.867764][T23059] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2509.874035][T23059] dev_queue_xmit_nit+0x24a/0x540 [ 2509.879085][T23059] ? constant_test_bit+0x30/0x30 [ 2509.884101][T23059] dev_hard_start_xmit+0x3f5/0x430 [ 2509.889247][T23059] __dev_queue_xmit+0x14ab/0x1b40 [ 2509.894287][T23059] ? ipt_do_table+0x8e9/0xe60 04:03:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x1e}], 0x1, 0x0, 0xfd4e}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x100000, @mcast2={0x0}}, r1}}, 0x48) 04:03:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xbfd}, 0x0) [ 2509.948770][T23059] ? __ip_finish_output+0x490/0x490 [ 2509.954022][T23059] ip_local_out+0x74/0x90 [ 2509.958358][T23059] __ip_queue_xmit+0x3a8/0xa40 [ 2509.963116][T23059] ? __const_udelay+0x36/0x40 [ 2509.967849][T23059] l2tp_xmit_skb+0x574/0x8e0 [ 2509.972592][T23059] ? skb_put+0xeb/0x110 [ 2509.976771][T23059] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2509.981629][T23059] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2509.986819][T23059] sock_sendmsg+0x9f/0xc0 [ 2509.991161][T23059] ___sys_sendmsg+0x2b7/0x5d0 04:03:05 executing program 3: lsetxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x80}, 0x28, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x20}], 0x1}, 0x0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="4fd03cc8839fbc83b64d07db6639d2d69e0b91a7d560a61fd9291c", 0x1b, 0xfffffffffffffffc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2510.095462][T23059] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2510.103884][T23059] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2510.111871][T23059] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2510.117871][T23325] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2510.119886][T23059] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2510.119896][T23059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 04:03:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x1, 0x8}, &(0x7f00000000c0)=0xc) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000480)={r4, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000100)={r2, 0xc5, 0x40004000, 0x5, 0x5e9, 0x1ff, 0x200, 0x7f, {r4, @in={{0x2, 0x4e21, @remote}}, 0x8, 0xfff, 0x1, 0xff, 0x3}}, &(0x7f00000001c0)=0xb0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) [ 2510.119959][T23059] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:05 executing program 5 (fault-call:9 fault-nth:78): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2510.321524][T23483] FAULT_INJECTION: forcing a failure. [ 2510.321524][T23483] name failslab, interval 1, probability 0, space 0, times 0 [ 2510.334453][T23483] CPU: 1 PID: 23483 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2510.342440][T23483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2510.352654][T23483] Call Trace: [ 2510.356047][T23483] dump_stack+0x11d/0x181 [ 2510.360408][T23483] should_fail.cold+0xa/0x1a [ 2510.365144][T23483] __should_failslab+0xee/0x130 [ 2510.370091][T23483] should_failslab+0x9/0x14 [ 2510.374605][T23483] kmem_cache_alloc+0x29/0x5d0 [ 2510.379398][T23483] skb_clone+0xf9/0x290 [ 2510.383649][T23483] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2510.389901][T23483] dev_queue_xmit_nit+0x24a/0x540 [ 2510.394936][T23483] ? constant_test_bit+0x30/0x30 [ 2510.399873][T23483] dev_hard_start_xmit+0x3f5/0x430 [ 2510.405018][T23483] __dev_queue_xmit+0x14ab/0x1b40 [ 2510.410185][T23483] ? debug_smp_processor_id+0x4c/0x172 [ 2510.415659][T23483] dev_queue_xmit+0x21/0x30 [ 2510.420192][T23483] br_dev_queue_push_xmit+0x2c1/0x330 [ 2510.425590][T23483] ? nf_hook_slow+0xb8/0x160 [ 2510.430206][T23483] br_forward_finish+0x177/0x190 [ 2510.435135][T23483] ? br_fdb_add.cold+0x88/0x88 [ 2510.439975][T23483] __br_forward+0x331/0x4a0 [ 2510.444474][T23483] ? __read_once_size.constprop.0+0x20/0x20 [ 2510.450462][T23483] br_flood+0x31a/0x330 [ 2510.454858][T23483] br_dev_xmit+0x680/0x920 [ 2510.459509][T23483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2510.465809][T23483] dev_hard_start_xmit+0xef/0x430 [ 2510.470858][T23483] __dev_queue_xmit+0x14ab/0x1b40 [ 2510.475883][T23483] ? ipt_do_table+0x8e9/0xe60 [ 2510.480548][T23483] ? __this_cpu_preempt_check+0x4a/0x170 [ 2510.486172][T23483] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2510.492077][T23483] ? __rcu_read_unlock+0x66/0x3c0 [ 2510.497098][T23483] ? nf_nat_packet+0xc2/0x110 [ 2510.501781][T23483] dev_queue_xmit+0x21/0x30 [ 2510.506380][T23483] ip_finish_output2+0x836/0xe40 [ 2510.511326][T23483] __ip_finish_output+0x23a/0x490 [ 2510.516339][T23483] ? ipv4_confirm+0xdc/0x160 [ 2510.520951][T23483] ip_finish_output+0x41/0x160 [ 2510.525792][T23483] ip_mc_output+0x143/0x620 [ 2510.530460][T23483] ? __ip_finish_output+0x490/0x490 [ 2510.535770][T23483] ip_local_out+0x74/0x90 [ 2510.540096][T23483] __ip_queue_xmit+0x3a8/0xa40 [ 2510.544861][T23483] l2tp_xmit_skb+0x574/0x8e0 [ 2510.549455][T23483] ? skb_put+0xeb/0x110 [ 2510.553618][T23483] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2510.558507][T23483] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2510.563641][T23483] sock_sendmsg+0x9f/0xc0 [ 2510.567988][T23483] ___sys_sendmsg+0x2b7/0x5d0 [ 2510.572671][T23483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2510.578975][T23483] ? __rcu_read_unlock+0x66/0x3c0 [ 2510.584087][T23483] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2510.589982][T23483] ? __fget+0xb8/0x1d0 [ 2510.594073][T23483] ? __fget_light+0xaf/0x190 [ 2510.598664][T23483] ? __fdget+0x2c/0x40 [ 2510.602730][T23483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2510.609024][T23483] __sys_sendmmsg+0x123/0x350 [ 2510.613727][T23483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2510.619972][T23483] ? fput_many+0xec/0x130 [ 2510.624315][T23483] ? fput+0x29/0x30 [ 2510.628173][T23483] ? ksys_write+0x145/0x1b0 [ 2510.632687][T23483] __x64_sys_sendmmsg+0x64/0x80 [ 2510.637600][T23483] do_syscall_64+0xcc/0x370 [ 2510.642144][T23483] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2510.648098][T23483] RIP: 0033:0x45a639 [ 2510.651994][T23483] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2510.671599][T23483] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2510.680244][T23483] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2510.688209][T23483] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2510.696170][T23483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2510.704182][T23483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2510.712166][T23483] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x1000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xbff}, 0x0) 04:03:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1, 0x0, 0xffffffffffffffb0}, 0x0) 04:03:06 executing program 5 (fault-call:9 fault-nth:79): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2510.897240][T23637] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2510.906722][T23693] FAULT_INJECTION: forcing a failure. [ 2510.906722][T23693] name failslab, interval 1, probability 0, space 0, times 0 04:03:06 executing program 3: r0 = socket$kcm(0x10, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, @in6={{0xa, 0x4e22, 0x3ff, @mcast1, 0x32}}, 0x80, 0xff98, 0x1ff, 0x3, 0x2}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r3, 0x81, 0xec56}, &(0x7f0000000200)=0x8) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x8000) uname(&(0x7f0000000000)=""/179) [ 2510.972041][T23693] CPU: 0 PID: 23693 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2510.979995][T23693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2510.991890][T23693] Call Trace: [ 2510.995287][T23693] dump_stack+0x11d/0x181 [ 2510.999640][T23693] should_fail.cold+0xa/0x1a [ 2511.004316][T23693] __should_failslab+0xee/0x130 [ 2511.009195][T23693] should_failslab+0x9/0x14 [ 2511.013715][T23693] kmem_cache_alloc_node+0x39/0x660 [ 2511.018942][T23693] __alloc_skb+0x8e/0x360 [ 2511.023287][T23693] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2511.029209][T23693] sock_wmalloc+0xb8/0x110 [ 2511.033750][T23693] pppol2tp_sendmsg+0x15a/0x3c0 [ 2511.038639][T23693] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2511.043760][T23693] sock_sendmsg+0x9f/0xc0 [ 2511.048103][T23693] ___sys_sendmsg+0x2b7/0x5d0 [ 2511.052831][T23693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2511.059111][T23693] ? __rcu_read_unlock+0x66/0x3c0 [ 2511.064156][T23693] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2511.070131][T23693] ? __fget+0xb8/0x1d0 [ 2511.074217][T23693] ? __fget_light+0xaf/0x190 [ 2511.078847][T23693] ? __fdget+0x2c/0x40 [ 2511.082991][T23693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2511.089257][T23693] __sys_sendmmsg+0x123/0x350 [ 2511.094029][T23693] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2511.100349][T23693] ? fput_many+0xec/0x130 [ 2511.104718][T23693] ? fput+0x29/0x30 [ 2511.108544][T23693] ? ksys_write+0x145/0x1b0 [ 2511.113051][T23693] __x64_sys_sendmmsg+0x64/0x80 [ 2511.117896][T23693] do_syscall_64+0xcc/0x370 [ 2511.122504][T23693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2511.128480][T23693] RIP: 0033:0x45a639 [ 2511.132366][T23693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2511.152018][T23693] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2511.160626][T23693] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:03:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0x14, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x2000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xd39}, 0x0) 04:03:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)="61e1eb0ea998ad04def5c39c5c95d8839e5036234d1fbf6d4d7f018f36419250d49269286b3185b52edcf6a99c546269c0acb90125219a19397d19ffd68b471d50511cd7e4cf0ddd60665017b203984e4a50a2879bf0d94b0033c9384d93aa2f2792bf4f52657f684cf9713f0afb7bb3a86d97541d5d0441d609e29b805d9a28f592678519457537b07edfac0798fa05a6c9d49857f4716cc55636807d9c0994d0e47cfae3b429a0f95019ce217d0e219173f6b3ea57d7de7e3d09119d01cec2729b0ec6a5", 0xc5}, {&(0x7f00000001c0)="c66ede63c788969705bca919b4e1d7f15077d0a40fe5ef4949e36efcc2cf12ef64b9c2c6c683bf6c3be550c526c991678f33eb0e98eea47c5686f5f4b90672f1504622e42c23e9038547739e8addc8c0801128264dadf5d4da12", 0x2b}, {&(0x7f0000000000)="c40db1af55eeefd862358622d9c4315c76f7459438044902", 0x18}, {&(0x7f0000000680)="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", 0x185}, {&(0x7f0000000400)="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", 0xfd}, {&(0x7f0000000340)="1e875c67b288715c2c896334eaf099430deaa2fedbadd60e079459d29bf4fa4e7c1a41213295a192541f61fa", 0xffffffffffffff7d}, {&(0x7f0000000500)="7c537c763809f950584d5aec86f75948d674632fd75165dba6376032952d2d996f4ec91cba8836ee27146be00cf7d6f177781349dc4cd0c80d8d1f3428039a9ec1c0cb5f5e4c29e9bc29f3e9ab470c9ea598fa26c963934b4ab756645229f48ba28315109abf1540a0291b46ad1572f9df7b8c7522586e651c642600d529247f9ba2230064df180d352a2b4ce7be8ab17a9e87b63d73669e82c86cfae159283afe06c66877376a236a9bbc73d1d82c6005ff1bba6ac9f26d09aeb5ffe64c73ffadf60b732be42e", 0xd19108019410655c}], 0x7}, 0x4000814) [ 2511.169024][T23693] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2511.176987][T23693] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2511.185041][T23693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2511.193033][T23693] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:06 executing program 5 (fault-call:9 fault-nth:80): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2511.234545][T23910] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x3000000, @mcast2={0x0}}, r1}}, 0x48) [ 2511.427325][T24030] FAULT_INJECTION: forcing a failure. [ 2511.427325][T24030] name failslab, interval 1, probability 0, space 0, times 0 [ 2511.440046][T24030] CPU: 0 PID: 24030 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2511.447958][T24030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2511.458024][T24030] Call Trace: [ 2511.461347][T24030] dump_stack+0x11d/0x181 [ 2511.465751][T24030] should_fail.cold+0xa/0x1a [ 2511.470351][T24030] __should_failslab+0xee/0x130 [ 2511.475194][T24030] should_failslab+0x9/0x14 [ 2511.479777][T24030] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2511.485523][T24030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2511.491780][T24030] ? memcg_kmem_put_cache+0x91/0xe0 [ 2511.496989][T24030] __kmalloc_node_track_caller+0x38/0x50 [ 2511.502622][T24030] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2511.507989][T24030] __alloc_skb+0xc2/0x360 [ 2511.512374][T24030] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2511.518349][T24030] sock_wmalloc+0xb8/0x110 [ 2511.522773][T24030] pppol2tp_sendmsg+0x15a/0x3c0 [ 2511.527668][T24030] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2511.532847][T24030] sock_sendmsg+0x9f/0xc0 [ 2511.537176][T24030] ___sys_sendmsg+0x2b7/0x5d0 [ 2511.541899][T24030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2511.548194][T24030] ? __rcu_read_unlock+0x66/0x3c0 [ 2511.553206][T24030] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2511.559105][T24030] ? __fget+0xb8/0x1d0 [ 2511.563280][T24030] ? __fget_light+0xaf/0x190 [ 2511.568042][T24030] ? __fdget+0x2c/0x40 [ 2511.572108][T24030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2511.578366][T24030] __sys_sendmmsg+0x123/0x350 [ 2511.583103][T24030] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2511.589345][T24030] ? fput_many+0xec/0x130 [ 2511.593661][T24030] ? fput+0x29/0x30 [ 2511.597496][T24030] ? ksys_write+0x145/0x1b0 [ 2511.602064][T24030] __x64_sys_sendmmsg+0x64/0x80 [ 2511.606917][T24030] do_syscall_64+0xcc/0x370 [ 2511.611422][T24030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2511.617369][T24030] RIP: 0033:0x45a639 [ 2511.621298][T24030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2511.640893][T24030] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2511.649314][T24030] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2511.657288][T24030] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2511.665248][T24030] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2511.673266][T24030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2511.681389][T24030] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf00}, 0x0) 04:03:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/llc\x00') lseek(r0, 0xfffffffffffffff7, 0x3) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(0xffffffffffffffff, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x4000000, @mcast2={0x0}}, r1}}, 0x48) [ 2511.919750][T24041] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2512.007500][T24232] FAULT_INJECTION: forcing a failure. [ 2512.007500][T24232] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.020213][T24232] CPU: 1 PID: 24232 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2512.028159][T24232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2512.038218][T24232] Call