unt_sub_and_test_checked+0x203/0x310 [ 761.946076] __alloc_skb+0x119/0x770 [ 761.949810] ? netdev_alloc_frag+0x1f0/0x1f0 [ 761.954233] ? perf_trace_sched_process_exec+0x860/0x860 [ 761.959684] ? lock_downgrade+0x900/0x900 [ 761.963839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.969374] ? aa_label_sk_perm+0x91/0x100 [ 761.973620] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 761.978551] ? aa_sk_perm+0x22b/0x8e0 [ 761.982351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.987890] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 761.993440] netlink_sendmsg+0xb29/0xfc0 [ 761.997509] ? netlink_unicast+0x760/0x760 [ 762.001736] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 762.006662] ? apparmor_socket_sendmsg+0x29/0x30 [ 762.011412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.016947] ? security_socket_sendmsg+0x94/0xc0 [ 762.021700] ? netlink_unicast+0x760/0x760 [ 762.025933] sock_sendmsg+0xd5/0x120 [ 762.029649] ___sys_sendmsg+0x51d/0x930 [ 762.033618] ? zap_class+0x640/0x640 [ 762.037334] ? copy_msghdr_from_user+0x580/0x580 [ 762.042108] ? get_pid_task+0xd6/0x1a0 [ 762.045998] ? find_held_lock+0x36/0x1c0 [ 762.050071] ? __might_fault+0x12b/0x1e0 [ 762.054130] ? lock_downgrade+0x900/0x900 [ 762.058303] ? perf_trace_sched_process_exec+0x860/0x860 [ 762.063766] __sys_sendmmsg+0x246/0x6d0 [ 762.067744] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 762.072064] ? __lock_is_held+0xb5/0x140 [ 762.076593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.082130] ? check_preemption_disabled+0x48/0x280 [ 762.087160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.092695] ? fput+0x130/0x1a0 [ 762.095974] ? do_syscall_64+0x9a/0x820 [ 762.099952] ? do_syscall_64+0x9a/0x820 [ 762.103925] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 762.108508] ? trace_hardirqs_on+0xbd/0x310 [ 762.112824] ? __ia32_sys_read+0xb0/0xb0 [ 762.116879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.122243] ? trace_hardirqs_off_caller+0x310/0x310 [ 762.127344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.132883] __x64_sys_sendmmsg+0x9d/0x100 [ 762.137117] do_syscall_64+0x1b9/0x820 [ 762.141012] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 762.146403] ? syscall_return_slowpath+0x5e0/0x5e0 [ 762.151336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.156189] ? trace_hardirqs_on_caller+0x310/0x310 [ 762.161223] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 762.166244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 762.171270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.176122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.181394] RIP: 0033:0x457569 [ 762.184597] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.203490] RSP: 002b:00007f6cb5b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 762.211310] RAX: ffffffffffffffda RBX: 00007f6cb5b07c90 RCX: 0000000000457569 [ 762.218665] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000003 [ 762.225935] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 13:01:45 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) write$P9_RLINK(r1, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x58, &(0x7f0000000180)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}, 0x100}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1f}}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x60482a3e, 0x1}, 0x8) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x29, 0x802, 0x0) close(r3) socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:01:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x60000000, 'syzkaller1\x00'}, 0x18) 13:01:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "14bbe918145a136f515b45c936b55ab3ef6160a3f661f8d535b26d1391a7cb8b5a14ab456442c2ce8e6ea691e98acbe9ed12c209b6a5afb204d4f0cf2589358f008cf0e2710e8108999a2363edb94fae8b93051b0d673430aff86e8c007e174bc193caa785d0c4cee533290d3a86bbdb65b85604beb61e802178535796d0f64fc49c0be2db0bef2c2a40e9a30686c6d4b83b19bc"}, 0x98) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:01:45 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000640)="148192fd52e9be7b8813b0178b77b3f7d798c15adc19686675fd0d9ef46ddb82d1ca6ac45bda27401ebf9c0236c9a4904e8734b29b3312f6478492b1c94f30e6b26ce2da24b1ea5b41c9da01279bad8ce0a4e63b6c7f943c7741e168c332c1") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000e00)={0x2, 0x0, @broadcast}, 0x10) r3 = memfd_create(&(0x7f0000000080)="7b10", 0x3) writev(r3, &(0x7f00000000c0)=[{&(0x7f00000001c0)="89", 0x1}], 0x1) fcntl$addseals(r3, 0x409, 0x3) ftruncate(r3, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x21, 0x4) getsockname$inet6(r1, &(0x7f0000000900), &(0x7f0000000940)=0x1c) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000740)=0x2) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x80e4, 0x1) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000bc0)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)=ANY=[@ANYBLOB="e0000001ac1414aa5220e54d0000000076657468305f746f5f7465616d000000626f6e645f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000002e00022000000000000000000000000000009800d000000000000000000000000000000000000000000000000000380053455400000000000000000000000000000000000000000000000000000301000424050009050100021e020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00000000000000000000000000000000000000000000000000028004d41524b00000000000000000000000000000000000000000000000000020300000004000000ffffffff7f000001ffffffffffffffff76657468305f746f5f626f6e6400000069706464703000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000002e00014800000000000000000000000000009800c000000000000000000000000000000000000000000000000000280053594e50524f5859000000000000000000000000000000000000000000000d090900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000"], 0x1) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) bind$pptp(r0, &(0x7f0000000dc0)={0x18, 0x2, {0x0, @empty}}, 0x1e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@loopback, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000b80)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f0000001f40)={&(0x7f0000001fc0)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x5, 0x8001, 0x2, 0x8}]}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x40000000000017c, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000880)={'nat\x00', 0x0, 0x4, 0xef, [], 0x7, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000780)=""/239}, &(0x7f0000000240)=0x78) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000c00)={0x0, @in={{0x2, 0x4e21}}, 0x9, 0xffff}, &(0x7f0000000cc0)=0x90) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000d80)=0x3ff) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000d00)={r5, 0x5, 0x1ff, 0x58, 0xc000000000000000, 0xe15}, &(0x7f0000000d40)=0x14) [ 762.233202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b086d4 [ 762.240469] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000004 [ 762.304320] IPVS: Unknown mcast interface: syzkaller1 13:01:45 executing program 3 (fault-call:4 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'syzkaller1\x00'}, 0x18) 13:01:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f45cd05000000f8ae1d0000f4100000453a00000007000600000000000000274d83c69eb2624e"], 0x13) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000240)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000100)={0xffffffff}) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x400000000000, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 762.466216] FAULT_INJECTION: forcing a failure. [ 762.466216] name failslab, interval 1, probability 0, space 0, times 0 [ 762.521209] IPVS: Unknown mcast interface: syzkaller1 [ 762.581473] CPU: 0 PID: 29637 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 762.588949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.598306] Call Trace: [ 762.600897] dump_stack+0x244/0x39d [ 762.604530] ? dump_stack_print_info.cold.1+0x20/0x20 [ 762.609738] should_fail.cold.4+0xa/0x17 [ 762.613808] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 762.618913] ? __save_stack_trace+0x8d/0xf0 [ 762.623255] ? save_stack+0xa9/0xd0 [ 762.626889] ? save_stack+0x43/0xd0 [ 762.630520] ? find_held_lock+0x36/0x1c0 [ 