Trace: [ 2512.041590][T24232] dump_stack+0x11d/0x181 [ 2512.045934][T24232] should_fail.cold+0xa/0x1a [ 2512.050559][T24232] __should_failslab+0xee/0x130 [ 2512.055489][T24232] should_failslab+0x9/0x14 [ 2512.060032][T24232] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2512.065866][T24232] ? should_fail+0xd4/0x45d [ 2512.070388][T24232] __kmalloc_node_track_caller+0x38/0x50 [ 2512.076058][T24232] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2512.081486][T24232] pskb_expand_head+0x102/0x750 [ 2512.086337][T24232] ? __const_udelay+0x36/0x40 [ 2512.091172][T24232] l2tp_xmit_skb+0x754/0x8e0 [ 2512.095926][T24232] ? skb_put+0xeb/0x110 [ 2512.100100][T24232] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2512.105149][T24232] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2512.110294][T24232] sock_sendmsg+0x9f/0xc0 [ 2512.114709][T24232] ___sys_sendmsg+0x2b7/0x5d0 [ 2512.119487][T24232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.125868][T24232] ? __rcu_read_unlock+0x66/0x3c0 [ 2512.131082][T24232] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2512.137142][T24232] ? __fget+0xb8/0x1d0 [ 2512.141297][T24232] ? __fget_light+0xaf/0x190 [ 2512.146008][T24232] ? __fdget+0x2c/0x40 [ 2512.150090][T24232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2512.156386][T24232] __sys_sendmmsg+0x123/0x350 [ 2512.161186][T24232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2512.167463][T24232] ? fput_many+0xec/0x130 [ 2512.172027][T24232] ? fput+0x29/0x30 [ 2512.175870][T24232] ? ksys_write+0x145/0x1b0 [ 2512.180393][T24232] __x64_sys_sendmmsg+0x64/0x80 [ 2512.185400][T24232] do_syscall_64+0xcc/0x370 [ 2512.190042][T24232] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2512.195942][T24232] RIP: 0033:0x45a639 [ 2512.200023][T24232] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2512.219636][T24232] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2512.228378][T24232] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2512.235990][T24356] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2512.236390][T24232] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 04:03:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x2000}, 0x0) 04:03:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x5000000, @mcast2={0x0}}, r1}}, 0x48) [ 2512.252475][T24232] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2512.260561][T24232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2512.268698][T24232] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x6000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:07 executing program 5 (fault-call:9 fault-nth:82): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x390d}, 0x0) 04:03:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x7000000, @mcast2={0x0}}, r1}}, 0x48) [ 2512.555787][T24781] FAULT_INJECTION: forcing a failure. [ 2512.555787][T24781] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.568722][T24781] CPU: 1 PID: 24781 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2512.576640][T24781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2512.587055][T24781] Call Trace: [ 2512.590396][T24781] dump_stack+0x11d/0x181 [ 2512.594757][T24781] should_fail.cold+0xa/0x1a [ 2512.599371][T24781] __should_failslab+0xee/0x130 [ 2512.604240][T24781] should_failslab+0x9/0x14 [ 2512.608812][T24781] kmem_cache_alloc+0x29/0x5d0 [ 2512.613680][T24781] skb_clone+0xf9/0x290 [ 2512.617876][T24781] ip_mc_output+0x1fd/0x620 [ 2512.622577][T24781] ? constant_test_bit+0x30/0x30 [ 2512.627547][T24781] ip_local_out+0x74/0x90 [ 2512.632037][T24781] __ip_queue_xmit+0x3a8/0xa40 [ 2512.636898][T24781] l2tp_xmit_skb+0x574/0x8e0 [ 2512.641594][T24781] ? skb_put+0xeb/0x110 [ 2512.645817][T24781] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2512.650707][T24781] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2512.655928][T24781] sock_sendmsg+0x9f/0xc0 [ 2512.660269][T24781] ___sys_sendmsg+0x2b7/0x5d0 [ 2512.664961][T24781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.671250][T24781] ? __rcu_read_unlock+0x66/0x3c0 [ 2512.676332][T24781] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2512.681204][ C0] net_ratelimit: 22 callbacks suppressed [ 2512.681213][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2512.682376][T24781] ? __fget+0xb8/0x1d0 [ 2512.682396][T24781] ? __fget_light+0xaf/0x190 [ 2512.682424][T24781] ? __fdget+0x2c/0x40 [ 2512.688071][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2512.693766][T24781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2512.693854][T24781] __sys_sendmmsg+0x123/0x350 [ 2512.723550][T24781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2512.729889][T24781] ? fput_many+0xec/0x130 [ 2512.734228][T24781] ? fput+0x29/0x30 [ 2512.738048][T24781] ? ksys_write+0x145/0x1b0 [ 2512.742586][T24781] __x64_sys_sendmmsg+0x64/0x80 [ 2512.747491][T24781] do_syscall_64+0xcc/0x370 [ 2512.752004][T24781] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2512.757916][T24781] RIP: 0033:0x45a639 [ 2512.761814][T24781] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2512.781537][T24781] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2512.789973][T24781] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2512.798040][T24781] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2512.806035][T24781] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2512.814023][T24781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2512.822038][T24781] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, 0xffffffffffffffff) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4000}, 0x0) 04:03:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xee6a14e7ddf1aa54, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000480)={r3, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x84) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x8000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:08 executing program 5 (fault-call:9 fault-nth:83): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4800}, 0x0) 04:03:08 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x103, 0x111000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000000140)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x1000, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x80, &(0x7f0000001600)=[{&(0x7f00000001c0)="676a144af0744e647e24c78dd8e5ddc08ebb317fc7526ea9e009ca61b1e855cf333979cc12854986e4def7350dde326949336e3a5340f8a94fe022f487805db7dd3b76f4396b06792fd71fb1598d610e4ed347df87cd2aac05df2f61524a2ca95de6653de9af6849429128943d62a6acc3f35c84f6615ecb4c9cb9648753f7ab1d26e17cad2821d0a7e8b10533725b5c", 0x90}, {&(0x7f0000000280)="53e9ce3f98adfd4b0924d79cc68365619461d84a65043ec3c90dc9485c10208b0ae06e19fce6a63b00a4f2bf01ed617abb1c4505c1ec07d35c7164e9eee3510f5b3defca62ba3f09e09544720cb097a50514f263eb11e3092bdac2f449006b81be0ff6c92d5593617b9c1c737341db710bf1e48074799455320ebe98c13f8ab3652fb2e5b2a0fe3749d7cb6cfca0ae006be9b2297c994bbc923cc44b3a5f6c53a0658ead30b1be06a7f9ace53e8c05828534", 0xb2}, {&(0x7f0000000340)="4809aac453ceffdafb4fa0cc7aead4b0cabd4e704b5d99e83a69e80c3e558c79c182fd3334232e64cd3e88ce083480d18e16bc608cc50250f7b937e1f73dbff5560fc8542cbcf78e9ede05bda8921ae99d9629f6f51f11f0dd0bbc5f9032a3aefa2b65e89792b26328f604a901d61d6b9b", 0x71}, {&(0x7f0000000400)}, {&(0x7f0000000440)="e4371819b4c2da89e5d88935d442e366206971909c11b7658e881eeb6efeb68b1052398e53ace08b106dd3d828660117fb24e43e1d3c5d7d5a4303756bd3a6851f013829126508f7059307ad6d80900692f7cc86b139ad38db849d1faab8f91c9350774fd5cc2ef7e3442f944e79967715e06a7c45fae76e04", 0x79}, {&(0x7f00000004c0)="e20b5131e8d46c0fef6009e3d0107f2cf2a1fac01ac8996118258d", 0x1b}, {&(0x7f0000000500)}, {&(0x7f0000000540)="8e495e67440f999040c84e52d5924a2755291e27a46ce9af5facfe6c838ce4ae1c89f3619d470a9a5452bb65b0854bca3fbf2e4c8465f48a21f0e70fd679034fd58a74d4c914d33f29ae0b4ac1bc478283562d60c324eb432cbbdfa88e298cb833c43b0f4a8d33ed58691f5ffdc47f930e69983dd8949c0f1620a6d68291eebd273a8e83464aee3dc432880d7639241fe05a13ba8b048c7721eb79380eb8dcfdff02c79b6186789ff586c2819906", 0xae}, {&(0x7f0000000600)="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", 0x1000}], 0x9, &(0x7f00000016c0)=[{0x98, 0x10f, 0x9, "3bced7b8e931e37e5e9adf52aa150dc5b91b63a034ff79eee3a4a8f53c8d9834b972e9ad875d60625a6c93e56130d29928958b0d11ad310213b0b74a8ccd172dd2e925700b280fa0a083ae4b0e80d1c5a3d23527a3d8a62a1d2c1aee9f43a4859e879eadd8c4c0f019a3c27dbc952ba88fb38cab738e789598c89a88345ab36a496cf6e43b"}, {0x1010, 0xff, 0x100, "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"}, {0xa8, 0x119, 0x8001, "58eb43fbb0e506927feb989ce06b2f3b158bed74fe8b91d86710778abf73a3ef5f0631a598613684fe3970f1ca95a71ee465b3e3c91ee97ddf6daef24160c2a146e39707292b399d01aa0f6c98e663df4555b9d8f9a94261b9a236f516dd4d31558863899286c042c5d0a7917dd42b4ef85c215a7b2bc46ad6946fe89c7dd730fcf94a43929dc446b1886b59ce88a48e69a163bae8104110"}], 0x1150}, 0x40020) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000000c0)=""/69) [ 2513.218748][T25211] FAULT_INJECTION: forcing a failure. [ 2513.218748][T25211] name failslab, interval 1, probability 0, space 0, times 0 [ 2513.231668][T25211] CPU: 0 PID: 25211 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2513.239618][T25211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.250531][T25211] Call Trace: [ 2513.253973][T25211] dump_stack+0x11d/0x181 [ 2513.258324][T25211] should_fail.cold+0xa/0x1a [ 2513.262932][T25211] __should_failslab+0xee/0x130 04:03:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x9000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4c00}, 0x0) [ 2513.267816][T25211] should_failslab+0x9/0x14 [ 2513.272387][T25211] kmem_cache_alloc+0x29/0x5d0 [ 2513.277405][T25211] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2513.283343][T25211] dst_alloc+0xad/0x149 [ 2513.287543][T25211] rt_dst_clone+0x5c/0x3b0 [ 2513.291974][T25211] ip_mc_finish_output+0x68/0x340 [ 2513.297103][T25211] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2513.302842][T25211] ? nf_hook_slow+0xb8/0x160 [ 2513.307457][T25211] ip_mc_output+0x32c/0x620 [ 2513.311975][T25211] ? ip_copy_addrs+0x50/0x50 [ 2513.316581][T25211] ip_local_out+0x74/0x90 [ 2513.320931][T25211] __ip_queue_xmit+0x3a8/0xa40 [ 2513.325716][T25211] l2tp_xmit_skb+0x574/0x8e0 [ 2513.330322][T25211] ? skb_put+0xeb/0x110 [ 2513.334562][T25211] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2513.339486][T25211] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2513.344644][T25211] sock_sendmsg+0x9f/0xc0 [ 2513.348986][T25211] ___sys_sendmsg+0x2b7/0x5d0 [ 2513.353769][T25211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.360041][T25211] ? __rcu_read_unlock+0x66/0x3c0 [ 2513.365079][T25211] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2513.371082][T25211] ? __fget+0xb8/0x1d0 [ 2513.375188][T25211] ? __fget_light+0xaf/0x190 [ 2513.379963][T25211] ? __fdget+0x2c/0x40 [ 2513.384075][T25211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2513.390331][T25211] __sys_sendmmsg+0x123/0x350 [ 2513.395069][T25211] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.401318][T25211] ? fput_many+0xec/0x130 [ 2513.406124][T25211] ? fput+0x29/0x30 [ 2513.409933][T25211] ? ksys_write+0x145/0x1b0 [ 2513.414514][T25211] __x64_sys_sendmmsg+0x64/0x80 04:03:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4d00}, 0x0) [ 2513.419413][T25211] do_syscall_64+0xcc/0x370 [ 2513.423962][T25211] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2513.429925][T25211] RIP: 0033:0x45a639 [ 2513.433890][T25211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2513.453585][T25211] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2513.462016][T25211] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:03:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xf161, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0xbc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xc977}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x2, @mcast1, 0x4}}, 0x5d, 0x73}, &(0x7f0000000280)=0x90) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x100100, 0x4) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r5, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000300)={r5, 0x52e6, 0x200}, 0x8) [ 2513.470012][T25211] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2513.477989][T25211] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2513.486102][T25211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2513.494090][T25211] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2513.562480][T25524] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2513.574599][T25524] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:03:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, 0xffffffffffffffff) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:09 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6000}, 0x0) 04:03:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xa000000, @mcast2={0x0}}, r1}}, 0x48) [ 2513.881215][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2513.887024][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2513.965654][T25630] validate_nla: 4 callbacks suppressed [ 2513.965665][T25630] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x3, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:09 executing program 5 (fault-call:9 fault-nth:84): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:09 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) 04:03:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x10000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:09 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6800}, 0x0) [ 2514.097249][T25847] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:09 executing program 3: setrlimit(0x7, &(0x7f0000000040)={0x2, 0x7}) socket$kcm(0x10, 0x2, 0x0) 04:03:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x10000120, @mcast2={0x0}}, r1}}, 0x48) [ 2514.202400][T25954] FAULT_INJECTION: forcing a failure. [ 2514.202400][T25954] name failslab, interval 1, probability 0, space 0, times 0 [ 2514.215103][T25954] CPU: 0 PID: 25954 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2514.223004][T25954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2514.233073][T25954] Call Trace: [ 2514.236380][T25954] dump_stack+0x11d/0x181 [ 2514.240761][T25954] should_fail.cold+0xa/0x1a [ 2514.245474][T25954] __should_failslab+0xee/0x130 [ 2514.250346][T25954] should_failslab+0x9/0x14 [ 2514.254854][T25954] kmem_cache_alloc+0x29/0x5d0 [ 2514.259651][T25954] ? __read_once_size.constprop.0+0x20/0x20 [ 2514.265579][T25954] skb_clone+0xf9/0x290 [ 2514.269746][T25954] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2514.276036][T25954] dev_queue_xmit_nit+0x24a/0x540 [ 2514.281141][T25954] ? constant_test_bit+0x30/0x30 [ 2514.286115][T25954] dev_hard_start_xmit+0x3f5/0x430 [ 2514.291362][T25954] __dev_queue_xmit+0x14ab/0x1b40 [ 2514.296399][T25954] ? ipt_do_table+0x8e9/0xe60 04:03:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6c00}, 0x0) [ 2514.377975][T25962] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2514.382466][T25954] sock_sendmsg+0x9f/0xc0 [ 2514.382486][T25954] ___sys_sendmsg+0x2b7/0x5d0 [ 2514.382510][T25954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2514.382529][T25954] ? __rcu_read_unlock+0x66/0x3c0 [ 2514.382555][T25954] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2514.435049][T25954] ? __fget+0xb8/0x1d0 [ 2514.439200][T25954] ? __fget_light+0xaf/0x190 [ 2514.444783][T25954] ? __fdget+0x2c/0x40 [ 2514.448990][T25954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2514.455289][T25954] __sys_sendmmsg+0x123/0x350 [ 2514.460067][T25954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2514.466315][T25954] ? fput_many+0xec/0x130 [ 2514.470678][T25954] ? fput+0x29/0x30 [ 2514.474517][T25954] ? ksys_write+0x145/0x1b0 [ 2514.479050][T25954] __x64_sys_sendmmsg+0x64/0x80 [ 2514.483918][T25954] do_syscall_64+0xcc/0x370 [ 2514.488510][T25954] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2514.494407][T25954] RIP: 0033:0x45a639 [ 2514.498395][T25954] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2514.501922][T26065] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2514.518134][T25954] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2514.518150][T25954] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2514.518161][T25954] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2514.518170][T25954] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2514.518180][T25954] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2514.518189][T25954] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, 0xffffffffffffffff) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="a41f394b03c07a1483bda8acedbdff67fb70eea4dc8090d6c91bf59647d4f5ed5057fb05bee39657ef02c57cdf33cd18f5532166015909a52908666520fd7259", 0x40}], 0x1}, 0x0) 04:03:10 executing program 5 (fault-call:9 fault-nth:85): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2514.955882][T26177] FAULT_INJECTION: forcing a failure. [ 2514.955882][T26177] name failslab, interval 1, probability 0, space 0, times 0 [ 2514.968560][T26177] CPU: 1 PID: 26177 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2514.976526][T26177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2514.986593][T26177] Call Trace: [ 2514.990060][T26177] dump_stack+0x11d/0x181 [ 2514.994498][T26177] should_fail.cold+0xa/0x1a [ 2514.999111][T26177] __should_failslab+0xee/0x130 [ 2515.004015][T26177] should_failslab+0x9/0x14 [ 2515.008531][T26177] kmem_cache_alloc+0x29/0x5d0 [ 2515.013400][T26177] skb_clone+0xf9/0x290 [ 2515.017568][T26177] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2515.023840][T26177] dev_queue_xmit_nit+0x24a/0x540 [ 2515.028892][T26177] ? constant_test_bit+0x30/0x30 [ 2515.033889][T26177] dev_hard_start_xmit+0x3f5/0x430 [ 2515.039015][T26177] __dev_queue_xmit+0x14ab/0x1b40 [ 2515.044057][T26177] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2515.050355][T26177] ? nf_ct_bridge_post+0x22f/0xb50 04:03:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x4, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x20010010, @mcast2={0x0}}, r1}}, 0x48) 04:03:10 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7400}, 0x0) 04:03:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7a00}, 0x0) [ 2515.300007][T26177] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2515.319624][T26177] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2515.328048][T26177] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2515.336030][T26177] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2515.344048][T26177] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2515.352050][T26177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2515.360031][T26177] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x3f000000, @mcast2={0x0}}, r1}}, 0x48) [ 2515.466003][T26498] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2515.593054][T26705] FAULT_INJECTION: forcing a failure. [ 2515.593054][T26705] name failslab, interval 1, probability 0, space 0, times 0 [ 2515.606516][T26705] CPU: 1 PID: 26705 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2515.614426][T26705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2515.624559][T26705] Call Trace: [ 2515.627868][T26705] dump_stack+0x11d/0x181 [ 2515.632215][T26705] should_fail.cold+0xa/0x1a [ 2515.636883][T26705] __should_failslab+0xee/0x130 [ 2515.641750][T26705] should_failslab+0x9/0x14 [ 2515.646377][T26705] kmem_cache_alloc_node+0x39/0x660 [ 2515.651591][T26705] __alloc_skb+0x8e/0x360 [ 2515.655995][T26705] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2515.661894][T26705] sock_wmalloc+0xb8/0x110 [ 2515.666461][T26705] pppol2tp_sendmsg+0x15a/0x3c0 [ 2515.671304][T26705] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2515.676400][T26705] sock_sendmsg+0x9f/0xc0 [ 2515.680712][T26705] ___sys_sendmsg+0x2b7/0x5d0 [ 2515.685390][T26705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2515.691627][T26705] ? __rcu_read_unlock+0x66/0x3c0 [ 2515.696665][T26705] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2515.702581][T26705] ? __fget+0xb8/0x1d0 [ 2515.706690][T26705] ? __fget_light+0xaf/0x190 [ 2515.711270][T26705] ? __fdget+0x2c/0x40 [ 2515.715352][T26705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2515.721646][T26705] __sys_sendmmsg+0x123/0x350 [ 2515.726366][T26705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2515.732652][T26705] ? debug_smp_processor_id+0x4c/0x172 [ 2515.738204][T26705] ? delay_tsc+0x8f/0xc0 [ 2515.742447][T26705] ? __const_udelay+0x36/0x40 [ 2515.747193][T26705] __x64_sys_sendmmsg+0x64/0x80 [ 2515.752077][T26705] do_syscall_64+0xcc/0x370 [ 2515.756589][T26705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2515.762531][T26705] RIP: 0033:0x45a639 [ 2515.766415][T26705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2515.786017][T26705] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2515.794421][T26705] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2515.802413][T26705] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2515.810391][T26705] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2515.818408][T26705] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2515.826381][T26705] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) dup2(r0, r2) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x8100}, 0x0) 04:03:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x40000000, @mcast2={0x0}}, r1}}, 0x48) [ 2515.972491][T26723] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x5, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0xfffffffa, @local, 0xff}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) mq_notify(r4, &(0x7f0000000440)={0x0, 0x33, 0x4, @tid=r6}) lseek(r3, 0xfffffffffffffff7, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@loopback}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) 04:03:11 executing program 5 (fault-call:9 fault-nth:87): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf80b}, 0x0) 04:03:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x78000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:11 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0xfffffffffffffed3}, 0x10000) [ 2516.161750][T26992] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2516.180539][T27042] FAULT_INJECTION: forcing a failure. [ 2516.180539][T27042] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.213041][T27042] CPU: 0 PID: 27042 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2516.221113][T27042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2516.231220][T27042] Call Trace: [ 2516.234692][T27042] dump_stack+0x11d/0x181 [ 2516.239100][T27042] should_fail.cold+0xa/0x1a [ 2516.243772][T27042] __should_failslab+0xee/0x130 [ 2516.248657][T27042] should_failslab+0x9/0x14 [ 2516.253164][T27042] kmem_cache_alloc_node_trace+0x3b/0x670 04:03:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0), &(0x7f0000000100)=0x10) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x480000c0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000180)={0x4, 0x0, [{0x6, 0x4, 0xffff, 0x5cf, 0x6}, {0xb, 0x7, 0xff, 0x2, 0x5e2f}, {0x80000008, 0x40, 0x0, 0xfffeffff, 0xd0}, {0x0, 0xc55, 0x6973, 0x2, 0x101}]}) [ 2516.258929][T27042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2516.265185][T27042] ? memcg_kmem_put_cache+0x91/0xe0 [ 2516.270419][T27042] __kmalloc_node_track_caller+0x38/0x50 [ 2516.276135][T27042] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2516.281524][T27042] __alloc_skb+0xc2/0x360 [ 2516.285886][T27042] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2516.291796][T27042] sock_wmalloc+0xb8/0x110 [ 2516.296230][T27042] pppol2tp_sendmsg+0x15a/0x3c0 [ 2516.301097][T27042] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2516.306326][T27042] sock_sendmsg+0x9f/0xc0 04:03:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfc000000, @mcast2={0x0}}, r1}}, 0x48) [ 2516.310804][T27042] ___sys_sendmsg+0x2b7/0x5d0 [ 2516.315500][T27042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2516.322554][T27042] ? __rcu_read_unlock+0x66/0x3c0 [ 2516.327642][T27042] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2516.333658][T27042] ? __fget+0xb8/0x1d0 [ 2516.337814][T27042] ? __fget_light+0xaf/0x190 [ 2516.342448][T27042] ? __fdget+0x2c/0x40 [ 2516.346534][T27042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2516.352802][T27042] __sys_sendmmsg+0x123/0x350 [ 2516.357535][T27042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:03:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2516.415562][T27042] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2516.424104][T27042] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2516.432193][T27042] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2516.440174][T27042] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2516.448194][T27042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2516.456195][T27042] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfe800000, @mcast2={0x0}}, r1}}, 0x48) 04:03:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) set_robust_list(&(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000040)}}, 0x18) 04:03:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) dup2(r0, r2) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x6, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfb0b}, 0x0) 04:03:12 executing program 5 (fault-call:9 fault-nth:88): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfec00000, @mcast2={0x0}}, r1}}, 0x48) 04:03:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)}, 0x80) [ 2517.117673][T27579] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) [ 2517.168268][T27665] FAULT_INJECTION: forcing a failure. [ 2517.168268][T27665] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.181071][T27665] CPU: 0 PID: 27665 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2517.189017][T27665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2517.199095][T27665] Call Trace: [ 2517.202429][T27665] dump_stack+0x11d/0x181 [ 2517.206854][T27665] should_fail.cold+0xa/0x1a [ 2517.211471][T27665] __should_failslab+0xee/0x130 04:03:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfd0b}, 0x0) [ 2517.216342][T27665] should_failslab+0x9/0x14 [ 2517.220944][T27665] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2517.226827][T27665] ? should_fail+0xd4/0x45d [ 2517.231420][T27665] __kmalloc_node_track_caller+0x38/0x50 [ 2517.237082][T27665] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2517.242467][T27665] pskb_expand_head+0x102/0x750 [ 2517.247331][T27665] ? iov_iter_advance+0x211/0x9d0 [ 2517.252369][T27665] l2tp_xmit_skb+0x754/0x8e0 [ 2517.256987][T27665] ? skb_put+0xeb/0x110 [ 2517.261224][T27665] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2517.266200][T27665] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2517.271442][T27665] sock_sendmsg+0x9f/0xc0 [ 2517.275784][T27665] ___sys_sendmsg+0x2b7/0x5d0 [ 2517.280471][T27665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2517.289264][T27665] ? __rcu_read_unlock+0x66/0x3c0 [ 2517.294324][T27665] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2517.300272][T27665] ? __fget+0xb8/0x1d0 [ 2517.304293][T27690] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2517.304416][T27665] ? __fget_light+0xaf/0x190 [ 2517.317101][T27665] ? __fdget+0x2c/0x40 [ 2517.321195][T27665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2517.327587][T27665] __sys_sendmmsg+0x123/0x350 [ 2517.332349][T27665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2517.338727][T27665] ? fput_many+0xec/0x130 [ 2517.343143][T27665] ? fput+0x29/0x30 [ 2517.346973][T27665] ? ksys_write+0x145/0x1b0 [ 2517.351496][T27665] __x64_sys_sendmmsg+0x64/0x80 [ 2517.356378][T27665] do_syscall_64+0xcc/0x370 [ 2517.360888][T27665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2517.366863][T27665] RIP: 0033:0x45a639 [ 2517.370870][T27665] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2517.390905][T27665] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2517.399659][T27665] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2517.407955][T27665] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 04:03:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xff000000, @mcast2={0x0}}, r1}}, 0x48) 04:03:12 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfeff}, 0x0) [ 2517.416116][T27665] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2517.424105][T27665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2517.432472][T27665] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:12 executing program 5 (fault-call:9 fault-nth:89): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x10d000, 0x0) read$FUSE(r1, &(0x7f0000002200), 0x1000) [ 2517.544589][T27905] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2517.642874][T28117] FAULT_INJECTION: forcing a failure. [ 2517.642874][T28117] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.655588][T28117] CPU: 1 PID: 28117 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2517.663573][T28117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2517.673717][T28117] Call Trace: [ 2517.677105][T28117] dump_stack+0x11d/0x181 [ 2517.681456][T28117] should_fail.cold+0xa/0x1a [ 2517.686238][T28117] __should_failslab+0xee/0x130 [ 2517.691184][T28117] should_failslab+0x9/0x14 [ 2517.695702][T28117] kmem_cache_alloc+0x29/0x5d0 [ 2517.700495][T28117] skb_clone+0xf9/0x290 [ 2517.704674][T28117] ip_mc_output+0x1fd/0x620 [ 2517.709292][T28117] ? constant_test_bit+0x30/0x30 [ 2517.714362][T28117] ip_local_out+0x74/0x90 [ 2517.718709][T28117] __ip_queue_xmit+0x3a8/0xa40 [ 2517.723495][T28117] l2tp_xmit_skb+0x574/0x8e0 [ 2517.728182][T28117] ? skb_put+0xeb/0x110 [ 2517.732414][T28117] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2517.737274][T28117] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2517.742373][T28117] sock_sendmsg+0x9f/0xc0 [ 2517.746698][T28117] ___sys_sendmsg+0x2b7/0x5d0 [ 2517.751400][T28117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2517.757637][T28117] ? __rcu_read_unlock+0x66/0x3c0 [ 2517.762653][T28117] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2517.768533][T28117] ? __fget+0xb8/0x1d0 [ 2517.772645][T28117] ? __fget_light+0xaf/0x190 [ 2517.777232][T28117] ? __fdget+0x2c/0x40 [ 2517.781312][T28117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2517.787689][T28117] __sys_sendmmsg+0x123/0x350 [ 2517.792531][T28117] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2517.798766][T28117] ? fput_many+0xec/0x130 [ 2517.803156][T28117] ? fput+0x29/0x30 [ 2517.806996][T28117] ? ksys_write+0x145/0x1b0 [ 2517.811492][T28117] __x64_sys_sendmmsg+0x64/0x80 [ 2517.816413][T28117] do_syscall_64+0xcc/0x370 [ 2517.820929][T28117] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2517.826818][T28117] RIP: 0033:0x45a639 [ 2517.830727][T28117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2517.853008][T28117] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2517.861403][T28117] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2517.869423][T28117] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2517.877457][T28117] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2517.885425][T28117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2517.893383][T28117] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) dup2(r0, r2) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESOCT, @ANYRESOCT, @ANYBLOB="40b8127e9e34475024efff3019188ac509e0f563f132b90171d4c709f1eb2c401b18739ca7e413c142fde0bec566314a3a72d3616a7335fb3e9df769e47129ff0fb660e658b760248c915e38dfebc469e3127b0ca05d24714300000000000000"], 0xc9}}, 0x0) recvmmsg(r0, &(0x7f0000006bc0)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)=""/33, 0x21}, {&(0x7f00000004c0)=""/196, 0xc4}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 04:03:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xff0b}, 0x0) 04:03:13 executing program 5 (fault-call:9 fault-nth:90): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x7, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2518.041218][ C0] net_ratelimit: 26 callbacks suppressed [ 2518.041227][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2518.052667][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2518.168728][T28381] FAULT_INJECTION: forcing a failure. [ 2518.168728][T28381] name failslab, interval 1, probability 0, space 0, times 0 [ 2518.181597][T28381] CPU: 0 PID: 28381 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2518.189666][T28381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2518.199732][T28381] Call Trace: [ 2518.203048][T28381] dump_stack+0x11d/0x181 [ 2518.207386][T28381] should_fail.cold+0xa/0x1a [ 2518.212024][T28381] __should_failslab+0xee/0x130 04:03:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRESDEC, @ANYRESOCT, @ANYRESOCT, @ANYBLOB="40b8127e9e34475024efff3019188ac509e0f563f132b90171d4c709f1eb2c401b18739ca7e413c142fde0bec566314a3a72d3616a7335fb3e9df769e47129ff0fb660e658b760248c915e38dfebc469e3127b0ca05d24714300000000000000"], 0xc9}}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000006bc0)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)=""/33, 0x21}, {&(0x7f00000004c0)=""/196, 0xc4}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000034c0)=""/4096, 0x1000}], 0x1}}], 0x3, 0x0, 0x0) 04:03:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x2}}, r1}}, 0x48) 04:03:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xff0f}, 0x0) [ 2518.216924][T28381] should_failslab+0x9/0x14 [ 2518.221444][T28381] kmem_cache_alloc+0x29/0x5d0 [ 2518.226255][T28381] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2518.232174][T28381] dst_alloc+0xad/0x149 [ 2518.236345][T28381] rt_dst_clone+0x5c/0x3b0 [ 2518.240779][T28381] ip_mc_finish_output+0x68/0x340 [ 2518.245820][T28381] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2518.251547][T28381] ? nf_hook_slow+0xb8/0x160 [ 2518.256204][T28381] ip_mc_output+0x32c/0x620 [ 2518.260725][T28381] ? ip_copy_addrs+0x50/0x50 [ 2518.265409][T28381] ip_local_out+0x74/0x90 [ 2518.269790][T28381] __ip_queue_xmit+0x3a8/0xa40 [ 2518.274619][T28381] l2tp_xmit_skb+0x574/0x8e0 [ 2518.279226][T28381] ? skb_put+0xeb/0x110 [ 2518.283400][T28381] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2518.288264][T28381] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2518.293387][T28381] sock_sendmsg+0x9f/0xc0 [ 2518.297825][T28381] ___sys_sendmsg+0x2b7/0x5d0 [ 2518.302518][T28381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2518.308796][T28381] ? __rcu_read_unlock+0x66/0x3c0 [ 2518.313907][T28381] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2518.319813][T28381] ? __fget+0xb8/0x1d0 [ 2518.323895][T28381] ? __fget_light+0xaf/0x190 [ 2518.328495][T28381] ? __fdget+0x2c/0x40 [ 2518.332583][T28381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2518.338846][T28381] __sys_sendmmsg+0x123/0x350 [ 2518.343660][T28381] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2518.349928][T28381] ? fput_many+0xec/0x130 [ 2518.354273][T28381] ? fput+0x29/0x30 [ 2518.358200][T28381] ? ksys_write+0x145/0x1b0 [ 2518.362731][T28381] __x64_sys_sendmmsg+0x64/0x80 [ 2518.367627][T28381] do_syscall_64+0xcc/0x370 [ 2518.372146][T28381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2518.378032][T28381] RIP: 0033:0x45a639 [ 2518.382150][T28381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2518.402518][T28381] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2518.410969][T28381] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 04:03:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfffe}, 0x0) [ 2518.418947][T28381] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2518.426911][T28381] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2518.435009][T28381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2518.442975][T28381] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x3}}, r1}}, 0x48) 04:03:13 executing program 5 (fault-call:9 fault-nth:91): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2518.681241][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2518.687097][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2518.706215][T28761] FAULT_INJECTION: forcing a failure. [ 2518.706215][T28761] name failslab, interval 1, probability 0, space 0, times 0 [ 2518.718941][T28761] CPU: 1 PID: 28761 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2518.726877][T28761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2518.736932][T28761] Call Trace: [ 2518.740318][T28761] dump_stack+0x11d/0x181 [ 2518.744684][T28761] should_fail.cold+0xa/0x1a [ 2518.749312][T28761] __should_failslab+0xee/0x130 [ 2518.754196][T28761] should_failslab+0x9/0x14 [ 2518.758817][T28761] kmem_cache_alloc+0x29/0x5d0 [ 2518.763568][T28761] ? __read_once_size.constprop.0+0x20/0x20 [ 2518.769565][T28761] skb_clone+0xf9/0x290 [ 2518.773761][T28761] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2518.780062][T28761] dev_queue_xmit_nit+0x24a/0x540 [ 2518.785074][T28761] ? constant_test_bit+0x30/0x30 [ 2518.790083][T28761] dev_hard_start_xmit+0x3f5/0x430 [ 2518.795527][T28761] __dev_queue_xmit+0x14ab/0x1b40 [ 2518.800610][T28761] ? ipt_do_table+0x8e9/0xe60 [ 2518.805440][T28761] ? __this_cpu_preempt_check+0x4a/0x170 [ 2518.811084][T28761] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2518.816969][T28761] ? __rcu_read_unlock+0x66/0x3c0 [ 2518.822054][T28761] ? nf_nat_packet+0xc2/0x110 [ 2518.827523][T28761] dev_queue_xmit+0x21/0x30 [ 2518.832034][T28761] ip_finish_output2+0x836/0xe40 [ 2518.837038][T28761] __ip_finish_output+0x23a/0x490 [ 2518.842048][T28761] ? ipv4_confirm+0xdc/0x160 [ 2518.846662][T28761] ip_finish_output+0x41/0x160 [ 2518.851413][T28761] ip_mc_output+0x143/0x620 [ 2518.855915][T28761] ? __ip_finish_output+0x490/0x490 [ 2518.861130][T28761] ip_local_out+0x74/0x90 [ 2518.865501][T28761] __ip_queue_xmit+0x3a8/0xa40 [ 2518.870257][T28761] l2tp_xmit_skb+0x574/0x8e0 [ 2518.874911][T28761] ? skb_put+0xeb/0x110 [ 2518.879078][T28761] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2518.883959][T28761] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2518.889098][T28761] sock_sendmsg+0x9f/0xc0 [ 2518.893572][T28761] ___sys_sendmsg+0x2b7/0x5d0 [ 2518.898294][T28761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2518.904551][T28761] ? __rcu_read_unlock+0x66/0x3c0 [ 2518.909580][T28761] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2518.915466][T28761] ? __fget+0xb8/0x1d0 [ 2518.919559][T28761] ? __fget_light+0xaf/0x190 [ 2518.924135][T28761] ? __fdget+0x2c/0x40 [ 2518.928187][T28761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2518.934430][T28761] __sys_sendmmsg+0x123/0x350 [ 2518.939160][T28761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2518.945405][T28761] ? fput_many+0xec/0x130 [ 2518.949745][T28761] ? fput+0x29/0x30 [ 2518.953554][T28761] ? ksys_write+0x145/0x1b0 [ 2518.958073][T28761] __x64_sys_sendmmsg+0x64/0x80 [ 2518.962947][T28761] do_syscall_64+0xcc/0x370 [ 2518.967472][T28761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2518.974155][T28761] RIP: 0033:0x45a639 [ 2518.978051][T28761] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2518.997697][T28761] RSP: 002b:00007f25bce4bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2519.006116][T28761] RAX: ffffffffffffffda RBX: 00007f25bce4bc90 RCX: 000000000045a639 [ 2519.014080][T28761] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2519.022037][T28761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2519.029991][T28761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce4c6d4 [ 2519.037951][T28761] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2519.051247][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2519.057042][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, 0x0, 0x0) 04:03:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000005c0)=@broute={'broute\x00', 0x20, 0x6, 0x146, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20002340], 0x0, 0x0, &(0x7f0000002340)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{0x5, 0x0, 0x0, 'rose0\x00', 'ip6gretap0\x00', 'bridge0\x00', 'ip6gretap0\x00', @remote, [], @dev, [], 0x6e, 0x6e, 0xb6, [], [], @common=@ERROR={'ERROR\x00', 0x20, {"566bce3838ce892ffe20a6476664adc6efdc000b0a2cfaab4413d15017fe"}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x1be) 04:03:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x34000}, 0x0) 04:03:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x4}}, r1}}, 0x48) 04:03:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x8, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:14 executing program 5 (fault-call:9 fault-nth:92): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2519.211488][T28879] validate_nla: 3 callbacks suppressed [ 2519.211556][T28879] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x5}}, r1}}, 0x48) 04:03:14 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 2519.324821][T29089] FAULT_INJECTION: forcing a failure. [ 2519.324821][T29089] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.337637][T29089] CPU: 0 PID: 29089 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2519.345530][T29089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2519.355612][T29089] Call Trace: [ 2519.358984][T29089] dump_stack+0x11d/0x181 [ 2519.363316][T29089] should_fail.cold+0xa/0x1a [ 2519.367904][T29089] __should_failslab+0xee/0x130 [ 2519.372755][T29089] should_failslab+0x9/0x14 [ 2519.377265][T29089] kmem_cache_alloc+0x29/0x5d0 [ 2519.382176][T29089] skb_clone+0xf9/0x290 [ 2519.386447][T29089] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2519.392721][T29089] dev_queue_xmit_nit+0x24a/0x540 [ 2519.397749][T29089] ? constant_test_bit+0x30/0x30 [ 2519.403880][T29089] dev_hard_start_xmit+0x3f5/0x430 [ 2519.409071][T29089] __dev_queue_xmit+0x14ab/0x1b40 [ 2519.414106][T29089] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2519.420359][T29089] ? nf_ct_bridge_post+0x22f/0xb50 [ 2519.425517][T29089] dev_queue_xmit+0x21/0x30 [ 2519.430083][T29089] br_dev_queue_push_xmit+0x2c1/0x330 [ 2519.435463][T29089] ? nf_hook_slow+0xb8/0x160 [ 2519.440087][T29089] br_forward_finish+0x177/0x190 [ 2519.445059][T29089] ? br_fdb_add.cold+0x88/0x88 [ 2519.449826][T29089] __br_forward+0x331/0x4a0 [ 2519.454345][T29089] ? __read_once_size.constprop.0+0x20/0x20 [ 2519.460253][T29089] br_flood+0x31a/0x330 [ 2519.464429][T29089] br_dev_xmit+0x680/0x920 [ 2519.468865][T29089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.475129][T29089] dev_hard_start_xmit+0xef/0x430 [ 2519.480260][T29089] __dev_queue_xmit+0x14ab/0x1b40 [ 2519.485309][T29089] ? ipt_do_table+0x8e9/0xe60 [ 2519.490065][T29089] ? __this_cpu_preempt_check+0x4a/0x170 [ 2519.495851][T29089] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2519.501760][T29089] ? __rcu_read_unlock+0x66/0x3c0 [ 2519.506812][T29089] ? nf_nat_packet+0xc2/0x110 [ 2519.511491][T29089] dev_queue_xmit+0x21/0x30 [ 2519.516015][T29089] ip_finish_output2+0x836/0xe40 [ 2519.520995][T29089] __ip_finish_output+0x23a/0x490 [ 2519.526141][T29089] ? ipv4_confirm+0xdc/0x160 [ 2519.530840][T29089] ip_finish_output+0x41/0x160 [ 2519.535621][T29089] ip_mc_output+0x143/0x620 [ 2519.540143][T29089] ? __ip_finish_output+0x490/0x490 [ 2519.545379][T29089] ip_local_out+0x74/0x90 [ 2519.549722][T29089] __ip_queue_xmit+0x3a8/0xa40 [ 2519.554490][T29089] l2tp_xmit_skb+0x574/0x8e0 [ 2519.559095][T29089] ? skb_put+0xeb/0x110 [ 2519.563265][T29089] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2519.568251][T29089] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2519.573409][T29089] sock_sendmsg+0x9f/0xc0 [ 2519.577786][T29089] ___sys_sendmsg+0x2b7/0x5d0 [ 2519.582478][T29089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.588736][T29089] ? __rcu_read_unlock+0x66/0x3c0 [ 2519.593765][T29089] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2519.599653][T29089] ? __fget+0xb8/0x1d0 [ 2519.603784][T29089] ? __fget_light+0xaf/0x190 [ 2519.608381][T29089] ? __fdget+0x2c/0x40 [ 2519.612630][T29089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2519.618977][T29089] __sys_sendmmsg+0x123/0x350 [ 2519.623681][T29089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2519.630049][T29089] ? fput_many+0xec/0x130 [ 2519.634429][T29089] ? fput+0x29/0x30 [ 2519.638248][T29089] ? ksys_write+0x145/0x1b0 [ 2519.642774][T29089] __x64_sys_sendmmsg+0x64/0x80 [ 2519.647631][T29089] do_syscall_64+0xcc/0x370 [ 