762.634587] ? ib_unregister_mad_agent+0x1458/0x17a0 [ 762.639700] ? ib_unregister_mad_agent+0x1458/0x17a0 [ 762.644804] ? perf_trace_sched_process_exec+0x860/0x860 [ 762.650265] ? check_preemption_disabled+0x48/0x280 [ 762.655287] __should_failslab+0x124/0x180 [ 762.659536] should_failslab+0x9/0x14 [ 762.663339] kmem_cache_alloc_node_trace+0x270/0x740 [ 762.668450] __kmalloc_node_track_caller+0x3c/0x70 [ 762.673392] __kmalloc_reserve.isra.40+0x41/0xe0 [ 762.678153] __alloc_skb+0x155/0x770 [ 762.681888] ? netdev_alloc_frag+0x1f0/0x1f0 [ 762.686300] ? perf_trace_sched_process_exec+0x860/0x860 [ 762.691749] ? lock_downgrade+0x900/0x900 [ 762.695907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.701448] ? aa_label_sk_perm+0x91/0x100 [ 762.705685] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 762.710616] ? aa_sk_perm+0x22b/0x8e0 [ 762.714420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.719955] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 762.725517] netlink_sendmsg+0xb29/0xfc0 13:01:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, 0x10, 0x829, 0x0, 0x0, {0x3}, [@nested={0xc, 0x2, [@typed={0x8, 0x0, @str='\x00'}]}]}, 0x20}}, 0x0) [ 762.729587] ? netlink_unicast+0x760/0x760 [ 762.733821] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 762.738769] ? apparmor_socket_sendmsg+0x29/0x30 [ 762.743526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.749067] ? security_socket_sendmsg+0x94/0xc0 [ 762.753839] ? netlink_unicast+0x760/0x760 [ 762.758077] sock_sendmsg+0xd5/0x120 [ 762.761789] ___sys_sendmsg+0x51d/0x930 [ 762.765761] ? zap_class+0x640/0x640 [ 762.769493] ? copy_msghdr_from_user+0x580/0x580 [ 762.774243] ? get_pid_task+0xd6/0x1a0 [ 762.778135] ? find_held_lock+0x36/0x1c0 [ 762.782202] ? __might_fault+0x12b/0x1e0 [ 762.786270] ? lock_downgrade+0x900/0x900 [ 762.790428] ? perf_trace_sched_process_exec+0x860/0x860 [ 762.795889] __sys_sendmmsg+0x246/0x6d0 [ 762.799873] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 762.804191] ? __lock_is_held+0xb5/0x140 [ 762.808255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.813789] ? check_preemption_disabled+0x48/0x280 [ 762.818927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.824471] ? fput+0x130/0x1a0 [ 762.827750] ? do_syscall_64+0x9a/0x820 13:01:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=ANY=[@ANYBLOB='P\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00000000000000000800040000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x50}}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x109402, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) [ 762.831725] ? do_syscall_64+0x9a/0x820 [ 762.835699] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 762.840285] ? trace_hardirqs_on+0xbd/0x310 [ 762.844605] ? __ia32_sys_read+0xb0/0xb0 [ 762.848656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.854012] ? trace_hardirqs_off_caller+0x310/0x310 [ 762.859117] __x64_sys_sendmmsg+0x9d/0x100 [ 762.863343] do_syscall_64+0x1b9/0x820 [ 762.867219] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 762.872583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 762.877526] ? trace_hardirqs_off_thunk+0x1a/0x1c 13:01:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x6000000000000000, 'syzkaller1\x00'}, 0x18) [ 762.882371] ? trace_hardirqs_on_caller+0x310/0x310 [ 762.887388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 762.887405] ? prepare_exit_to_usermode+0x291/0x3b0 [ 762.887427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.897431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.897441] RIP: 0033:0x457569 [ 762.897466] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:01:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0xfffffffffffffffd) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0x2d0) [ 762.913191] IPVS: Unknown mcast interface: syzkaller1 [ 762.929595] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 762.929609] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 762.929617] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 762.929625] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.929633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 762.929641] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:46 executing program 3 (fault-call:4 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 763.119663] FAULT_INJECTION: forcing a failure. [ 763.119663] name failslab, interval 1, probability 0, space 0, times 0 [ 763.160358] CPU: 0 PID: 29669 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 763.167761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.177115] Call Trace: [ 763.179715] dump_stack+0x244/0x39d [ 763.183354] ? dump_stack_print_info.cold.1+0x20/0x20 [ 763.188565] should_fail.cold.4+0xa/0x17 [ 763.192631] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 763.197737] ? do_syscall_64+0x1b9/0x820 [ 763.201797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.207165] ? trace_hardirqs_off+0xb8/0x310 [ 763.211577] ? kasan_check_read+0x11/0x20 [ 763.215732] ? mark_held_locks+0x130/0x130 [ 763.215746] ? trace_hardirqs_off+0xb8/0x310 [ 763.215763] ? find_held_lock+0x36/0x1c0 [ 763.215790] ? rcu_read_lock_sched_held+0x14f/0x180 [ 763.224383] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.224409] __should_failslab+0x124/0x180 [ 763.224425] should_failslab+0x9/0x14 [ 763.224441] kmem_cache_alloc_node+0x26e/0x730 [ 763.251704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.257251] ? refcount_sub_and_test_checked+0x203/0x310 [ 763.262714] __alloc_skb+0x119/0x770 [ 763.266425] ? netdev_alloc_frag+0x1f0/0x1f0 [ 763.270829] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.276262] ? lock_downgrade+0x900/0x900 [ 763.280393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.285909] ? aa_label_sk_perm+0x91/0x100 [ 763.290128] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 763.295040] ? aa_sk_perm+0x22b/0x8e0 [ 763.298837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.304354] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 763.309873] netlink_sendmsg+0xb29/0xfc0 [ 763.313929] ? netlink_unicast+0x760/0x760 [ 763.318157] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 763.323067] ? apparmor_socket_sendmsg+0x29/0x30 [ 763.327804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.333323] ? security_socket_sendmsg+0x94/0xc0 [ 763.338063] ? netlink_unicast+0x760/0x760 [ 763.342295] sock_sendmsg+0xd5/0x120 [ 763.346001] ___sys_sendmsg+0x51d/0x930 [ 763.349964] ? zap_class+0x640/0x640 [ 763.353656] ? copy_msghdr_from_user+0x580/0x580 [ 763.358394] ? get_pid_task+0xd6/0x1a0 [ 763.362263] ? find_held_lock+0x36/0x1c0 [ 763.366310] ? __might_fault+0x12b/0x1e0 [ 763.370352] ? lock_downgrade+0x900/0x900 [ 763.374488] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.379928] __sys_sendmmsg+0x246/0x6d0 [ 763.383895] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 763.388198] ? __lock_is_held+0xb5/0x140 [ 763.392240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.397756] ? check_preemption_disabled+0x48/0x280 [ 763.402755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.408272] ? fput+0x130/0x1a0 [ 763.411528] ? do_syscall_64+0x9a/0x820 [ 763.415480] ? do_syscall_64+0x9a/0x820 [ 763.419432] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 763.423995] ? trace_hardirqs_on+0xbd/0x310 [ 763.428406] ? __ia32_sys_read+0xb0/0xb0 [ 763.432449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.437795] ? trace_hardirqs_off_caller+0x310/0x310 [ 763.442884] __x64_sys_sendmmsg+0x9d/0x100 [ 763.447102] do_syscall_64+0x1b9/0x820 [ 763.450976] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 763.456330] ? syscall_return_slowpath+0x5e0/0x5e0 [ 763.461245] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.466070] ? trace_hardirqs_on_caller+0x310/0x310 [ 763.471089] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 763.476098] ? prepare_exit_to_usermode+0x291/0x3b0 [ 763.481096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.485920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.491098] RIP: 0033:0x457569 [ 763.494276] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.513155] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 763.520842] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 763.528094] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 763.535345] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.542597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 763.549850] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:46 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, 0x0, 0x23d}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:01:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x3f000000, 'syzkaller1\x00'}, 0x18) 13:01:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8008700b, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4c}}) 13:01:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000f4100000f3d4a36f93279ee40408bd04d06a8c761ab8d6b8b235049801cdb766d9a1579ed39f8991d2341bfce8160b6542429590544b6886168433fbcf53689aad7692fab95cb0c52a5ba8f22ff22b713dc0d1933b9680da0c9ee31cb22bc5dddbd58ea2bbe740f3f5f796d6f9067d1856c0c730376655486fcbeab58d4d7f925da4d4d7"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f00000005c0)=""/100, &(0x7f0000000640)=0x64) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) setresuid(r3, r4, r5) r6 = getpgrp(0xffffffffffffffff) waitid(0x0, r6, 0x0, 0x80000000, &(0x7f0000000500)) read(r2, &(0x7f0000000080)=""/11, 0xb) 13:01:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000009c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) epoll_wait(r1, &(0x7f0000000500)=[{}], 0x1d2, 0xd) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0x14) fcntl$addseals(r0, 0x409, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x4010, r1, 0x0) timer_create(0x7, &(0x7f0000000400)={0x0, 0x30, 0x2, @thr={&(0x7f0000000180)="d40cbd7e0432f70a60c0390864147fac8ddd79b78c3887e995815689df7706f39ce9434fdf6c44b9", 0x0}}, 0x0) timer_delete(0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000740)=0x8002) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000004c0)=@assoc_id=0x0, &(0x7f00000005c0)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000600)={r2, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @loopback}, 0x1}}, 0xfffffffffffffffa, 0x0, 0x6, 0x8}, 0x0) unshare(0x40000000) getpid() tee(r0, r1, 0x5, 0xa) tee(r1, r0, 0x2, 0x3) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000780)=0x6, 0x4) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2e0402, 0x0) syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x8, 0x101000) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000000)=0x2b) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f00000007c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xe7) 13:01:46 executing program 3 (fault-call:4 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 763.615888] IPVS: Unknown mcast interface: syzkaller1 13:01:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x4000000, 'syzkaller1\x00'}, 0x18) [ 763.639957] FAULT_INJECTION: forcing a failure. [ 763.639957] name failslab, interval 1, probability 0, space 0, times 0 [ 763.660853] CPU: 0 PID: 29689 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 763.668245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.675074] IPVS: Unknown mcast interface: syzkaller1 [ 763.677595] Call Trace: [ 763.677620] dump_stack+0x244/0x39d 13:01:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x700, 'syzkaller1\x00'}, 0x18) [ 763.677641] ? dump_stack_print_info.cold.1+0x20/0x20 [ 763.677662] ? debug_smp_processor_id+0x1c/0x20 [ 763.677676] ? perf_trace_lock+0x14d/0x7a0 [ 763.677694] should_fail.cold.4+0xa/0x17 [ 763.703113] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 763.703130] ? __save_stack_trace+0x8d/0xf0 [ 763.703157] ? save_stack+0xa9/0xd0 [ 763.703171] ? save_stack+0x43/0xd0 [ 763.703187] ? find_held_lock+0x36/0x1c0 [ 763.703216] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.712340] ? check_preemption_disabled+0x48/0x280 13:01:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'syzkaller1\x00'}, 0x18) [ 763.712360] __should_failslab+0x124/0x180 [ 763.712379] should_failslab+0x9/0x14 [ 763.712393] kmem_cache_alloc_node_trace+0x270/0x740 [ 763.712415] __kmalloc_node_track_caller+0x3c/0x70 [ 763.747180] IPVS: Unknown mcast interface: syzkaller1 [ 763.751564] __kmalloc_reserve.isra.40+0x41/0xe0 [ 763.751585] __alloc_skb+0x155/0x770 [ 763.751605] ? netdev_alloc_frag+0x1f0/0x1f0 [ 763.751622] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.751644] ? lock_downgrade+0x900/0x900 [ 763.784106] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.789636] ? aa_label_sk_perm+0x91/0x100 [ 763.793870] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 763.798817] ? aa_sk_perm+0x22b/0x8e0 [ 763.802617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.808150] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 763.813698] netlink_sendmsg+0xb29/0xfc0 [ 763.817774] ? netlink_unicast+0x760/0x760 [ 763.822011] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 763.826959] ? apparmor_socket_sendmsg+0x29/0x30 [ 763.831722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:01:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x4, 'syzkaller1\x00'}, 0x18) [ 763.837272] ? security_socket_sendmsg+0x94/0xc0 [ 763.838733] IPVS: Unknown mcast interface: syzkaller1 [ 763.842030] ? netlink_unicast+0x760/0x760 [ 763.842050] sock_sendmsg+0xd5/0x120 [ 763.842068] ___sys_sendmsg+0x51d/0x930 [ 763.842083] ? zap_class+0x640/0x640 [ 763.842101] ? copy_msghdr_from_user+0x580/0x580 [ 763.842122] ? find_held_lock+0x36/0x1c0 [ 763.871725] ? __might_fault+0x12b/0x1e0 [ 763.875795] ? lock_downgrade+0x900/0x900 [ 763.879974] ? perf_trace_sched_process_exec+0x860/0x860 [ 763.880070] IPVS: Unknown mcast interface: syzkaller1 13:01:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f3281000002000000"], 0x13) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x726}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0x9, @mcast1, 0x1f}}}, 0x84) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {0x0}]}) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000003c0)={r3, 0x68}, 0x8) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r4, &(0x7f0000000140)=""/191}) execveat(r1, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x100) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) 13:01:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x500000000000000, 'syzkaller1\x00'}, 0x18) [ 763.885436] __sys_sendmmsg+0x246/0x6d0 [ 763.885479] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 763.885506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.885525] ? check_preemption_disabled+0x48/0x280 [ 763.909498] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.915055] ? fput+0x130/0x1a0 [ 763.918331] ? do_syscall_64+0x9a/0x820 [ 763.918346] ? do_syscall_64+0x9a/0x820 [ 763.918362] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 763.918378] ? trace_hardirqs_on+0xbd/0x310 [ 763.935171] ? __ia32_sys_read+0xb0/0xb0 [ 763.939241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.944610] ? trace_hardirqs_off_caller+0x310/0x310 [ 763.949724] __x64_sys_sendmmsg+0x9d/0x100 [ 763.953975] do_syscall_64+0x1b9/0x820 [ 763.957859] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 763.963220] ? syscall_return_slowpath+0x5e0/0x5e0 [ 763.968149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.970684] IPVS: Unknown mcast interface: syzkaller1 [ 763.972992] ? trace_hardirqs_on_caller+0x310/0x310 [ 763.973010] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 763.973026] ? prepare_exit_to_usermode+0x291/0x3b0 [ 763.973045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 763.973063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.003237] RIP: 0033:0x457569 [ 764.006437] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.025346] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 764.033032] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 764.040280] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 764.047530] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.054780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 764.062031] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 764.078079] QAT: Invalid ioctl [ 764.197386] IPVS: ftp: loaded support on port[0] = 21 