2519.652173][T29089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2519.658057][T29089] RIP: 0033:0x45a639 [ 2519.661952][T29089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2519.681653][T29089] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2519.690067][T29089] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2519.698139][T29089] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2519.706168][T29089] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2519.714193][T29089] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2519.722197][T29089] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x400300}, 0x0) 04:03:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4ae8, 0x8000) 04:03:15 executing program 5 (fault-call:9 fault-nth:93): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x6}}, r1}}, 0x48) [ 2519.843025][T29202] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2519.905766][T29306] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2519.941018][T29306] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) [ 2520.015989][T29415] FAULT_INJECTION: forcing a failure. [ 2520.015989][T29415] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.031746][T29415] CPU: 1 PID: 29415 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2520.039658][T29415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2520.049718][T29415] Call Trace: [ 2520.053026][T29415] dump_stack+0x11d/0x181 [ 2520.057371][T29415] should_fail.cold+0xa/0x1a [ 2520.062048][T29415] __should_failslab+0xee/0x130 [ 2520.066946][T29415] should_failslab+0x9/0x14 [ 2520.071459][T29415] kmem_cache_alloc_node+0x39/0x660 [ 2520.076696][T29415] __alloc_skb+0x8e/0x360 [ 2520.081038][T29415] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2520.086992][T29415] sock_wmalloc+0xb8/0x110 [ 2520.091399][T29415] pppol2tp_sendmsg+0x15a/0x3c0 [ 2520.096237][T29415] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2520.101399][T29415] sock_sendmsg+0x9f/0xc0 [ 2520.105745][T29415] ___sys_sendmsg+0x2b7/0x5d0 [ 2520.110409][T29415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2520.116734][T29415] ? __rcu_read_unlock+0x66/0x3c0 [ 2520.121827][T29415] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2520.127727][T29415] ? __fget+0xb8/0x1d0 [ 2520.131805][T29415] ? __fget_light+0xaf/0x190 [ 2520.136483][T29415] ? __fdget+0x2c/0x40 [ 2520.140565][T29415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2520.146863][T29415] __sys_sendmmsg+0x123/0x350 [ 2520.151654][T29415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2520.157899][T29415] ? fput_many+0xec/0x130 [ 2520.162224][T29415] ? fput+0x29/0x30 [ 2520.166015][T29415] ? ksys_write+0x145/0x1b0 [ 2520.170558][T29415] __x64_sys_sendmmsg+0x64/0x80 [ 2520.175418][T29415] do_syscall_64+0xcc/0x370 [ 2520.180022][T29415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2520.185922][T29415] RIP: 0033:0x45a639 [ 2520.189816][T29415] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2520.209487][T29415] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2520.217918][T29415] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2520.225914][T29415] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2520.233873][T29415] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2520.241918][T29415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2520.249929][T29415] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2520.261244][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2520.267016][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, 0x0, 0x0) 04:03:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x1000000}, 0x0) 04:03:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4ae8, 0x8000) 04:03:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x7}}, r1}}, 0x48) 04:03:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x9, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:15 executing program 5 (fault-call:9 fault-nth:94): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2520.403930][T29522] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfc, @mcast2={0x0}}, r1}}, 0x48) 04:03:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x8}}, r1}}, 0x48) [ 2520.508462][T29634] FAULT_INJECTION: forcing a failure. [ 2520.508462][T29634] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.537859][T29634] CPU: 1 PID: 29634 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2520.545795][T29634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2520.555918][T29634] Call Trace: [ 2520.559245][T29634] dump_stack+0x11d/0x181 [ 2520.563608][T29634] should_fail.cold+0xa/0x1a [ 2520.568414][T29634] __should_failslab+0xee/0x130 [ 2520.573413][T29634] should_failslab+0x9/0x14 [ 2520.577928][T29634] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2520.583676][T29634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2520.589936][T29634] ? memcg_kmem_put_cache+0x91/0xe0 [ 2520.595150][T29634] __kmalloc_node_track_caller+0x38/0x50 [ 2520.600836][T29634] __kmalloc_reserve.isra.0+0x49/0xd0 04:03:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x2000000}, 0x0) [ 2520.606232][T29634] __alloc_skb+0xc2/0x360 [ 2520.610564][T29634] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2520.616469][T29634] sock_wmalloc+0xb8/0x110 [ 2520.620897][T29634] pppol2tp_sendmsg+0x15a/0x3c0 [ 2520.625763][T29634] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2520.630882][T29634] sock_sendmsg+0x9f/0xc0 [ 2520.635217][T29634] ___sys_sendmsg+0x2b7/0x5d0 [ 2520.638847][T29647] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2520.639963][T29634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2520.639987][T29634] ? __rcu_read_unlock+0x66/0x3c0 [ 2520.640067][T29634] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2520.665433][T29634] ? __fget+0xb8/0x1d0 [ 2520.669520][T29634] ? __fget_light+0xaf/0x190 [ 2520.674120][T29634] ? __fdget+0x2c/0x40 [ 2520.678303][T29634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2520.684556][T29634] __sys_sendmmsg+0x123/0x350 [ 2520.689251][T29634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2520.695507][T29634] ? fput_many+0xec/0x130 [ 2520.699901][T29634] ? fput+0x29/0x30 [ 2520.703843][T29634] ? ksys_write+0x145/0x1b0 04:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0xfc, @mcast2={0x0}}, r1}}, 0x48) 04:03:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x3000000}, 0x0) [ 2520.708389][T29634] __x64_sys_sendmmsg+0x64/0x80 [ 2520.713258][T29634] do_syscall_64+0xcc/0x370 [ 2520.717783][T29634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2520.723870][T29634] RIP: 0033:0x45a639 [ 2520.727885][T29634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2520.748413][T29634] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 04:03:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x9}}, r1}}, 0x48) [ 2520.756922][T29634] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2520.764915][T29634] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2520.772900][T29634] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2520.780930][T29634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2520.788917][T29634] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2520.832285][T29959] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x10, @mcast2={0x0}}, r1}}, 0x48) 04:03:16 executing program 5 (fault-call:9 fault-nth:95): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, 0x0, 0x0) 04:03:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0xa}}, r1}}, 0x48) 04:03:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0xa, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4000000}, 0x0) [ 2521.491644][T30264] FAULT_INJECTION: forcing a failure. [ 2521.491644][T30264] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.504357][T30264] CPU: 0 PID: 30264 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2521.512260][T30264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2521.522345][T30264] Call Trace: [ 2521.525794][T30264] dump_stack+0x11d/0x181 [ 2521.530147][T30264] should_fail.cold+0xa/0x1a [ 2521.534774][T30264] __should_failslab+0xee/0x130 [ 2521.539638][T30264] should_failslab+0x9/0x14 [ 2521.544154][T30264] kmem_cache_alloc_node_trace+0x3b/0x670 [ 2521.549885][T30264] ? should_fail+0xd4/0x45d [ 2521.554405][T30264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2521.560666][T30264] __kmalloc_node_track_caller+0x38/0x50 [ 2521.566376][T30264] __kmalloc_reserve.isra.0+0x49/0xd0 [ 2521.571759][T30264] pskb_expand_head+0x102/0x750 [ 2521.576617][T30264] ? iov_iter_advance+0x211/0x9d0 [ 2521.581651][T30264] l2tp_xmit_skb+0x754/0x8e0 [ 2521.586311][T30264] ? skb_put+0xeb/0x110 04:03:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x5000000}, 0x0) 04:03:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x6, @mcast2={0x0}}, r1}}, 0x48) [ 2521.590547][T30264] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2521.595545][T30264] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2521.600698][T30264] sock_sendmsg+0x9f/0xc0 [ 2521.605037][T30264] ___sys_sendmsg+0x2b7/0x5d0 [ 2521.609735][T30264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2521.616098][T30264] ? __rcu_read_unlock+0x66/0x3c0 [ 2521.621166][T30264] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2521.627084][T30264] ? __fget+0xb8/0x1d0 [ 2521.631189][T30264] ? __fget_light+0xaf/0x190 [ 2521.635806][T30264] ? __fdget+0x2c/0x40 [ 2521.639955][T30264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2521.646222][T30264] __sys_sendmmsg+0x123/0x350 [ 2521.650922][T30264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2521.657252][T30264] ? fput_many+0xec/0x130 [ 2521.661600][T30264] ? fput+0x29/0x30 [ 2521.665473][T30264] ? ksys_write+0x145/0x1b0 [ 2521.666612][T30291] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2521.669996][T30264] __x64_sys_sendmmsg+0x64/0x80 [ 2521.670020][T30264] do_syscall_64+0xcc/0x370 [ 2521.670041][T30264] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2521.670065][T30264] RIP: 0033:0x45a639 [ 2521.697436][T30264] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2521.717231][T30264] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2521.725711][T30264] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2521.733692][T30264] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 04:03:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6000000}, 0x0) [ 2521.741709][T30264] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2521.749763][T30264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2521.757917][T30264] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x10}}, r1}}, 0x48) 04:03:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x6, @mcast2={0x0}}, r1}}, 0x48) 04:03:17 executing program 5 (fault-call:9 fault-nth:96): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2521.896896][T30603] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2521.982067][T30710] FAULT_INJECTION: forcing a failure. [ 2521.982067][T30710] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.994753][T30710] CPU: 1 PID: 30710 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2522.002736][T30710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2522.012804][T30710] Call Trace: [ 2522.016203][T30710] dump_stack+0x11d/0x181 [ 2522.020563][T30710] should_fail.cold+0xa/0x1a [ 2522.025172][T30710] __should_failslab+0xee/0x130 [ 2522.030043][T30710] should_failslab+0x9/0x14 [ 2522.034566][T30710] kmem_cache_alloc+0x29/0x5d0 [ 2522.039346][T30710] skb_clone+0xf9/0x290 [ 2522.043680][T30710] ip_mc_output+0x1fd/0x620 [ 2522.048254][T30710] ? constant_test_bit+0x30/0x30 [ 2522.053207][T30710] ip_local_out+0x74/0x90 [ 2522.057552][T30710] __ip_queue_xmit+0x3a8/0xa40 [ 2522.062332][T30710] l2tp_xmit_skb+0x574/0x8e0 [ 2522.067000][T30710] ? skb_put+0xeb/0x110 [ 2522.071182][T30710] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2522.076042][T30710] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2522.081163][T30710] sock_sendmsg+0x9f/0xc0 [ 2522.081917][T30714] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2522.085507][T30710] ___sys_sendmsg+0x2b7/0x5d0 [ 2522.085528][T30710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2522.085546][T30710] ? __rcu_read_unlock+0x66/0x3c0 [ 2522.085563][T30710] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2522.085649][T30710] ? __fget+0xb8/0x1d0 [ 2522.085698][T30710] ? __fget_light+0xaf/0x190 [ 2522.124307][T30710] ? __fdget+0x2c/0x40 [ 2522.128395][T30710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2522.134648][T30710] __sys_sendmmsg+0x123/0x350 [ 2522.139360][T30710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2522.145694][T30710] ? fput_many+0xec/0x130 [ 2522.150052][T30710] ? fput+0x29/0x30 [ 2522.153945][T30710] ? ksys_write+0x145/0x1b0 [ 2522.158466][T30710] __x64_sys_sendmmsg+0x64/0x80 [ 2522.163326][T30710] do_syscall_64+0xcc/0x370 [ 2522.167861][T30710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2522.173761][T30710] RIP: 0033:0x45a639 [ 2522.177687][T30710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2522.197286][T30710] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2522.205725][T30710] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2522.213700][T30710] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2522.221668][T30710] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:03:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7000000}, 0x0) 04:03:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x78}}, r1}}, 0x48) [ 2522.230033][T30710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2522.238217][T30710] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18}, 0xffde) 04:03:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x10}}, r1}}, 0x48) 04:03:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xd390000}, 0x0) 04:03:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0xe, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:17 executing program 5 (fault-call:9 fault-nth:97): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0xfc}}, r1}}, 0x48) 04:03:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x3}}, r1}}, 0x48) [ 2522.454757][T30927] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}, 0xfec00000}, {{&(0x7f0000001800)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2522.555562][T31039] FAULT_INJECTION: forcing a failure. [ 2522.555562][T31039] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.568276][T31039] CPU: 1 PID: 31039 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2522.576194][T31039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2522.586278][T31039] Call Trace: [ 2522.589590][T31039] dump_stack+0x11d/0x181 [ 2522.594029][T31039] should_fail.cold+0xa/0x1a [ 2522.598644][T31039] __should_failslab+0xee/0x130 [ 2522.603525][T31039] should_failslab+0x9/0x14 [ 2522.608033][T31039] kmem_cache_alloc+0x29/0x5d0 [ 2522.612801][T31039] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 2522.618726][T31039] dst_alloc+0xad/0x149 [ 2522.622893][T31039] rt_dst_clone+0x5c/0x3b0 [ 2522.627496][T31039] ip_mc_finish_output+0x68/0x340 [ 2522.632546][T31039] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2522.638334][T31039] ? nf_hook_slow+0xb8/0x160 [ 2522.642982][T31039] ip_mc_output+0x32c/0x620 [ 2522.647660][T31039] ? ip_copy_addrs+0x50/0x50 04:03:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf000000}, 0x0) 04:03:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x78, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2522.652258][T31039] ip_local_out+0x74/0x90 [ 2522.656599][T31039] __ip_queue_xmit+0x3a8/0xa40 [ 2522.661547][T31039] l2tp_xmit_skb+0x574/0x8e0 [ 2522.666197][T31039] ? skb_put+0xeb/0x110 [ 2522.670369][T31039] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2522.675239][T31039] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2522.680389][T31039] sock_sendmsg+0x9f/0xc0 [ 2522.684756][T31039] ___sys_sendmsg+0x2b7/0x5d0 [ 2522.689470][T31039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2522.695746][T31039] ? __rcu_read_unlock+0x66/0x3c0 [ 2522.700798][T31039] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2522.706740][T31039] ? __fget+0xb8/0x1d0 [ 2522.710821][T31039] ? __fget_light+0xaf/0x190 [ 2522.715419][T31039] ? __fdget+0x2c/0x40 [ 2522.719567][T31039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2522.726015][T31039] __sys_sendmmsg+0x123/0x350 [ 2522.730722][T31039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2522.731378][T31049] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2522.736986][T31039] ? fput_many+0xec/0x130 [ 2522.737005][T31039] ? fput+0x29/0x30 [ 2522.737020][T31039] ? ksys_write+0x145/0x1b0 [ 2522.757730][T31039] __x64_sys_sendmmsg+0x64/0x80 [ 2522.762748][T31039] do_syscall_64+0xcc/0x370 [ 2522.767270][T31039] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2522.773307][T31039] RIP: 0033:0x45a639 [ 2522.777259][T31039] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2522.796874][T31039] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 04:03:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x20000000}, 0x0) [ 2522.805378][T31039] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2522.813360][T31039] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2522.821362][T31039] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2522.829348][T31039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2522.837434][T31039] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 04:03:18 executing program 5 (fault-call:9 fault-nth:98): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2523.023850][T31361] FAULT_INJECTION: forcing a failure. [ 2523.023850][T31361] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.036641][T31361] CPU: 1 PID: 31361 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2523.044589][T31361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2523.054669][T31361] Call Trace: [ 2523.057972][T31361] dump_stack+0x11d/0x181 [ 2523.062314][T31361] should_fail.cold+0xa/0x1a [ 2523.066941][T31361] __should_failslab+0xee/0x130 [ 2523.071811][T31361] should_failslab+0x9/0x14 [ 2523.076337][T31361] kmem_cache_alloc+0x29/0x5d0 [ 2523.081128][T31361] ? __read_once_size.constprop.0+0x20/0x20 [ 2523.087058][T31361] skb_clone+0xf9/0x290 [ 2523.091260][T31361] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2523.097582][T31361] dev_queue_xmit_nit+0x24a/0x540 [ 2523.102702][T31361] ? constant_test_bit+0x30/0x30 [ 2523.107652][T31361] dev_hard_start_xmit+0x3f5/0x430 [ 2523.112750][T31361] __dev_queue_xmit+0x14ab/0x1b40 [ 2523.117848][T31361] ? ipt_do_table+0x8e9/0xe60 [ 2523.122522][T31361] ? __this_cpu_preempt_check+0x4a/0x170 [ 2523.128144][T31361] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2523.134030][T31361] ? __rcu_read_unlock+0x66/0x3c0 [ 2523.139039][T31361] ? nf_nat_packet+0xc2/0x110 [ 2523.143747][T31361] dev_queue_xmit+0x21/0x30 [ 2523.148249][T31361] ip_finish_output2+0x836/0xe40 [ 2523.153239][T31361] __ip_finish_output+0x23a/0x490 [ 2523.158273][T31361] ? ipv4_confirm+0xdc/0x160 [ 2523.162930][T31361] ip_finish_output+0x41/0x160 [ 2523.167738][T31361] ip_mc_output+0x143/0x620 [ 2523.172235][T31361] ? __ip_finish_output+0x490/0x490 [ 2523.177616][T31361] ip_local_out+0x74/0x90 [ 2523.181944][T31361] __ip_queue_xmit+0x3a8/0xa40 [ 2523.186711][T31361] l2tp_xmit_skb+0x574/0x8e0 [ 2523.191307][T31361] ? skb_put+0xeb/0x110 [ 2523.195465][T31361] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2523.200307][T31361] ? pppol2tp_seq_show+0x6b0/0x6b0 [ 2523.205418][T31361] sock_sendmsg+0x9f/0xc0 [ 2523.209764][T31361] ___sys_sendmsg+0x2b7/0x5d0 [ 2523.214443][T31361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2523.220745][T31361] ? __rcu_read_unlock+0x66/0x3c0 [ 2523.225767][T31361] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2523.231660][T31361] ? __fget+0xb8/0x1d0 [ 2523.235831][T31361] ? __fget_light+0xaf/0x190 [ 2523.240453][T31361] ? __fdget+0x2c/0x40 [ 2523.244520][T31361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2523.250818][T31361] __sys_sendmmsg+0x123/0x350 [ 2523.255593][T31361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2523.261888][T31361] ? fput_many+0xec/0x130 [ 2523.266235][T31361] ? fput+0x29/0x30 [ 2523.270099][T31361] ? ksys_write+0x145/0x1b0 [ 2523.274610][T31361] __x64_sys_sendmmsg+0x64/0x80 [ 2523.279489][T31361] do_syscall_64+0xcc/0x370 [ 2523.284036][T31361] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2523.289931][T31361] RIP: 0033:0x45a639 [ 2523.293865][T31361] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2523.313475][T31361] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2523.321913][T31361] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2523.329890][T31361] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2523.337861][T31361] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2523.345816][T31361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 [ 2523.353800][T31361] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2523.371237][ C0] net_ratelimit: 10 callbacks suppressed [ 2523.371249][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2523.382819][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18}, 0xffde) 04:03:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x78, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x4}}, r1}}, 0x48) 04:03:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x40000000}, 0x0) 04:03:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0xf, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:18 executing program 5 (fault-call:9 fault-nth:99): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000002000000000007465616d300000000000000000000000766c616e3000000015aa00004000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000d0000000d000000000010000766c616e0069df4e5100000000000000000000079ba313000000000000000000080000000000000200000000892f0700636f6e6e6c6162656c0000000000000000000000000000000000000020000000080000000000000000000000000000004e465154455545000000000000000000000000000000000000000000000000000800000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000000000076657468315f746f5f00006964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e5345434d41524b0000000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 2523.594566][T31507] FAULT_INJECTION: forcing a failure. [ 2523.594566][T31507] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.607383][T31507] CPU: 0 PID: 31507 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2523.615285][T31507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2523.625403][T31507] Call Trace: [ 2523.628715][T31507] dump_stack+0x11d/0x181 [ 2523.633060][T31507] should_fail.cold+0xa/0x1a [ 2523.637694][T31507] __should_failslab+0xee/0x130 04:03:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x8, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x48000000}, 0x0) [ 2523.642626][T31507] should_failslab+0x9/0x14 [ 2523.647147][T31507] kmem_cache_alloc+0x29/0x5d0 [ 2523.652013][T31507] skb_clone+0xf9/0x290 [ 2523.656267][T31507] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2523.662562][T31507] dev_queue_xmit_nit+0x24a/0x540 [ 2523.667670][T31507] ? constant_test_bit+0x30/0x30 [ 2523.672700][T31507] dev_hard_start_xmit+0x3f5/0x430 [ 2523.677830][T31507] __dev_queue_xmit+0x14ab/0x1b40 [ 2523.682924][T31507] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2523.689272][T31507] ? nf_ct_bridge_post+0x22f/0xb50 [ 2523.694415][T31507] dev_queue_xmit+0x21/0x30 [ 2523.698930][T31507] br_dev_queue_push_xmit+0x2c1/0x330 [ 2523.704307][T31507] ? nf_hook_slow+0xb8/0x160 [ 2523.708908][T31507] br_forward_finish+0x177/0x190 [ 2523.713861][T31507] ? br_fdb_add.cold+0x88/0x88 [ 2523.718645][T31507] __br_forward+0x331/0x4a0 [ 2523.723273][T31507] ? __read_once_size.constprop.0+0x20/0x20 [ 2523.729223][T31507] br_flood+0x31a/0x330 [ 2523.733403][T31507] br_dev_xmit+0x680/0x920 [ 2523.737842][T31507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2523.744118][T31507] dev_hard_start_xmit+0xef/0x430 [ 2523.749150][T31507] __dev_queue_xmit+0x14ab/0x1b40 [ 2523.754186][T31507] ? ipt_do_table+0x8e9/0xe60 [ 2523.758881][T31507] ? __this_cpu_preempt_check+0x4a/0x170 [ 2523.764716][T31507] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2523.770654][T31507] ? __rcu_read_unlock+0x66/0x3c0 [ 2523.775865][T31507] ? nf_nat_packet+0xc2/0x110 [ 2523.780555][T31507] dev_queue_xmit+0x21/0x30 [ 2523.785071][T31507] ip_finish_output2+0x836/0xe40 [ 2523.790103][T31507] __ip_finish_output+0x23a/0x490 04:03:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x5}}, r1}}, 0x48) 04:03:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x8, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2523.795146][T31507] ? ipv4_confirm+0xdc/0x160 [ 2523.799749][T31507] ip_finish_output+0x41/0x160 [ 2523.804584][T31507] ip_mc_output+0x143/0x620 [ 2523.809276][T31507] ? __ip_finish_output+0x490/0x490 [ 2523.814503][T31507] ip_local_out+0x74/0x90 [ 2523.818859][T31507] __ip_queue_xmit+0x3a8/0xa40 [ 2523.823732][T31507] l2tp_xmit_skb+0x574/0x8e0 [ 2523.828342][T31507] ? skb_put+0xeb/0x110 [ 2523.832517][T31507] pppol2tp_sendmsg+0x2fc/0x3c0 [ 2523.837450][T31507] ? pppol2tp_seq_show+0x6b0/0x6b0 04:03:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4c000000}, 0x0) [ 2523.842579][T31507] sock_sendmsg+0x9f/0xc0 [ 2523.846979][T31507] ___sys_sendmsg+0x2b7/0x5d0 [ 2523.851692][T31507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2523.857972][T31507] ? __rcu_read_unlock+0x66/0x3c0 [ 2523.863013][T31507] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2523.868947][T31507] ? __fget+0xb8/0x1d0 [ 2523.873035][T31507] ? __fget_light+0xaf/0x190 [ 2523.877638][T31507] ? __fdget+0x2c/0x40 [ 2523.881740][T31507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2523.888024][T31507] __sys_sendmmsg+0x123/0x350 [ 2523.892730][T31507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2523.898983][T31507] ? fput_many+0xec/0x130 [ 2523.903323][T31507] ? fput+0x29/0x30 [ 2523.907146][T31507] ? ksys_write+0x145/0x1b0 [ 2523.911827][T31507] __x64_sys_sendmmsg+0x64/0x80 [ 2523.916689][T31507] do_syscall_64+0xcc/0x370 [ 2523.921205][T31507] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2523.927109][T31507] RIP: 0033:0x45a639 [ 2523.931025][T31507] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2523.950640][T31507] RSP: 002b:00007f25bce2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2523.959171][T31507] RAX: ffffffffffffffda RBX: 00007f25bce2ac90 RCX: 000000000045a639 [ 2523.967153][T31507] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000006 [ 2523.975137][T31507] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2523.983192][T31507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25bce2b6d4 04:03:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x4d000000}, 0x0) [ 2523.991172][T31507] R13: 00000000004c85b3 R14: 00000000004dec50 R15: 0000000000000007 [ 2524.361199][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2524.367007][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18}, 0xffde) 04:03:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x8, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:19 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 04:03:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x6}}, r1}}, 0x48) 04:03:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x60000000}, 0x0) 04:03:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x10, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) [ 2524.696561][T32211] validate_nla: 5 callbacks suppressed [ 2524.696571][T32211] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x2, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x68000000}, 0x0) 04:03:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x7}}, r1}}, 0x48) [ 2524.867025][T32328] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:20 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000002, 0x0) 04:03:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x6c000000}, 0x0) [ 2524.921216][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2524.927010][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x6}}, r1}}, 0x48) [ 2525.065117][T32443] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2525.401229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2525.407042][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x11, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x8}}, r1}}, 0x48) 04:03:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18}, 0xffde) 04:03:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x74000000}, 0x0) 04:03:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:20 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000003, 0x0) [ 2525.709068][T32660] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x9}}, r1}}, 0x48) 04:03:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x7a000000}, 0x0) [ 2525.899312][ T314] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000004, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x81000000}, 0x0) 04:03:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0xa}}, r1}}, 0x48) [ 2526.053521][ T526] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2526.441201][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2526.446995][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x60, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x9effffff}, 0x0) [ 2526.574965][ T745] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0xb}}, r1}}, 0x48) 04:03:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000005, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf0ffffff}, 0x0) [ 2526.726861][ T858] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0xe}}, r1}}, 