13:01:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x200000000000000, 'syzkaller1\x00'}, 0x18) 13:01:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) 13:01:47 executing program 3 (fault-call:4 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:47 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x4d5, 0x0, 0xffffffffffffff2e, 0x0, 0x0, 0x1}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000000)="b411c2d708e95947ca506bb33e3dbb3ee2a106b36097eaa06e9021d59beb728fac0191789bfff9da222d625e084e84e4757b6f7012ee", 0x36}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) [ 764.447258] QAT: Invalid ioctl [ 764.509065] IPVS: Unknown mcast interface: syzkaller1 [ 764.521933] FAULT_INJECTION: forcing a failure. [ 764.521933] name failslab, interval 1, probability 0, space 0, times 0 [ 764.535377] IPVS: ftp: loaded support on port[0] = 21 [ 764.544265] CPU: 1 PID: 29744 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 764.551631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.551638] Call Trace: [ 764.551662] dump_stack+0x244/0x39d [ 764.551684] ? dump_stack_print_info.cold.1+0x20/0x20 [ 764.567223] should_fail.cold.4+0xa/0x17 [ 764.567242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 764.567258] ? do_syscall_64+0x1b9/0x820 [ 764.567270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.567285] ? trace_hardirqs_off+0xb8/0x310 [ 764.576492] ? kasan_check_read+0x11/0x20 [ 764.576519] ? mark_held_locks+0x130/0x130 [ 764.576533] ? trace_hardirqs_off+0xb8/0x310 [ 764.576551] ? find_held_lock+0x36/0x1c0 [ 764.576582] ? rcu_read_lock_sched_held+0x14f/0x180 [ 764.585688] ? perf_trace_sched_process_exec+0x860/0x860 [ 764.585729] __should_failslab+0x124/0x180 [ 764.585746] should_failslab+0x9/0x14 [ 764.595472] kmem_cache_alloc_node+0x26e/0x730 [ 764.595488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.595501] ? refcount_sub_and_test_checked+0x203/0x310 [ 764.595521] __alloc_skb+0x119/0x770 [ 764.603879] ? netdev_alloc_frag+0x1f0/0x1f0 [ 764.603896] ? perf_trace_sched_process_exec+0x860/0x860 [ 764.603912] ? lock_downgrade+0x900/0x900 [ 764.603934] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.612358] ? aa_label_sk_perm+0x91/0x100 [ 764.612382] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 764.612393] ? aa_sk_perm+0x22b/0x8e0 [ 764.612409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.622827] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 764.622846] netlink_sendmsg+0xb29/0xfc0 [ 764.622874] ? netlink_unicast+0x760/0x760 [ 764.630884] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 764.630901] ? apparmor_socket_sendmsg+0x29/0x30 [ 764.630916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.630928] ? security_socket_sendmsg+0x94/0xc0 [ 764.630944] ? netlink_unicast+0x760/0x760 [ 764.641014] sock_sendmsg+0xd5/0x120 [ 764.641031] ___sys_sendmsg+0x51d/0x930 [ 764.641044] ? zap_class+0x640/0x640 [ 764.641064] ? copy_msghdr_from_user+0x580/0x580 [ 764.641078] ? get_pid_task+0xd6/0x1a0 [ 764.641096] ? find_held_lock+0x36/0x1c0 [ 764.650233] ? __might_fault+0x12b/0x1e0 [ 764.650249] ? lock_downgrade+0x900/0x900 [ 764.650275] ? perf_trace_sched_process_exec+0x860/0x860 [ 764.660093] __sys_sendmmsg+0x246/0x6d0 [ 764.660117] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 764.660133] ? __lock_is_held+0xb5/0x140 [ 764.660155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.669891] ? check_preemption_disabled+0x48/0x280 [ 764.669918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 764.669933] ? fput+0x130/0x1a0 [ 764.669946] ? do_syscall_64+0x9a/0x820 [ 764.669961] ? do_syscall_64+0x9a/0x820 [ 764.679081] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 764.679099] ? trace_hardirqs_on+0xbd/0x310 [ 764.679113] ? __ia32_sys_read+0xb0/0xb0 [ 764.679129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.679143] ? trace_hardirqs_off_caller+0x310/0x310 [ 764.679163] __x64_sys_sendmmsg+0x9d/0x100 [ 764.688452] do_syscall_64+0x1b9/0x820 [ 764.688466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 764.688482] ? syscall_return_slowpath+0x5e0/0x5e0 [ 764.688495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.688519] ? trace_hardirqs_on_caller+0x310/0x310 [ 764.688535] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 764.698089] ? prepare_exit_to_usermode+0x291/0x3b0 [ 764.698108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.698127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.698138] RIP: 0033:0x457569 [ 764.698154] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.707267] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 764.707282] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 764.707290] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 764.707315] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.707324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 764.707333] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000009c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0)=0x2, 0x0) epoll_wait(r1, &(0x7f0000000500)=[{}], 0x1d2, 0xd) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0x14) fcntl$addseals(r0, 0x409, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x4010, r1, 0x0) timer_create(0x7, &(0x7f0000000400)={0x0, 0x30, 0x2, @thr={&(0x7f0000000180)="d40cbd7e0432f70a60c0390864147fac8ddd79b78c3887e995815689df7706f39ce9434fdf6c44b9", 0x0}}, 0x0) timer_delete(0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000740)=0x8002) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000004c0)=@assoc_id=0x0, &(0x7f00000005c0)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000600)={r2, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @loopback}, 0x1}}, 0xfffffffffffffffa, 0x0, 0x6, 0x8}, 0x0) unshare(0x40000000) getpid() tee(r0, r1, 0x5, 0xa) tee(r1, r0, 0x2, 0x3) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000780)=0x6, 0x4) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2e0402, 0x0) syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x8, 0x101000) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000000)=0x2b) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f00000007c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xe7) 13:01:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x6000000, 'syzkaller1\x00'}, 0x18) 13:01:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x80000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800000010000b0f000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000008a40cfc9c00e7644196cd7b61d1800120008000100677265000c0002006fbb0d2590b443d50b87babab4f2950800028000000000ac7d9cd83ba7cdc86f8986fe00"], 0x38}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000000c0)={r2, r0, 0x5, 0x1, &(0x7f0000000240)="c6008e3c607c3c73f2c6f3045bc03d6a8bd6db090a7ce54d860cabf12ce3370bb30be3d960816093aa3105612d697dcc42fa45a142529c4800511616fb95925812a101006d3fe71013177769434c14d845d92cb96673069fe8b911b95b21a8b59a11b9eb6209e7bf364630641623ccc7fe7f04b2c2aa83b4bc3f0c12a7fb9cb24c25b0334ec4d3", 0xaa3, 0xfffffffffffff001, 0x3399, 0xfff, 0x1, 0x3, 0x10001, "3ac4ab39557ffb1f77270e72a5c4bebd3f835c09a90e03da9e0c"}) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:49 executing program 3 (fault-call:4 fault-nth:47): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454cb785977584d7166b8debdbb53e000000"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:01:49 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000140)={0x6dc, {0x5, 0x180000000000, 0x3, 0x25bb426a, 0x100000000, 0xfffffffffffffffc}}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000005, 0x24010, r1, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:01:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46f3fffff3100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f0000000080)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000140)={r4, 0x1}) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 766.411435] FAULT_INJECTION: forcing a failure. [ 766.411435] name failslab, interval 1, probability 0, space 0, times 0 [ 766.430501] IPVS: Unknown mcast interface: syzkaller1 [ 766.432318] CPU: 1 PID: 29757 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 766.443085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.452435] Call Trace: [ 766.452461] dump_stack+0x244/0x39d 13:01:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x20000000, 'syzkaller1\x00'}, 0x18) [ 766.452483] ? dump_stack_print_info.cold.1+0x20/0x20 [ 766.452510] should_fail.cold.4+0xa/0x17 [ 766.452532] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 766.473062] ? __save_stack_trace+0x8d/0xf0 [ 766.477411] ? save_stack+0xa9/0xd0 [ 766.481052] ? save_stack+0x43/0xd0 [ 766.484698] ? find_held_lock+0x36/0x1c0 [ 766.488810] ? perf_trace_sched_process_exec+0x860/0x860 [ 766.494285] ? check_preemption_disabled+0x48/0x280 [ 766.499328] __should_failslab+0x124/0x180 [ 766.499465] QAT: Invalid ioctl [ 766.503573] should_failslab+0x9/0x14 13:01:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x8000}, @in6={0xa, 0x4e21, 0x401, @ipv4={[], [], @empty}, 0xfffffffffffffffe}, @in6={0xa, 0x4e21, 0x7, @mcast1, 0x3}], 0x64) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)=""/215, 0xd7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) [ 766.503591] kmem_cache_alloc_node_trace+0x270/0x740 [ 766.503615] __kmalloc_node_track_caller+0x3c/0x70 [ 766.520623] __kmalloc_reserve.isra.40+0x41/0xe0 [ 766.525398] __alloc_skb+0x155/0x770 [ 766.529131] ? netdev_alloc_frag+0x1f0/0x1f0 [ 766.533557] ? perf_trace_sched_process_exec+0x860/0x860 [ 766.539019] ? lock_downgrade+0x900/0x900 [ 766.543195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.547390] IPVS: Unknown mcast interface: syzkaller1 [ 766.548759] ? aa_label_sk_perm+0x91/0x100 [ 766.548781] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 766.548796] ? aa_sk_perm+0x22b/0x8e0 [ 766.548812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.548830] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 766.566391] __nla_parse: 14 callbacks suppressed [ 766.566400] netlink: 24 bytes leftover after parsing attributes in process `syz-executor1'. [ 766.566971] netlink_sendmsg+0xb29/0xfc0 [ 766.566992] ? netlink_unicast+0x760/0x760 [ 766.567009] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 766.604434] ? apparmor_socket_sendmsg+0x29/0x30 [ 766.609182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.614709] ? security_socket_sendmsg+0x94/0xc0 [ 766.619458] ? netlink_unicast+0x760/0x760 [ 766.623691] sock_sendmsg+0xd5/0x120 [ 766.627397] ___sys_sendmsg+0x51d/0x930 [ 766.631366] ? zap_class+0x640/0x640 [ 766.635074] ? copy_msghdr_from_user+0x580/0x580 [ 766.639828] ? get_pid_task+0xd6/0x1a0 [ 766.643708] ? find_held_lock+0x36/0x1c0 [ 766.647801] ? __might_fault+0x12b/0x1e0 [ 766.651855] ? lock_downgrade+0x900/0x900 [ 766.656007] ? perf_trace_sched_process_exec+0x860/0x860 [ 766.661460] __sys_sendmmsg+0x246/0x6d0 [ 766.665431] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 766.669760] ? __lock_is_held+0xb5/0x140 [ 766.673816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.679345] ? check_preemption_disabled+0x48/0x280 [ 766.684364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 766.689890] ? fput+0x130/0x1a0 [ 766.693163] ? do_syscall_64+0x9a/0x820 [ 766.697126] ? do_syscall_64+0x9a/0x820 [ 766.701093] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 766.705667] ? trace_hardirqs_on+0xbd/0x310 [ 766.709978] ? __ia32_sys_read+0xb0/0xb0 [ 766.714029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.719382] ? trace_hardirqs_off_caller+0x310/0x310 [ 766.724482] __x64_sys_sendmmsg+0x9d/0x100 [ 766.728708] do_syscall_64+0x1b9/0x820 [ 766.732596] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 766.737953] ? syscall_return_slowpath+0x5e0/0x5e0 [ 766.742873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.747709] ? trace_hardirqs_on_caller+0x310/0x310 [ 766.752738] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 766.757758] ? prepare_exit_to_usermode+0x291/0x3b0 [ 766.762775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.767622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.772803] RIP: 0033:0x457569 [ 766.775986] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.794875] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 766.802573] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:01:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'oyzkaller1\x00'}, 0x18) [ 766.809861] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 766.817123] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 766.824385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 766.831643] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 766.853296] netlink: 24 bytes leftover after parsing attributes in process `syz-executor1'. 13:01:50 executing program 3 (fault-call:4 fault-nth:48): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 766.908235] FAULT_INJECTION: forcing a failure. [ 766.908235] name failslab, interval 1, probability 0, space 0, times 0 [ 766.952038] IPVS: Unknown mcast interface: oyzkaller1 [ 766.967688] CPU: 0 PID: 29793 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 766.975100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.984462] Call Trace: [ 766.987070] dump_stack+0x244/0x39d [ 766.990740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 766.995957] should_fail.cold.4+0xa/0x17 [ 767.000039] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 767.005160] ? do_syscall_64+0x1b9/0x820 [ 767.009232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.011965] IPVS: ftp: loaded support on port[0] = 21 [ 767.014601] ? trace_hardirqs_off+0xb8/0x310 [ 767.014618] ? kasan_check_read+0x11/0x20 [ 767.014646] ? mark_held_locks+0x130/0x130 [ 767.014660] ? trace_hardirqs_off+0xb8/0x310 [ 767.014683] ? find_held_lock+0x36/0x1c0 [ 767.014703] ? __ib_umem_release+0x568/0xa70 [ 767.014748] ? rcu_read_lock_sched_held+0x14f/0x180 [ 767.050564] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.056035] __should_failslab+0x124/0x180 [ 767.060282] should_failslab+0x9/0x14 [ 767.064092] kmem_cache_alloc_node+0x26e/0x730 [ 767.068689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.074258] ? refcount_sub_and_test_checked+0x203/0x310 [ 767.080254] __alloc_skb+0x119/0x770 [ 767.083981] ? netdev_alloc_frag+0x1f0/0x1f0 [ 767.088396] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.088414] ? lock_downgrade+0x900/0x900 [ 767.088438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.088456] ? aa_label_sk_perm+0x91/0x100 [ 767.088476] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 767.088492] ? aa_sk_perm+0x22b/0x8e0 [ 767.088508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.088523] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 767.088542] netlink_sendmsg+0xb29/0xfc0 [ 767.088562] ? netlink_unicast+0x760/0x760 [ 767.116608] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 767.116627] ? apparmor_socket_sendmsg+0x29/0x30 [ 767.116643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:01:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '%yzkaller1\x00'}, 0x18) [ 767.116659] ? security_socket_sendmsg+0x94/0xc0 [ 767.116674] ? netlink_unicast+0x760/0x760 [ 767.116693] sock_sendmsg+0xd5/0x120 [ 767.116729] ___sys_sendmsg+0x51d/0x930 [ 767.116743] ? zap_class+0x640/0x640 [ 767.116762] ? copy_msghdr_from_user+0x580/0x580 [ 767.127816] ? get_pid_task+0xd6/0x1a0 [ 767.127837] ? find_held_lock+0x36/0x1c0 [ 767.127861] ? __might_fault+0x12b/0x1e0 [ 767.127878] ? lock_downgrade+0x900/0x900 [ 767.127909] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.127936] __sys_sendmmsg+0x246/0x6d0 [ 767.127960] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 767.127977] ? __lock_is_held+0xb5/0x140 [ 767.136255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.136274] ? check_preemption_disabled+0x48/0x280 [ 767.136303] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.136319] ? fput+0x130/0x1a0 [ 767.136335] ? do_syscall_64+0x9a/0x820 [ 767.136349] ? do_syscall_64+0x9a/0x820 [ 767.136367] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 767.146028] ? trace_hardirqs_on+0xbd/0x310 [ 767.146042] ? __ia32_sys_read+0xb0/0xb0 [ 767.146057] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.146075] ? trace_hardirqs_off_caller+0x310/0x310 [ 767.146097] __x64_sys_sendmmsg+0x9d/0x100 [ 767.146116] do_syscall_64+0x1b9/0x820 [ 767.146129] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 