0x48) 04:03:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf80b0000}, 0x0) 04:03:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:22 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000006, 0x0) 04:03:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xff000000}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2526.923849][ T1081] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0xfc, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfb0b0000}, 0x0) 04:03:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1}, 0x9effffff00000000) 04:03:22 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000007, 0x0) 04:03:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0xfe80}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2, 0x3f00}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) [ 2527.486746][ T1408] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:22 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x2]}}, r1}}, 0x48) 04:03:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfd0b0000}, 0x0) 04:03:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0xc000000}, 0x0) 04:03:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x3]}}, r1}}, 0x48) 04:03:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x12c, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfeff0000}, 0x0) 04:03:23 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000008, 0x0) 04:03:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a0002000a0ada1b40d805000500c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 04:03:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x4]}}, r1}}, 0x48) 04:03:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xff0b0000}, 0x0) [ 2528.428284][ T1816] net_ratelimit: 6 callbacks suppressed [ 2528.428349][ T1816] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:0) [ 2528.464637][ T1816] bridge0: received packet on bridge_slave_1 with own address as source address (addr:0a:0a:da:1b:40:d8, vlan:1) 04:03:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x5]}}, r1}}, 0x48) [ 2528.521197][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2528.527014][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:23 executing program 3 (fault-call:3 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:23 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 04:03:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xff0f0000}, 0x0) [ 2528.711723][ T2114] FAULT_INJECTION: forcing a failure. [ 2528.711723][ T2114] name failslab, interval 1, probability 0, space 0, times 0 [ 2528.738461][ T2114] CPU: 1 PID: 2114 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 2528.746442][ T2114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2528.756506][ T2114] Call Trace: [ 2528.759878][ T2114] dump_stack+0x11d/0x181 [ 2528.764361][ T2114] should_fail.cold+0xa/0x1a [ 2528.768973][ T2114] __should_failslab+0xee/0x130 [ 2528.773879][ T2114] should_failslab+0x9/0x14 [ 2528.778396][ T2114] kmem_cache_alloc+0x29/0x5d0 [ 2528.783274][ T2114] ? delay_tsc+0x8f/0xc0 [ 2528.787544][ T2114] __anon_vma_prepare+0x5d/0x2b0 [ 2528.792505][ T2114] do_huge_pmd_anonymous_page+0xd88/0xfe0 [ 2528.798255][ T2114] ? tomoyo_domain_quota_is_ok+0x1e1/0x2b0 [ 2528.804097][ T2114] __handle_mm_fault+0x1aca/0x2c70 04:03:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x6]}}, r1}}, 0x48) 04:03:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000009, 0x0) [ 2528.809240][ T2114] handle_mm_fault+0x21b/0x530 [ 2528.814115][ T2114] __do_page_fault+0x456/0x8d0 [ 2528.818907][ T2114] do_page_fault+0x38/0x194 [ 2528.823426][ T2114] page_fault+0x34/0x40 [ 2528.827599][ T2114] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 2528.833943][ T2114] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 2528.853577][ T2114] RSP: 0018:ffffc90003c83b18 EFLAGS: 00010202 [ 2528.859652][ T2114] RAX: 0000000000040000 RBX: 0000000020000300 RCX: 0000000000000007 [ 2528.867636][ T2114] RDX: 0000000000000000 RSI: 0000000020000300 RDI: ffffc90003c83b68 [ 2528.875621][ T2114] RBP: ffffc90003c83b50 R08: ffff888121b17080 R09: 0000888121b17b98 [ 2528.883625][ T2114] R10: 0000ffff85a56118 R11: 0000888121b17b9f R12: 0000000000000038 [ 2528.891606][ T2114] R13: 0000000020000338 R14: 0000000000000000 R15: 00007ffffffff000 [ 2528.899691][ T2114] ? _copy_from_user+0xbe/0xf0 [ 2528.904498][ T2114] copy_msghdr_from_user+0x4c/0x320 [ 2528.909779][ T2114] ___sys_recvmsg+0xb9/0x3e0 [ 2528.914439][ T2114] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2528.920353][ T2114] ? __fget+0xb8/0x1d0 [ 2528.924429][ T2114] ? __fget_light+0xaf/0x190 [ 2528.929032][ T2114] ? __fdget+0x2c/0x40 [ 2528.933159][ T2114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2528.939419][ T2114] do_recvmmsg+0x19a/0x5c0 [ 2528.943886][ T2114] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2528.949815][ T2114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2528.956173][ T2114] ? __this_cpu_preempt_check+0x4a/0x170 [ 2528.958972][ T2116] FAULT_INJECTION: forcing a failure. [ 2528.958972][ T2116] name fail_futex, interval 1, probability 0, space 0, times 1 [ 2528.961836][ T2114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2528.961854][ T2114] ? __sb_end_write+0xbe/0x100 [ 2528.961883][ T2114] __sys_recvmmsg+0x1ef/0x200 [ 2528.990334][ T2114] ? ksys_write+0x145/0x1b0 [ 2528.994885][ T2114] __x64_sys_recvmmsg+0x89/0xb0 [ 2528.999767][ T2114] do_syscall_64+0xcc/0x370 [ 2529.004371][ T2114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2529.011158][ T2114] RIP: 0033:0x45a639 [ 2529.015072][ T2114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2529.034750][ T2114] RSP: 002b:00007fc7fc745c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2529.043179][ T2114] RAX: ffffffffffffffda RBX: 00007fc7fc745c90 RCX: 000000000045a639 [ 2529.051248][ T2114] RDX: 0000000000000086 RSI: 0000000020000300 RDI: 0000000000000004 [ 2529.059215][ T2114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2529.067192][ T2114] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fc7fc7466d4 [ 2529.075174][ T2114] R13: 00000000004c82f0 R14: 00000000004de6e0 R15: 0000000000000005 [ 2529.083333][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2529.089091][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2529.089246][ T2116] CPU: 0 PID: 2116 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 2529.102609][ T2116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2529.112688][ T2116] Call Trace: [ 2529.115995][ T2116] dump_stack+0x11d/0x181 [ 2529.120345][ T2116] should_fail.cold+0xa/0x1a [ 2529.124958][ T2116] get_futex_key+0x7c4/0xa10 [ 2529.129561][ T2116] ? ima_get_action+0x6e/0x80 [ 2529.134274][ T2116] futex_wake+0xaf/0x350 [ 2529.138586][ T2116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.144837][ T2116] ? process_measurement+0x149/0x1130 [ 2529.150241][ T2116] do_futex+0x2be/0x18d0 [ 2529.154572][ T2116] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2529.160993][ T2116] ? __rcu_read_unlock+0x66/0x3c0 [ 2529.166039][ T2116] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2529.171964][ T2116] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2529.177901][ T2116] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 2529.183730][ T2116] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2529.190050][ T2116] ? exit_robust_list+0x23b/0x250 [ 2529.195097][ T2116] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2529.201034][ T2116] mm_release+0x268/0x2e0 [ 2529.205377][ T2116] do_exit+0x2c5/0x18f0 [ 2529.209590][ T2116] ? __perf_event_task_sched_out+0x14d/0xaa0 [ 2529.215662][ T2116] ? tracing_record_taskinfo_skip+0xf8/0x130 [ 2529.222259][ T2116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.228506][ T2116] ? finish_task_switch+0x7b/0x260 [ 2529.233625][ T2116] ? apic_timer_interrupt+0xa/0x20 [ 2529.238748][ T2116] do_group_exit+0xb4/0x1c0 [ 2529.243309][ T2116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.249570][ T2116] get_signal+0x2a2/0x1320 [ 2529.254053][ T2116] ? eventfd_read+0x217/0x550 [ 2529.258744][ T2116] ? wake_up_q+0x70/0x70 [ 2529.263085][ T2116] do_signal+0x2f/0x6c0 [ 2529.267387][ T2116] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2529.273668][ T2116] ? fput_many+0xec/0x130 [ 2529.278060][ T2116] exit_to_usermode_loop+0x250/0x2c0 [ 2529.283386][ T2116] do_syscall_64+0x353/0x370 [ 2529.288125][ T2116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2529.294085][ T2116] RIP: 0033:0x45a639 [ 2529.297990][ T2116] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2529.317593][ T2116] RSP: 002b:00007f6279eabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2529.326016][ T2116] RAX: fffffffffffffe00 RBX: 00007f6279eabc90 RCX: 000000000045a639 [ 2529.334028][ T2116] RDX: 00000000000000e8 RSI: 0000000020000340 RDI: 0000000000000004 [ 2529.341985][ T2116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2529.350028][ T2116] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6279eac6d4 [ 2529.357985][ T2116] R13: 00000000004c6e53 R14: 00000000004de3f8 R15: 0000000000000005 04:03:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x80000000000000a, 0x0) 04:03:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xffffff7f}, 0x0) 04:03:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x7]}}, r1}}, 0x48) 04:03:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x300, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:24 executing program 0 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 04:03:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2529.561194][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2529.563693][ T2664] FAULT_INJECTION: forcing a failure. [ 2529.563693][ T2664] name failslab, interval 1, probability 0, space 0, times 0 [ 2529.567026][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xffffff9e}, 0x0) 04:03:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x8]}}, r1}}, 0x48) [ 2529.618061][ T2664] CPU: 1 PID: 2664 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 2529.625918][ T2664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2529.636268][ T2664] Call Trace: [ 2529.639572][ T2664] dump_stack+0x11d/0x181 [ 2529.644141][ T2664] should_fail.cold+0xa/0x1a [ 2529.648752][ T2664] __should_failslab+0xee/0x130 [ 2529.653820][ T2664] should_failslab+0x9/0x14 [ 2529.658492][ T2664] kmem_cache_alloc+0x29/0x5d0 [ 2529.663341][ T2664] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2529.669230][ T2664] ? anon_vma_compatible+0x55/0x190 [ 2529.674526][ T2664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.680791][ T2664] __anon_vma_prepare+0x185/0x2b0 [ 2529.685841][ T2664] do_huge_pmd_anonymous_page+0xd88/0xfe0 [ 2529.691576][ T2664] ? tomoyo_domain_quota_is_ok+0x1e1/0x2b0 [ 2529.698236][ T2664] __handle_mm_fault+0x1aca/0x2c70 [ 2529.703582][ T2664] handle_mm_fault+0x21b/0x530 [ 2529.708361][ T2664] __do_page_fault+0x456/0x8d0 [ 2529.713228][ T2664] do_page_fault+0x38/0x194 [ 2529.718597][ T2664] page_fault+0x34/0x40 [ 2529.722858][ T2664] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 2529.729207][ T2664] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 2529.734705][ T2781] validate_nla: 5 callbacks suppressed [ 2529.734785][ T2781] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2529.748865][ T2664] RSP: 0018:ffffc90003f07b18 EFLAGS: 00010202 [ 2529.748901][ T2664] RAX: 0000000000040000 RBX: 0000000020000300 RCX: 0000000000000007 [ 2529.748911][ T2664] RDX: 0000000000000000 RSI: 0000000020000300 RDI: ffffc90003f07b68 [ 2529.748921][ T2664] RBP: ffffc90003f07b50 R08: ffff88811eede0c0 R09: 000088811eedebd8 [ 2529.748930][ T2664] R10: 0000000000000000 R11: 000088811eedebdf R12: 0000000000000038 [ 2529.748940][ T2664] R13: 0000000020000338 R14: 0000000000000000 R15: 00007ffffffff000 [ 2529.748977][ T2664] ? _copy_from_user+0xbe/0xf0 [ 2529.749005][ T2664] copy_msghdr_from_user+0x4c/0x320 04:03:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x9]}}, r1}}, 0x48) [ 2529.818654][ T2664] ___sys_recvmsg+0xb9/0x3e0 [ 2529.823354][ T2664] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2529.829378][ T2664] ? __fget+0xb8/0x1d0 [ 2529.833553][ T2664] ? __fget_light+0xaf/0x190 [ 2529.838154][ T2664] ? __fdget+0x2c/0x40 [ 2529.842298][ T2664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2529.848580][ T2664] do_recvmmsg+0x19a/0x5c0 [ 2529.853013][ T2664] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2529.859119][ T2664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:03:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xfffffff0}, 0x0) [ 2529.865481][ T2664] ? __this_cpu_preempt_check+0x4a/0x170 [ 2529.871134][ T2664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2529.877440][ T2664] ? __sb_end_write+0xbe/0x100 [ 2529.882226][ T2664] __sys_recvmmsg+0x1ef/0x200 [ 2529.886966][ T2664] ? ksys_write+0x145/0x1b0 [ 2529.891490][ T2664] __x64_sys_recvmmsg+0x89/0xb0 [ 2529.896357][ T2664] do_syscall_64+0xcc/0x370 [ 2529.900878][ T2664] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2529.906782][ T2664] RIP: 0033:0x45a639 [ 2529.910721][ T2664] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2529.930333][ T2664] RSP: 002b:00007fc7fc745c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2529.930927][ T2888] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2529.938752][ T2664] RAX: ffffffffffffffda RBX: 00007fc7fc745c90 RCX: 000000000045a639 [ 2529.938812][ T2664] RDX: 0000000000000086 RSI: 0000000020000300 RDI: 0000000000000004 [ 2529.938822][ T2664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2529.938832][ T2664] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fc7fc7466d4 [ 2529.938843][ T2664] R13: 00000000004c82f0 R14: 00000000004de6e0 R15: 0000000000000005 04:03:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0xa]}}, r1}}, 0x48) 04:03:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x40030000000000}, 0x0) 04:03:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x80000000000000b, 0x0) 04:03:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r3 = dup2(r0, r2) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x400000000000, {0x2000000}}, 0x18) [ 2530.181152][ T3004] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:25 executing program 0 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) [ 2530.346386][ T3244] FAULT_INJECTION: forcing a failure. [ 2530.346386][ T3244] name failslab, interval 1, probability 0, space 0, times 0 [ 2530.359302][ T3244] CPU: 0 PID: 3244 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 2530.367810][ T3244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2530.377860][ T3244] Call Trace: [ 2530.381169][ T3244] dump_stack+0x11d/0x181 [ 2530.385575][ T3244] should_fail.cold+0xa/0x1a [ 2530.390205][ T3244] __should_failslab+0xee/0x130 [ 2530.395251][ T3244] should_failslab+0x9/0x14 [ 2530.399779][ T3244] kmem_cache_alloc+0x29/0x5d0 [ 2530.404627][ T3244] ? anon_vma_chain_link+0xec/0x110 [ 2530.410784][ T3244] __khugepaged_enter+0x5f/0x2b0 [ 2530.415763][ T3244] do_huge_pmd_anonymous_page+0xafa/0xfe0 [ 2530.421499][ T3244] ? tomoyo_domain_quota_is_ok+0x1e1/0x2b0 [ 2530.427379][ T3244] __handle_mm_fault+0x1aca/0x2c70 [ 2530.432518][ T3244] handle_mm_fault+0x21b/0x530 [ 2530.437400][ T3244] __do_page_fault+0x456/0x8d0 [ 2530.442199][ T3244] do_page_fault+0x38/0x194 04:03:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x500, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x10]}}, r1}}, 0x48) 04:03:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x100000000000000}, 0x0) [ 2530.446709][ T3244] page_fault+0x34/0x40 [ 2530.450932][ T3244] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 2530.457262][ T3244] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 2530.476953][ T3244] RSP: 0018:ffffc9000402fb18 EFLAGS: 00010202 [ 2530.483556][ T3244] RAX: 0000000000040000 RBX: 0000000020000300 RCX: 0000000000000007 [ 2530.491539][ T3244] RDX: 0000000000000000 RSI: 0000000020000300 RDI: ffffc9000402fb68 [ 2530.499576][ T3244] RBP: ffffc9000402fb50 R08: ffff88811bcdb040 R09: 000088811bcdbb58 [ 2530.507617][ T3244] R10: 0000000000000000 R11: 000088811bcdbb5f R12: 0000000000000038 [ 2530.515742][ T3244] R13: 0000000020000338 R14: 0000000000000000 R15: 00007ffffffff000 [ 2530.523750][ T3244] ? _copy_from_user+0xbe/0xf0 [ 2530.528620][ T3244] copy_msghdr_from_user+0x4c/0x320 [ 2530.533833][ T3244] ___sys_recvmsg+0xb9/0x3e0 [ 2530.538526][ T3244] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2530.544434][ T3244] ? __fget+0xb8/0x1d0 [ 2530.548516][ T3244] ? __fget_light+0xaf/0x190 [ 2530.553128][ T3244] ? __fdget+0x2c/0x40 [ 2530.557212][ T3244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2530.562700][ T3438] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2530.563536][ T3244] do_recvmmsg+0x19a/0x5c0 [ 2530.563594][ T3244] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2530.581979][ T3244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2530.588264][ T3244] ? __this_cpu_preempt_check+0x4a/0x170 [ 2530.593975][ T3244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2530.600408][ T3244] ? __sb_end_write+0xbe/0x100 [ 2530.605194][ T3244] __sys_recvmmsg+0x1ef/0x200 [ 2530.609883][ T3244] ? ksys_write+0x145/0x1b0 [ 2530.614454][ T3244] __x64_sys_recvmmsg+0x89/0xb0 [ 2530.619330][ T3244] do_syscall_64+0xcc/0x370 [ 2530.623850][ T3244] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2530.629771][ T3244] RIP: 0033:0x45a639 04:03:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x5c8, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x200000000000000}, 0x0) [ 2530.633748][ T3244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2530.653359][ T3244] RSP: 002b:00007fc7fc745c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2530.661780][ T3244] RAX: ffffffffffffffda RBX: 00007fc7fc745c90 RCX: 000000000045a639 [ 2530.669817][ T3244] RDX: 0000000000000086 RSI: 0000000020000300 RDI: 0000000000000004 [ 2530.677876][ T3244] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2530.685858][ T3244] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fc7fc7466d4 [ 2530.693950][ T3244] R13: 00000000004c82f0 R14: 00000000004de6e0 R15: 0000000000000005 [ 2530.702168][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2530.707948][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x78]}}, r1}}, 0x48) [ 2530.756973][ T3699] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x101000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000240), 0x4) r2 = eventfd2(0x0, 0x0) read(r2, &(0x7f0000000340)=""/232, 0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3020000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x78, 0x25, 0x10, 0x70bd2d, 0x25dfdbff, {0x12}, [@generic="b511ee82040acc1de53e2ee8853f2b048541eed66ef8b349da286621b43b517367f0e15eea46f67670765e23b9219caa18b4128cb81bc10d981e4f5efd094508711059e216f87e22433a649af350d862dd3912940399a78b435d10445e4034bbad135458"]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x8014) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x300000000000000}, 0x0) 04:03:26 executing program 0 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 04:03:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0xfc]}}, r1}}, 0x48) [ 2531.010217][ T3857] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0}}, r1}}, 0x48) 04:03:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x400000000000000}, 0x0) 04:03:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) r2 = eventfd2(0x0, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db408d35c2a7e43f11", 0x9) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, 0x0, r3}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000140), 0x0, r5) keyctl$update(0x2, r3, &(0x7f0000000140)="1b4b8ea65a352d2acac4d612dfd8ed5fdadb5244994609f10fce9868b79fcb4213519a68c21b5504b56560a182b755688b520c0457345e86066eda79b5a21dccef6be9a2cfc916fb06a2c072c8fc61d38476aa108a7964a072e746d0d5c6e6b3262f656460127f0ca4e16b292b43c65fef868abacbe10dd1f857943ae2a741f67ebf969d0458ad92982c97e6d84faa84f533fc46ffe640a6a71078082e76ade5e82a50bb11d9497b2473ea62dd5556c9af765e8c0547775bdfa17a7e52b664e2f4337b622ba9aef2d5", 0xc9) read(r2, &(0x7f0000000340)=""/232, 0xe8) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r2}]) r6 = dup2(r0, r2) write$FUSE_GETXATTR(r6, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2531.134717][ T4034] FAULT_INJECTION: forcing a failure. [ 2531.134717][ T4034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2531.189804][ T4034] CPU: 1 PID: 4034 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 2531.197700][ T4034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2531.208004][ T4034] Call Trace: [ 2531.211326][ T4034] dump_stack+0x11d/0x181 [ 2531.215718][ T4034] should_fail.cold+0xa/0x1a [ 2531.220355][ T4034] should_fail_alloc_page+0x50/0x60 [ 2531.225564][ T4034] __alloc_pages_nodemask+0xd2/0x310 [ 2531.230877][ T4034] alloc_pages_current+0xd1/0x170 [ 2531.235956][ T4034] pte_alloc_one+0x18/0x50 [ 2531.240454][ T4034] do_huge_pmd_anonymous_page+0x861/0xfe0 [ 2531.246188][ T4034] ? tomoyo_domain_quota_is_ok+0x1e1/0x2b0 [ 2531.252020][ T4034] __handle_mm_fault+0x1aca/0x2c70 [ 2531.257207][ T4034] handle_mm_fault+0x21b/0x530 [ 2531.261987][ T4034] __do_page_fault+0x456/0x8d0 [ 2531.266811][ T4034] do_page_fault+0x38/0x194 [ 2531.271360][ T4034] page_fault+0x34/0x40 [ 2531.275528][ T4034] RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 [ 2531.277259][ T4040] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2531.281870][ T4034] Code: 4c 8b 5e 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 <4c> 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 [ 2531.281879][ T4034] RSP: 0018:ffffc900083d3b18 EFLAGS: 00010202 [ 2531.281916][ T4034] RAX: 0000000000040000 RBX: 0000000020000300 RCX: 0000000000000007 [ 2531.281926][ T4034] RDX: 0000000000000000 RSI: 0000000020000300 RDI: ffffc900083d3b68 [ 2531.281936][ T4034] RBP: ffffc900083d3b50 R08: ffff88811eede0c0 R09: 000088811eedebd8 [ 2531.281947][ T4034] R10: 0000000000000000 R11: 000088811eedebdf R12: 0000000000000038 [ 2531.281957][ T4034] R13: 0000000020000338 R14: 0000000000000000 R15: 00007ffffffff000 [ 2531.281998][ T4034] ? _copy_from_user+0xbe/0xf0 [ 2531.360525][ T4034] copy_msghdr_from_user+0x4c/0x320 [ 2531.365822][ T4034] ___sys_recvmsg+0xb9/0x3e0 [ 2531.370539][ T4034] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2531.376528][ T4034] ? __fget+0xb8/0x1d0 [ 2531.380616][ T4034] ? __fget_light+0xaf/0x190 [ 2531.385232][ T4034] ? __fdget+0x2c/0x40 04:03:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x500000000000000}, 0x0) [ 2531.389422][ T4034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2531.395678][ T4034] do_recvmmsg+0x19a/0x5c0 [ 2531.400124][ T4034] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2531.403750][ T4244] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 2531.406063][ T4034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2531.406136][ T4034] ? __this_cpu_preempt_check+0x4a/0x170 [ 2531.426056][ T4034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2531.432305][ T4034] ? __sb_end_write+0xbe/0x100 [ 2531.437108][ T4034] __sys_recvmmsg+0x1ef/0x200 [ 2531.441793][ T4034] ? ksys_write+0x145/0x1b0 [ 2531.446337][ T4034] __x64_sys_recvmmsg+0x89/0xb0 [ 2531.451206][ T4034] do_syscall_64+0xcc/0x370 [ 2531.455771][ T4034] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2531.461672][ T4034] RIP: 0033:0x45a639 [ 2531.465612][ T4034] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2531.485220][ T4034] RSP: 002b:00007fc7fc745c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 2531.493640][ T4034] RAX: ffffffffffffffda RBX: 00007fc7fc745c90 RCX: 000000000045a639 [ 2531.501691][ T4034] RDX: 0000000000000086 RSI: 0000000020000300 RDI: 0000000000000004 [ 2531.509806][ T4034] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2531.517774][ T4034] R10: 0000000000000020 R11: 0000000000000246 R12: 00007fc7fc7466d4 [ 2531.525767][ T4034] R13: 00000000004c82f0 R14: 00000000004de6e0 R15: 0000000000000005 04:03:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x600, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x600000000000000}, 0x0) 04:03:26 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x80000000000000d, 0x0) 04:03:26 executing program 0 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 04:03:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x0, 0x2]}}, r1}}, 0x48) 04:03:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) io_submit(r3, 0x0, &(0x7f0000000600)) r4 = dup2(r0, r1) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) [ 2531.725212][ T4455] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0x700000000000000}, 0x0) 04:03:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x0, 0x3]}}, r1}}, 0x48) [ 2531.926775][ T4676] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:03:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xd39000000000000}, 0x0) 04:03:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x9, &(0x7f0000000040)) r1 = eventfd2(0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x25d4d76f3da7f496) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f00000000c0)=@null) read(r1, &(0x7f0000000340)=""/232, 0xe8) r3 = dup2(r0, r1) write$FUSE_GETXATTR(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe}, 0xffde) 04:03:27 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x80000000000000e, 0x0) 04:03:27 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x86, 0x20, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) [ 2532.247352][ T4785] ================================================================== [ 2532.255521][ T4785] BUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release [ 2532.263491][ T4785] [ 2532.265820][ T4785] read to 0xffff88811d9a7278 of 8 bytes by task 13748 on cpu 0: [ 2532.273586][ T4785] l2tp_tunnel_del_work+0x5b/0x510 [ 2532.278691][ T4785] process_one_work+0x3d4/0x890 [ 2532.283533][ T4785] worker_thread+0xa0/0x800 [ 2532.288019][ T4785] kthread+0x1d4/0x200 [ 2532.292072][ T4785] ret_from_fork+0x1f/0x30 [ 2532.296639][ T4785] [ 2532.298955][ T4785] write to 0xffff88811d9a7278 of 8 bytes by task 4785 on cpu 1: [ 2532.306706][ T4785] sk_common_release+0xbf/0x1d0 [ 2532.311549][ T4785] udp_lib_close+0x1f/0x30 [ 2532.315951][ T4785] inet_release+0x86/0x100 [ 2532.320354][ T4785] inet6_release+0x4a/0x70 [ 2532.324756][ T4785] __sock_release+0x85/0x160 [ 2532.329333][ T4785] sock_close+0x24/0x30 [ 2532.333475][ T4785] __fput+0x1e1/0x520 [ 2532.337447][ T4785] ____fput+0x1f/0x30 [ 2532.341424][ T4785] task_work_run+0xf6/0x130 [ 2532.345982][ T4785] exit_to_usermode_loop+0x2b4/0x2c0 [ 2532.351263][ T4785] do_syscall_64+0x353/0x370 [ 2532.355838][ T4785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2532.361705][ T4785] [ 2532.364017][ T4785] Reported by Kernel Concurrency Sanitizer on: [ 2532.370220][ T4785] CPU: 1 PID: 4785 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2532.378475][ T4785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2532.388720][ T4785] ================================================================== [ 2532.396769][ T4785] Kernel panic - not syncing: panic_on_warn set ... [ 2532.403345][ T4785] CPU: 1 PID: 4785 Comm: syz-executor.5 Not tainted 5.4.0-rc7+ #0 [ 2532.411137][ T4785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2532.421275][ T4785] Call Trace: [ 2532.424555][ T4785] dump_stack+0x11d/0x181 [ 2532.428890][ T4785] panic+0x210/0x640 [ 2532.432794][ T4785] ? vprintk_func+0x8d/0x140 [ 2532.437384][ T4785] kcsan_report.cold+0xc/0xd [ 2532.441964][ T4785] ? udp_v6_flush_pending_frames+0xb0/0xb0 [ 2532.447819][ T4785] kcsan_setup_watchpoint+0x3fe/0x460 [ 2532.460150][ T4785] ? udp_v6_flush_pending_frames+0xb0/0xb0 [ 2532.465946][ T4785] __tsan_unaligned_write8+0xc4/0x100 [ 2532.471330][ T4785] sk_common_release+0xbf/0x1d0 [ 2532.476174][ T4785] udp_lib_close+0x1f/0x30 [ 2532.480579][ T4785] inet_release+0x86/0x100 [ 2532.484980][ T4785] inet6_release+0x4a/0x70 [ 2532.489378][ T4785] __sock_release+0x85/0x160 [ 2532.493957][ T4785] sock_close+0x24/0x30 [ 2532.498151][ T4785] __fput+0x1e1/0x520 [ 2532.502121][ T4785] ? __sock_release+0x160/0x160 [ 2532.506969][ T4785] ____fput+0x1f/0x30 [ 2532.511043][ T4785] task_work_run+0xf6/0x130 [ 2532.515568][ T4785] exit_to_usermode_loop+0x2b4/0x2c0 [ 2532.520852][ T4785] do_syscall_64+0x353/0x370 [ 2532.525460][ T4785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2532.531441][ T4785] RIP: 0033:0x4141d1 04:03:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000014c0)=[{&(0x7f0000000200)='m', 0x1}], 0x1}}, {{&(0x7f0000001800)={0xa, 0x700, 0x0, @remote, 0x8}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001840)="98", 0x1}], 0x1}}], 0x2, 0x0) 04:03:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2={0x0, 0x2, [0x0, 0x4]}}, r1}}, 0x48) 04:03:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x3f}]]}}}]}, 0x44}, 0x1, 0xf00000000000000}, 0x0) [ 2532.535515][ T4785] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2532.555127][ T4785] RSP: 002b:00007ffe371f9f40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2532.563540][ T4785] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004141d1 [ 2532.571615][ T4785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2532.579597][ T4785] RBP: 0000000000000001 R08: 00000000ed08ccfd R09: ffffffffffffffff [ 2532.587581][ T4785] R10: 00007ffe371fa020 R11: 0000000000000293 R12: 000000000075c9a0 [ 2532.595561][ T4785] R13: 000000000075c9a0 R14: 0000000000760e18 R15: 000000000075bfd4 [ 2532.604944][ T4785] Kernel Offset: disabled [ 2532.609276][ T4785] Rebooting in 86400 seconds..