767.146147] ? syscall_return_slowpath+0x5e0/0x5e0 [ 767.156412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.156430] ? trace_hardirqs_on_caller+0x310/0x310 [ 767.156447] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 767.156464] ? prepare_exit_to_usermode+0x291/0x3b0 [ 767.156486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.156508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.156520] RIP: 0033:0x457569 [ 767.156536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.156544] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 767.156565] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 767.164484] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 767.164493] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 767.164502] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 767.164511] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 767.405679] IPVS: Unknown mcast interface: %yzkaller1 13:01:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000180)={0x8001, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @broadcast}, 0x8, 0x3ff, 0x1, 0xe97f261, 0x1000, &(0x7f0000000140)='bond0\x00', 0x7, 0xffffffffffffffc1, 0x6}) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000001700)=""/249, 0x306}], 0x1, 0x100000000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x20000000) unshare(0x22020000) get_thread_area(0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x3, 0x1f, 0x10001, 0x41}, {0x0, 0x6, 0x1, 0x6}, {0x8, 0x6, 0x4, 0x101}, {0x1f, 0xf2c, 0x73dc, 0x8}, {0x7, 0xcd4a, 0xd90, 0x2}, {0xfff, 0x10000, 0x4, 0x7fffffff}, {0x0, 0x9, 0x0, 0xfffffffffffffff7}]}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 13:01:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r1, r0}) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000001c0)={@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x20000}, {&(0x7f0000000100)=""/135, 0x87}, &(0x7f0000000040), 0x8}, 0xa0) 13:01:50 executing program 3 (fault-call:4 fault-nth:49): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:50 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfffffe74, 0x0, 0xffffffffffffff63}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x8200) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x4, 0x4) close(r0) socket$kcm(0xa, 0x2, 0x0) sysfs$2(0x2, 0x400, &(0x7f00000002c0)=""/222) sendmsg(r1, &(0x7f0000000280)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:01:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '*yzkaller1\x00'}, 0x18) [ 767.506438] FAULT_INJECTION: forcing a failure. [ 767.506438] name failslab, interval 1, probability 0, space 0, times 0 [ 767.520308] IPVS: Unknown mcast interface: *yzkaller1 [ 767.528706] CPU: 1 PID: 29815 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 767.536096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.545453] Call Trace: [ 767.548060] dump_stack+0x244/0x39d [ 767.551728] ? dump_stack_print_info.cold.1+0x20/0x20 [ 767.556950] should_fail.cold.4+0xa/0x17 [ 767.561020] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 767.566119] ? __save_stack_trace+0x8d/0xf0 [ 767.570442] ? save_stack+0xa9/0xd0 [ 767.574074] ? save_stack+0x43/0xd0 [ 767.577736] ? find_held_lock+0x36/0x1c0 [ 767.581809] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.587258] ? check_preemption_disabled+0x48/0x280 [ 767.592276] __should_failslab+0x124/0x180 [ 767.596504] should_failslab+0x9/0x14 [ 767.600295] kmem_cache_alloc_node_trace+0x270/0x740 [ 767.605394] __kmalloc_node_track_caller+0x3c/0x70 [ 767.610315] __kmalloc_reserve.isra.40+0x41/0xe0 [ 767.615064] __alloc_skb+0x155/0x770 [ 767.618778] ? netdev_alloc_frag+0x1f0/0x1f0 [ 767.623181] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.628641] ? lock_downgrade+0x900/0x900 [ 767.632813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.638358] ? aa_label_sk_perm+0x91/0x100 [ 767.642595] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 767.647525] ? aa_sk_perm+0x22b/0x8e0 [ 767.651330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:01:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000240)=""/109) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46008970f4100000000200000003003eebc3c302843404db19ab4928c4d0658a9be9056ee94f2d4e1709382e5a6a5d269a3b56f510c46cbbb3eab85b37866ec0162e347d745db34851152396a26f74b7d63616d01ff1d6753f6045e978be33a8366bb001d4042f89bff2899ae2041b9c8e7018129478254c471a5d4ad4cc29e9b7c60c84250a6182dfa7c94f8dfc8886f72b0d0c85ecb7cce8dca54b514da556c947c6675bd30e9ff10e3c9e1f31af506b7b2b6d4e1c9de7e2bb2e2de9c6d9d961c22a755bae682fd4b1d3942b39b2885462ba4162321e4cdffc14ad"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) [ 767.656859] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 767.662404] netlink_sendmsg+0xb29/0xfc0 [ 767.666488] ? netlink_unicast+0x760/0x760 [ 767.670736] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 767.675701] ? apparmor_socket_sendmsg+0x29/0x30 [ 767.680472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.680489] ? security_socket_sendmsg+0x94/0xc0 [ 767.680505] ? netlink_unicast+0x760/0x760 [ 767.680525] sock_sendmsg+0xd5/0x120 [ 767.680544] ___sys_sendmsg+0x51d/0x930 [ 767.690817] ? zap_class+0x640/0x640 13:01:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback, 0x0}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_DROP(0x18, 0x20) r3 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="7f4547000001000000000000000003003e6be6a7f1e8c7792be477f83553a32ffd6ea1805f5082f957fb6048a550756a2a1bb61ff3a9b05ae219cddf55099fa2dcc56496ba0b09de2d78023621cde872d747f8a4ef9514d514f6e83279f23d9cd98b7a2790a3b0e14892e89d2e595f138385be0caabc7a1d991e2923207bed09a88118c727e296e4ca468c839c317ec78dd51998908359ecac89b421b9546dcbcd"], 0x13) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local, r2}, 0x14) r4 = accept(r3, 0x0, &(0x7f0000000100)) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000180)={'ip6_vti0\x00', {0x2, 0x4e22, @loopback}}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000140)) [ 767.690839] ? copy_msghdr_from_user+0x580/0x580 [ 767.690859] ? get_pid_task+0xd6/0x1a0 [ 767.690878] ? find_held_lock+0x36/0x1c0 [ 767.690902] ? __might_fault+0x12b/0x1e0 [ 767.723260] ? lock_downgrade+0x900/0x900 [ 767.727436] ? perf_trace_sched_process_exec+0x860/0x860 [ 767.732913] __sys_sendmmsg+0x246/0x6d0 [ 767.736910] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 767.741252] ? __lock_is_held+0xb5/0x140 [ 767.745334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.750889] ? check_preemption_disabled+0x48/0x280 [ 767.755924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.755941] ? fput+0x130/0x1a0 [ 767.755958] ? do_syscall_64+0x9a/0x820 [ 767.755972] ? do_syscall_64+0x9a/0x820 [ 767.755989] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 767.768757] ? trace_hardirqs_on+0xbd/0x310 [ 767.768774] ? __ia32_sys_read+0xb0/0xb0 [ 767.768791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.768808] ? trace_hardirqs_off_caller+0x310/0x310 [ 767.768829] __x64_sys_sendmmsg+0x9d/0x100 [ 767.768846] do_syscall_64+0x1b9/0x820 13:01:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000180)={@loopback}, &(0x7f00000001c0)=0x2fe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'veth0\x00', &(0x7f00000006c0)=@ethtool_per_queue_op={0x4b, 0x400, [0x101, 0x5, 0x9, 0x2, 0x7fff, 0x1, 0x58, 0x0, 0x5, 0x4, 0x401, 0x5, 0x4, 0xfb7b, 0x1b38, 0x8561, 0xfa0, 0x1ff, 0x8, 0xea39, 0xfffffffffffffffc, 0x5, 0x9, 0xff, 0x1, 0x8, 0xffffffff, 0x7, 0x59, 0x20, 0x9, 0x73, 0xa3, 0x100000000, 0xdb03, 0x22, 0xfffffffffffffffb, 0xfffffffffffff8c5, 0x10000, 0x6, 0x400, 0x8, 0x8, 0xd5b40000000000, 0x3527, 0x9, 0x9, 0x6, 0x0, 0x2, 0x5, 0x3, 0x1, 0x0, 0x7, 0x7, 0x101, 0x200, 0x0, 0x9, 0x1000, 0x4, 0xaf, 0x3, 0x400, 0x7f, 0xfffffffffffffff7, 0x40, 0x200, 0x8, 0x400, 0x3, 0x3, 0x8, 0x5, 0x1, 0x101, 0x10000, 0x400, 0x3, 0x100000001, 0xffff, 0x6, 0x5, 0x4, 0x0, 0xffff, 0x80000000, 0x0, 0x101, 0x4127, 0xfffffffffffffffb, 0x6, 0x8, 0xd07, 0x1, 0x3, 0x7fffffff, 0x100, 0x0, 0x9, 0x32, 0x0, 0x1, 0x400000008000000, 0x7, 0x6, 0xc224, 0x3, 0x3, 0x3, 0x338f, 0x8, 0x9, 0x7, 0x81, 0x3, 0x8, 0x100000001, 0xfff, 0xffff, 0x9, 0x7, 0x1000, 0x1ff, 0x2, 0x80000000, 0x1, 0x3, 0x0, 0x1, 0x8, 0xd079, 0x40, 0x2a1ed9d1, 0x3, 0x80000000, 0x8001, 0x6, 0x7f, 0x1, 0xfff, 0x2, 0xf83f, 0x6, 0x0, 0x5, 0x1, 0x5, 0x40, 0x3, 0x81, 0xfffffffffffffff7, 0x2, 0x0, 0x2, 0x800, 0x7, 0x0, 0x4, 0x9c, 0x8001, 0x558b, 0x0, 0x9, 0x7, 0x80000001, 0x8a, 0x9, 0x4, 0xffffffffffffbee0, 0x8000, 0x5, 0x6, 0xb0e, 0x4, 0x6, 0x8, 0x0, 0xa413, 0x3, 0x0, 0x7, 0x2, 0x6, 0x8, 0x419a, 0x1, 0x7f, 0x5, 0x6, 0x7, 0x3d, 0x259c00000, 0x92, 0x5, 0x230a74a, 0x0, 0x9, 0x100000001, 0x9, 0xfffffffffffffff9, 0x10000, 0x9, 0x4, 0x40, 0x3, 0x1, 0x6, 0x80000001, 0x8001, 0x0, 0x0, 0x6, 0x4, 0x7b3, 0x8, 0x1, 0x6, 0x2, 0x1, 0x8, 0x2, 0x20, 0x8001, 0x400, 0x5, 0x2, 0x4, 0x8, 0x2, 0x3, 0x100000000, 0x9, 0x100000001, 0x800, 0xffff, 0x9, 0xff, 0x9, 0xe06a, 0x3f, 0x4b65c134, 0x3f, 0x2, 0x5, 0x5, 0x2, 0x8001, 0xfffffffffffffffc, 0x20, 0x9, 0x18000000000000, 0x5671, 0x4, 0x7, 0x0, 0x8, 0x5, 0x84, 0x5, 0x2, 0x5, 0x2, 0x4, 0xfffffffffffffa83, 0x100000001, 0xffffffff, 0xc022, 0x9bc, 0x9, 0x9, 0x0, 0x29, 0x8, 0x4, 0xac, 0x100, 0x9, 0x2, 0x9, 0x4, 0xdbab, 0x4, 0x9, 0x830c, 0x665, 0x6, 0x107720f3, 0x0, 0x7, 0x5, 0xfffffffffffffffd, 0x6, 0x6, 0x6, 0x3ff, 0x4, 0x81, 0xf4ee, 0x7, 0x6, 0x3, 0x4, 0x1, 0x100000000, 0x74f009b2, 0x8, 0x48, 0x1, 0x4, 0x60000000000, 0x5, 0x1, 0x1, 0x1, 0x6, 0x800, 0x6, 0x1c, 0x2, 0x2, 0x3, 0x3, 0x2, 0x3, 0x8000, 0x2c, 0x8, 0x100000000, 0x20, 0x0, 0x6, 0x8000, 0xfffffffffffffc00, 0xfff, 0x6, 0x80000001, 0x5, 0xffffffff, 0xf238, 0x5, 0x3f, 0x374, 0xc60, 0xbbf5, 0x100000000000000, 0x40, 0x0, 0x9, 0x430a, 0x0, 0x8, 0x4c78, 0xfffffffffffffffe, 0xfffffffffffeffff, 0xf000000000000000, 0x1aba45a2, 0x1, 0x0, 0x80, 0x5, 0x1, 0x5, 0x8, 0x4cf, 0x800, 0x7fff, 0xfffffffffffffffe, 0x3, 0x0, 0x8, 0xc1a, 0x1ff, 0xfb, 0x3, 0x5, 0x81, 0x672e, 0x3ff, 0x9, 0x9, 0x10001, 0x9, 0x4, 0x0, 0x181, 0x400, 0x5, 0x7fa, 0x3, 0xffffffff, 0xf4a, 0x4, 0x3, 0xe0, 0x2, 0x5, 0xf0ef, 0x7, 0x8, 0x400, 0x1, 0x4, 0x1, 0x2000000000000, 0x3, 0x7f, 0x80000, 0x6, 0x7f, 0x3, 0x20000000000, 0xff, 0x0, 0x5, 0x4, 0x4, 0x8, 0x4, 0x3f, 0x2, 0x4, 0x3, 0x3, 0x101, 0x3, 0x6, 0x9, 0x6, 0x8, 0x1, 0x0, 0x7, 0x5, 0x3909, 0x8000, 0x43, 0x7fff, 0x6, 0x8, 0x0, 0x5a7, 0x8, 0x7, 0x7, 0x2, 0xf98, 0x80000001, 0x5, 0x3, 0x2, 0x2, 0xffffffff80000000, 0x20, 0x400, 0x3, 0x4, 0x3, 0x3f, 0x6, 0x1, 0x7, 0x4, 0x7fff, 0x5, 0xffffffffffffdb7c, 0x9, 0x5cd, 0x3, 0x5, 0x5, 0x3, 0x5, 0xffff, 0x8001, 0x1, 0x6, 0x9, 0x0, 0x4, 0x4, 0x2, 0x3, 0x3, 0x80000000, 0x9, 0x80000001, 0x7fffffff, 0x3f, 0x1, 0x80, 0x4, 0x401, 0x100, 0x1, 0x80000001, 0x5, 0x9, 0x0, 0x7, 0x400, 0xff, 0x5, 0x0, 0x2, 0x200, 0xfffffffffffffffe, 0x6, 0x9, 0x80, 0xe4c, 0x4, 0x2, 0x72fac342, 0x1f, 0x7, 0x2, 0x0, 0x9, 0x6, 0xbc8, 0x0, 0x2, 0x7ff, 0x8bb, 0x80000000, 0x9, 0x100, 0x10000, 0x7, 0x7, 0x2, 0xef, 0x9, 0x2b, 0x2, 0x7fff, 0x7, 0x6, 0x7, 0x4, 0xffffffffffff1329, 0x2, 0x100000000, 0x3, 0x90000000000000, 0x1, 0x6, 0x851e, 0x80000001, 0x20, 0x7, 0x9, 0x101, 0x400, 0x80000001, 0x101, 0xfff, 0xfffffffffffffffe, 0x3, 0x1, 0x6c4, 0x458, 0xe7, 0x1000, 0xfffffffffffffffc, 0x3, 0x8, 0x46, 0x10000, 0xfe3, 0x7fffffff, 0x8, 0x40, 0x2, 0x400, 0x200, 0x81, 0x7, 0x313, 0x5, 0x6a54, 0x5, 0xfffffffffffffff7, 0x1, 0x20, 0x95, 0x7, 0x80000001, 0x9, 0x2, 0x6, 0x401, 0x1, 0x0, 0x7ff, 0x401, 0x7eb4762d, 0x0, 0x9, 0x0, 0x9, 0x1, 0xffffffffffffffc5, 0x3, 0x8, 0x10001, 0x101, 0x7, 0x5, 0x4, 0xcf6, 0x10000, 0x401, 0x0, 0x1, 0x80, 0x0, 0x1, 0x9, 0x20, 0x8, 0x2, 0x1, 0x2, 0x4, 0x4, 0x8, 0x9, 0x0, 0x448, 0x3, 0x7, 0x4, 0xfffffffffffffff7, 0x7f, 0x4, 0x80000000, 0x100, 0x100, 0x3, 0x6, 0x40, 0x8, 0x1, 0x7, 0x7, 0x5b, 0x3, 0x400, 0x1000, 0x5, 0xb2, 0x8, 0x1, 0x8, 0x3f, 0x3, 0x8, 0x8a, 0xfffffffffffff5e1, 0x5223, 0xec75, 0x6, 0x8, 0x8, 0x0, 0x5, 0x800, 0x9, 0x67, 0x0, 0xfff0000000, 0x9, 0x401, 0x9, 0x5, 0x5, 0x40, 0x1, 0xb5, 0x7fff, 0x0, 0x4, 0x0, 0x80000001, 0x7, 0x7, 0x4, 0x81, 0x0, 0x3ff, 0xfffffffffffffffe, 0x171, 0x0, 0x3, 0x7, 0x6, 0x10001, 0x3ff, 0x254, 0x8, 0x2, 0xfffffffffffffffb, 0x8000, 0x1, 0x4000000000, 0x7c1, 0x4fa0, 0x8, 0x9, 0xff, 0x20, 0x2, 0x7, 0x61a2, 0x1ff, 0xff, 0x70e, 0x8001, 0x81, 0x3db4f0a7, 0xd8f, 0xffffffffffff0000, 0x1, 0x6, 0x6, 0x5, 0x8, 0xddd, 0x400, 0x0, 0xff, 0x10000, 0x6, 0x40, 0xac, 0xf107, 0x6, 0x3, 0x200, 0x2, 0x10000, 0x4b8, 0x7, 0x4, 0xbaa7, 0x5, 0x7fffffff, 0x0, 0xed, 0x1000, 0x7, 0x54a, 0x527, 0x2f080, 0x0, 0x7fffffff, 0x2b3, 0x7ff, 0x9c75, 0xc8c, 0x5, 0x2, 0x4, 0x29, 0x6, 0xffffffffffffa160, 0x2, 0x1, 0x2, 0x0, 0x0, 0x40, 0x6, 0x5, 0x1, 0xffffffff80000000, 0x80000000, 0x81, 0x1, 0xfb83, 0x9, 0x8, 0x6, 0x1, 0x0, 0x4, 0x5, 0x2, 0x7fffffff, 0x1, 0x1ff, 0x200, 0x9, 0x2, 0x1, 0xfff, 0x5, 0x10000, 0x1, 0x0, 0x0, 0xffff, 0x7fffffff, 0x1, 0xfffffffffffffffa, 0x9cf4, 0xfff, 0x8, 0xffffffffffffffff, 0x1, 0x5, 0xffffffffffffffc0, 0x80000001, 0x6, 0x0, 0x5, 0x4, 0x1, 0x7, 0x7, 0xfff, 0x4, 0xffffffffffffffc1, 0x3, 0x2884, 0x469, 0x9, 0x400, 0x58e28562, 0x2, 0x4, 0x1e, 0xff, 0x5, 0x200, 0x1f, 0x8001, 0x1, 0x8, 0xff, 0x4, 0x7, 0xffffffffffffbfeb, 0xff, 0x7fff, 0x14, 0x1, 0xfffffffffffffff8, 0x8, 0x8001, 0x2, 0x4, 0x10000, 0x7f, 0x0, 0xed, 0x80000000, 0x8, 0x9, 0x4, 0x0, 0x5, 0x7, 0xfffffffffffffffc, 0xfffffffffffffff9, 0x4c, 0x3, 0x0, 0xffffffff80000000, 0x6, 0x82700000, 0x4, 0x5, 0xa430, 0x1, 0x9c4e, 0x7, 0x4, 0x1ff, 0x59b, 0x7f, 0x101, 0x3a, 0x20, 0x49d1, 0xb7a1, 0x5, 0x3, 0x10000, 0x2, 0x1e42e72f, 0x1000000000, 0x7e, 0x4, 0x3f, 0xea, 0x7, 0x4, 0x26c7, 0x8001, 0x4, 0x3, 0x3, 0x7, 0x1, 0xfffffffffffffff7, 0x7fff, 0x100, 0xfffffffffffffffd, 0x1, 0xff, 0x3, 0x100000001, 0x9, 0x3f, 0x7fffffff, 0x0, 0x8, 0x2, 0x5, 0x800, 0x100000000, 0x0, 0x6, 0x96, 0x10001, 0x9, 0x2, 0x0, 0x1, 0xc43b, 0xfffffffffffffff8, 0x7, 0x75c, 0xd36f, 0x6, 0x4, 0x20, 0x2, 0x3f, 0x7f, 0xbf29, 0x1, 0x81, 0x7, 0x5, 0x0, 0xfffffffffffffff7, 0xffffffff, 0x5, 0x81, 0x1, 0x1d03, 0x3, 0x9, 0x9, 0x0, 0xdb, 0x94, 0x6, 0x2a7c, 0x7fff, 0x12, 0x6, 0x8001, 0x0, 0x4, 0x3, 0x3, 0x9, 0x0, 0x6, 0xa4, 0x0, 0x7f, 0x10000, 0xea, 0x80000001, 0x7, 0x1, 0x3, 0x7, 0x9, 0xcd87, 0x66f6, 0x8cd, 0x7fffffff, 0x2, 0x400, 0x2, 0x5, 0xffffffffffffffff, 0x72, 0x81, 0x3, 0x8d2, 0x8001, 0xc8a, 0x2, 0x68, 0x0, 0x86, 0x9, 0x100000001, 0x20, 0xffffffff, 0x4dc, 0x7, 0x9, 0x8001, 0x1000, 0x81, 0x584c, 0xe35, 0x10001, 0x5, 0x9, 0x3, 0x3, 0x80000000, 0x6, 0x2, 0x8, 0xaede, 0xef1d, 0xfffffffffffffff9, 0x6ee2, 0x6b3, 0x5, 0x27ca610d, 0x8, 0x7, 0x10000, 0x10000, 0x400, 0x0, 0x984, 0x3, 0x80, 0x100, 0x0, 0x3, 0xae6, 0x7fffffff, 0x1c76, 0xffffffff, 0x8, 0x6, 0x0, 0x163, 0x533, 0x7, 0x7, 0x494, 0x2, 0x20, 0x5, 0x745, 0x1, 0x0, 0x9, 0x6, 0x2, 0x4, 0x3, 0xffffffffffffffff, 0x5, 0x401, 0x40, 0x6, 0x0, 0x5, 0x0, 0x590f, 0x2, 0x3, 0x8, 0xb23, 0x7, 0x0, 0x9, 0x2, 0x81, 0x9, 0x6, 0xfff, 0xffffffff00000001, 0x3, 0x9, 0xff, 0x3, 0x7, 0x4, 0xc851, 0x0, 0x5, 0x1, 0x7, 0x2, 0x727e, 0xd5cf, 0x3a, 0x9, 0x4, 0x0, 0x10000, 0x81, 0xa2, 0x2, 0x7, 0xffff, 0x1ff, 0x7, 0x7, 0x3, 0x4d, 0x1ff, 0x8, 0x3, 0x789, 0x2d, 0x4, 0x6, 0x7, 0x5, 0x0, 0x3f, 0x6, 0x1, 0x1, 0x7, 0x6, 0x3b, 0x0, 0x10000, 0x3f, 0xff, 0x3, 0x0, 0x1, 0x4, 0x0, 0x8, 0x5, 0x391, 0x7fff, 0xfffffffffffffffa, 0x1, 0x8, 0x9, 0x2, 0x7ff, 0x100, 0xc6, 0x7268, 0x5, 0x800, 0x6, 0x3ff, 0x7fff, 0xc660, 0xf428, 0x3, 0x6, 0xff, 0x6, 0x1c90, 0x6, 0x9, 0x1, 0x7, 0x20, 0x200, 0x2, 0x0, 0x62, 0x81, 0xfffffffffffeffff, 0x5, 0x3, 0xb5, 0xc0, 0x2, 0x1, 0xfffffffffffff5f7, 0xbc, 0x20, 0x401, 0x8, 0x2, 0x1, 0xffffffffffffffff, 0x8, 0x4, 0x7, 0x0, 0x5, 0x1fe5, 0xe5, 0x0, 0x80, 0x81, 0x3, 0xd07, 0x9f, 0xbf02, 0x0, 0x3, 0x1, 0x7, 0x101, 0x6ac0, 0xfffffffffffffc01, 0xab4, 0x1ff, 0x9, 0xe165, 0x0, 0x2, 0x1ff, 0x401, 0x2, 0x0, 0x0, 0x0, 0xff, 0xa4, 0x100000001, 0x6, 0x8, 0x6, 0x6, 0x2, 0x7fff, 0x763, 0x8, 0x8, 0x18ad, 0x4, 0xffff, 0xcfb, 0xc14, 0x2, 0x9, 0x3, 0x8, 0x200, 0x200, 0x1, 0x8, 0x1000, 0x9, 0x4, 0x2, 0x9, 0x7c, 0x0, 0x2, 0x2, 0x5, 0x101, 0x9, 0x100, 0x4, 0x4, 0x115f, 0x8, 0xa9, 0x10000, 0x6, 0x1, 0x9d, 0x100, 0x0, 0x3, 0x7fffffff, 0x3, 0x48000000, 0x2, 0x7, 0x3, 0x9, 0xfffffffffffffffd, 0x2b8f, 0x10000, 0x7fff, 0x1, 0xf8, 0x1000, 0x246, 0x7f, 0x9, 0x162, 0x1f, 0x0, 0x80, 0x10000, 0x1, 0x52254b91, 0x1, 0x8001, 0x6d1, 0x4, 0x59a01184, 0x20, 0xfff, 0x8, 0x9, 0x1, 0x500000000000000, 0x4, 0x9, 0xbfa, 0x3ff, 0x8001, 0x3, 0x7ff, 0x8, 0x401, 0x26, 0x4, 0x8, 0x8, 0x200, 0x8, 0x1, 0x3, 0x1, 0x0, 0x1, 0x100000001, 0x7f, 0x1ff, 0xff49, 0x7f, 0xaa3a38880000, 0x60000000, 0xfffffffffffffffb, 0x6, 0x20000000000, 0x6, 0x0, 0x4f, 0x2, 0xfffffffffffffffc, 0x8000, 0x7fff, 0x5, 0x34, 0xffffffffffff2c1a, 0x4, 0x2, 0x0, 0x3, 0xa25, 0x80000000, 0xffffffff80000000, 0xffff, 0x8, 0x7fffffff, 0x6, 0x0, 0xe2b2, 0x3f, 0x0, 0x6, 0x7, 0x400, 0x4b, 0x6, 0x5, 0x3, 0x100000001, 0x260, 0x5, 0x0, 0x3f, 0x0, 0x8014cb1, 0x1ff, 0x4, 0x3, 0x4, 0xca06, 0x6, 0xff, 0x4, 0xff, 0x5, 0xff, 0xf999, 0x4, 0x800, 0x401, 0xbed9, 0x1, 0x6, 0x9, 0x6, 0x7, 0x6, 0xffffffffffffffff, 0xf26d, 0x3f, 0xe9f6, 0x5, 0x4, 0x100000001, 0x8, 0x1000, 0xffffffff, 0x6, 0xfffffffffffffffd, 0x2, 0x6, 0x8, 0x1, 0x6, 0x4, 0x9, 0x1, 0x1, 0xcc8, 0x8, 0x40, 0x5, 0x80, 0xc2, 0x0, 0xd9, 0x37a, 0x2, 0x5, 0xab, 0x80, 0x0, 0x2, 0x8, 0x4, 0xb474, 0x4c9e, 0x800, 0x80000000, 0x3, 0xf6, 0x7, 0xfff00000, 0x4c4a, 0x3f, 0x8, 0x7fff, 0x1000, 0x32, 0x3, 0xfffffffffffffffc, 0x5, 0x9, 0x39d, 0x1, 0x1, 0x401, 0x800, 0x1, 0x6, 0x0, 0xf32, 0x4, 0x7fff, 0x1000, 0xf535, 0x5, 0xf6f9, 0x1ff, 0x1, 0x2, 0x7fffffff, 0x7, 0x1, 0x5, 0x9, 0x6, 0x80000001, 0xfffffffffffffffa, 0x3, 0x800, 0x9, 0x2, 0x5e, 0x5, 0x923, 0x7f, 0xfffffffffffffffc, 0xff, 0xeee, 0x1, 0x5, 0x7f, 0x6, 0x4, 0x0, 0x7fffffff, 0x5, 0x5, 0x7ff, 0x1, 0x80, 0x80, 0x8, 0x3, 0x401, 0x100, 0x8, 0x8, 0x400, 0x6, 0x800, 0x3f, 0x6, 0xf0d, 0x800, 0x3, 0x4d, 0x20, 0x0, 0xa00, 0x8, 0x862, 0x1, 0x80, 0x2, 0x101, 0x1, 0x3ff, 0x1ff, 0x8, 0x6, 0x5, 0xe3, 0x6, 0x6, 0xf96, 0x101, 0x5, 0x5, 0xffffffffffffff7a, 0x3, 0x10001, 0x7938, 0xff, 0x7ef9cee0, 0x5, 0x8, 0x6, 0x9, 0x81, 0x8001, 0x4, 0x4, 0x4, 0x6, 0x200, 0x730000000000000, 0x1, 0xb4b2, 0x400, 0xf5e, 0x6, 0x6, 0x8001, 0xfffffffffffffc01, 0xfa, 0x2a, 0x3, 0x3, 0x3, 0x9, 0x7, 0xa55, 0x7fffffff, 0x100000000, 0xffff, 0x102000000000, 0x3, 0xec89, 0x7, 0x3, 0x7fff, 0x2, 0x9, 0xfff, 0x3ff, 0x9, 0x0, 0x5, 0x8001, 0x4, 0x5, 0x8, 0x5, 0x5, 0x6, 0x67, 0x0, 0x401, 0x7, 0x80000000, 0x1ff, 0x1, 0x1, 0xfffffffffffffffc, 0x7fff, 0x49, 0x4, 0x5, 0xfff, 0xcd2, 0x1, 0x41, 0x3, 0xd6, 0x20, 0x0, 0x3, 0xffff, 0x401, 0x9, 0x39, 0xfff, 0x1, 0x7f, 0x3, 0x4, 0x6, 0x8, 0x5, 0x9, 0x6, 0x5000000000, 0xd90, 0x9, 0x4a, 0x800, 0x600000000000, 0x200, 0x400, 0x100000001, 0x1000000000, 0xfffffffffffffff8, 0x2, 0x4, 0x8000, 0x7, 0x1, 0x3, 0x3, 0x6, 0x6, 0x4, 0x8, 0x0, 0x6, 0x4, 0x1, 0x3, 0x0, 0x4, 0x3, 0x3, 0x162, 0x9b, 0x81, 0x1, 0x1000, 0x8, 0x3, 0x80000000, 0x5, 0x80, 0x10001, 0x100000001, 0x3, 0x401, 0x5, 0x9, 0xbf, 0xdc81, 0x6, 0xfffffffffffffff7, 0x9bce, 0x53d3, 0x5, 0x80, 0x2, 0x0, 0x0, 0x3, 0x7fff, 0x9, 0x100, 0x5, 0xf761, 0x0, 0x81, 0x6, 0x9f, 0x6, 0x1, 0x9, 0x200, 0xc0a, 0x8, 0x100000000, 0x4, 0x1400, 0x2, 0x5, 0x3e0, 0x4, 0x40, 0x40, 0x1ff, 0x20000000200, 0x101, 0x6, 0xffff, 0x6, 0x1, 0x2b74, 0x80, 0x5, 0x7, 0x2, 0x5, 0xffff, 0x10000, 0x0, 0x7, 0x2b, 0x399, 0x3, 0x0, 0x80000001, 0x7, 0x10000, 0x7, 0x4, 0x100000000, 0x2f2f, 0x6, 0x6, 0x2f, 0x800, 0x2, 0x1, 0x0, 0x7fffffff, 0xffffffffffffff80, 0x0, 0x34, 0x1, 0x2b95, 0x7, 0x4, 0x9, 0x4, 0x9, 0x101, 0x8, 0x80, 0x4, 0x3, 0x8, 0x9, 0x1b1f73ed, 0x7, 0x6e4b, 0x3, 0xffffffff, 0xfffffffffffff000, 0x1a, 0x0, 0x6e, 0x3, 0x800, 0x4, 0x7, 0x100, 0x5, 0x0, 0x1168, 0x6, 0x5, 0x1ff, 0x9, 0x7ff, 0x1f, 0x8000, 0x7ff, 0x2, 0xa2ff, 0x2, 0x3, 0xd03, 0x400, 0x9, 0x0, 0x5, 0x8a, 0x0, 0x4, 0x3, 0x7, 0xfffffffffffffffe, 0x5a, 0xf3e4, 0x80000001, 0x1ff, 0xfffffffffffff422, 0x3, 0x3, 0x100000000, 0x95f, 0xfd02, 0x10001, 0x81, 0x2, 0x8, 0x40, 0x1, 0x0, 0x2, 0x0, 0x3e8, 0x3, 0x0, 0x6, 0x6, 0x40, 0x400, 0x4000000000, 0x0, 0x8, 0x401, 0x3, 0x3, 0x9, 0x73ca7253, 0x0, 0x5, 0x1, 0x4000000000000000, 0xfffffffffffffffc, 0x9, 0x7fffffff, 0xba2e, 0x6, 0x4e7, 0x6, 0x4, 0x9, 0x9, 0x7fffffff, 0xff, 0x9, 0x5, 0x0, 0x0, 0x23, 0x3, 0xc88, 0x3, 0x0, 0x1, 0xcf99, 0x3, 0x4, 0x3206, 0x0, 0x2, 0x5, 0x5eb, 0x8, 0x2, 0x9, 0x99a5, 0x7, 0x5, 0x4, 0x7, 0xffff, 0x6, 0x8000, 0xfffffffffffffffd, 0x7, 0xffffffff, 0x7, 0x7ff, 0x0, 0x4, 0x73f5, 0xc3f, 0x0, 0x101, 0x6, 0xfffffffffffffffc, 0xfffffffffffffc01, 0x100000001, 0xfb, 0x8041, 0x1ff, 0x7, 0x40, 0x100000001, 0x2, 0xf01, 0x957e, 0x1f, 0xd0a, 0x20, 0x186, 0x80000000, 0x5, 0xaa, 0x6, 0x100, 0x9, 0xffffffff, 0xfffffffffffffffa, 0x0, 0xcbe0, 0x96d1, 0x5, 0x0, 0x3, 0x8000, 0x1e800000, 0x1, 0xfffffffffffff481, 0xfffffffffffffe5b, 0x14000000, 0xffffffff, 0x3, 0x1, 0x2, 0xffff, 0x2, 0x8, 0x6, 0x7, 0x8d09, 0xcb72, 0xffffffff, 0x2, 0x6, 0xe5d, 0xfffffffffffffc00, 0x4, 0x7ff, 0x7, 0x7, 0x4, 0x2, 0x5, 0x6, 0xffff, 0x0, 0x9d6, 0x1, 0x10001, 0x13c, 0x5f, 0xf4, 0xb66f, 0x3, 0x1f, 0x1, 0x4, 0x2, 0x800, 0x9, 0x2, 0x40, 0x6, 0xff, 0xfffffffffffffffc, 0x1, 0x8000, 0x5, 0x7, 0x6, 0x9, 0x17, 0x1, 0x3, 0x400, 0x8, 0x9, 0x2, 0x2, 0x0, 0x2, 0x8, 0x3, 0x7, 0x8000, 0xed, 0x2, 0x53aba148, 0x0, 0x5, 0x1000, 0x4, 0x9, 0x1, 0x9, 0x314, 0x8001, 0x20, 0xf20, 0x7, 0x8000, 0xffffffff97e9e1a6, 0x1, 0x9, 0x9, 0x7fff, 0x3, 0x6, 0x20, 0x46e80, 0x6, 0x81, 0x5, 0x5, 0x9, 0x1ff, 0x0, 0x6, 0x4, 0x4, 0x10000, 0x8, 0xffff, 0x4ec, 0x3, 0x1, 0x3, 0x5, 0x80000001, 0x9, 0x1ff, 0x2, 0x7, 0x3, 0x1, 0xccc, 0x5, 0x3, 0x7b, 0x7, 0x5, 0x100000000, 0x7, 0xffffffff, 0x3f, 0x4, 0x1, 0x100, 0xffffffffffffff80, 0x9, 0x9, 0x2c, 0x5, 0x4, 0x7, 0x6, 0x5, 0xae, 0x800, 0x1ff, 0x5, 0xffffffffffffffc1, 0x20, 0x2, 0x6, 0x1, 0x800, 0x7fffffff, 0x4, 0x8, 0x0, 0x374, 0x5, 0x9, 0x80, 0x8000, 0xfffffffffffffffc, 0x5, 0x0, 0x0, 0x1f, 0xee92, 0x3, 0x100000001, 0x800, 0x800, 0x1, 0x0, 0x2, 0x0, 0x578, 0x5, 0x81, 0x5, 0x153e91ba, 0xffff, 0x7, 0x5, 0x1, 0x8, 0x1, 0x1, 0x1, 0x0, 0x8, 0x5, 0x7, 0x7, 0x4, 0xffff, 0xdd, 0x9, 0x2, 0x7ff, 0x39bb125e, 0x101, 0x5, 0x7fb2, 0x7, 0x200, 0x7, 0x50b1800000000000, 0x8000, 0x1, 0x9, 0x8, 0x1, 0x40, 0x80000001, 0x1, 0x65aa, 0x0, 0x6e7b, 0x7fffffff, 0x7, 0x0, 0x0, 0x1, 0x1, 0x10000, 0xaed, 0x0, 0x6ad, 0x9, 0x7f, 0x5, 0x20, 0x200, 0x6, 0x89, 0x3ff, 0x2, 0x9, 0xffffffff, 0x7, 0x5, 0xff, 0xc424, 0x2, 0x8, 0x6e72, 0x601, 0x9, 0x0, 0x6, 0x81, 0x6, 0x10001, 0xc2f, 0xfffffffffffffff7, 0x3, 0x800, 0x46, 0x3, 0x0, 0x1, 0x7fff, 0x10001, 0x200, 0x20, 0x9, 0xd76, 0x401, 0x38d3, 0x3, 0x2, 0xfffffffffffffeff, 0xbb, 0x6, 0x800, 0x7ff, 0x200, 0x421, 0x400, 0x8, 0x337ae2f2, 0x0, 0x4, 0x6, 0x1, 0x5, 0x5660, 0x4d148b9e, 0xde, 0x3, 0x7, 0xa4, 0x200, 0x200, 0x0, 0x7f, 0x3, 0x3, 0x8, 0x3ff, 0x100000000, 0x4, 0x4, 0x58e9ab11, 0x3, 0x231, 0x1, 0x1, 0x1, 0x0, 0xffffffff00000000, 0x3230, 0x1, 0x59, 0xff, 0x7, 0x7, 0x1b, 0x2, 0xfffffffffffffffc, 0x1, 0xe72c, 0x1, 0x9, 0x2, 0x6d, 0x2, 0x200, 0x3, 0x9207, 0x7fffffff, 0x20, 0x2, 0x800, 0x3, 0x800, 0x4, 0x3f, 0x8, 0x9, 0x2, 0x4, 0x4e9, 0xf61e, 0xd706, 0x10860000000, 0x3b, 0xffffffffffff731f, 0x4700000000000000, 0x7fffffff, 0x6, 0x8, 0x6, 0xb4d9, 0x3, 0x7, 0x2, 0x3, 0x0, 0x6, 0x100000001, 0x0, 0x9, 0x800, 0x9, 0x0, 0x3, 0x7, 0x3b8b, 0x9, 0x10000, 0x401, 0x9, 0x9, 0x0, 0x5, 0xd05, 0x4, 0x2, 0x0, 0x7, 0x3, 0x5, 0x1f, 0x49, 0x3, 0x8edb, 0x1, 0xffffffff, 0x7fffffff, 0x4, 0x8, 0xd5, 0x0, 0x5, 0x101, 0x1, 0x1, 0x8, 0x5, 0x2, 0x9, 0x80, 0x4, 0x7fff, 0x8001, 0x3, 0x4, 0x40, 0x200, 0x0, 0xa000000000000, 0x8, 0xe14, 0x35, 0x7f, 0x9, 0x7, 0x0, 0xaf6, 0x0, 0x7fffffff, 0x40, 0x4, 0x663, 0x8, 0x8000, 0x4, 0x1, 0x401, 0x3, 0x4c, 0x40, 0x0, 0x80000000000, 0x9, 0x6, 0x3351, 0x155, 0x6, 0xfffffffffffffffe, 0x5, 0x8, 0xffffffffffffffe0, 0x9, 0x9, 0x80000001, 0x8d, 0x1f, 0x7, 0x6, 0x80000001, 0x80000001, 0x2898bf5b, 0x600000000000000, 0x20, 0x9, 0xfffffffffffffff8, 0x100000001, 0x9, 0x80, 0xbb8, 0x100, 0x8, 0x673baa75, 0xffffffff, 0x101, 0x0, 0x50, 0x5, 0xe975, 0xffff, 0x7, 0xffffffff, 0x6c030000000, 0x7, 0x4, 0x80, 0x2000000000000000, 0x1ff, 0x8001, 0x1, 0x20, 0x0, 0xfff, 0x5, 0x9, 0xa1, 0x0, 0x1, 0x3ff, 0x6, 0x5e6, 0x0, 0x2, 0xea8, 0x3f, 0xfffffffffffffffa, 0x3, 0x1, 0x80000001, 0x0, 0x5, 0x3, 0x6, 0x200, 0x2, 0x8, 0x7, 0x8, 0x8001, 0x5, 0xfffffffffffffffa, 0x7, 0x2, 0x5, 0x1, 0x571ed0dd, 0x80, 0x7f, 0x3, 0x492a, 0xffff, 0x400, 0x1ddb, 0x80000001, 0x80000000, 0xcc1, 0x6, 0x4, 0x1, 0x0, 0xff, 0x1, 0x7, 0x7, 0x400, 0x7, 0x701, 0x4, 0x9a, 0x4, 0x8, 0x6, 0x3, 0x7, 0x4, 0x75, 0x62, 0x0, 0x9, 0x7cd, 0x3, 0x5feda076, 0x3, 0x611d2022, 0x401, 0x10001, 0x42, 0x5e1, 0x3, 0x8001, 0x48e, 0xffffffff, 0x80000000, 0x0, 0x8001, 0x401, 0x8, 0x25, 0x3, 0xe40000000000000, 0x5, 0xfffffffffffffff9, 0x3, 0x9, 0x9272, 0x10000, 0x3, 0x1, 0x4, 0x7ff, 0x3, 0xfb, 0x4, 0x8001, 0x2, 0x80000001, 0xffff, 0x7, 0x4, 0x101, 0x3, 0xb77, 0x3, 0x1ff, 0x8a, 0xfff, 0x9, 0x4, 0x4, 0x0, 0xd42, 0x1f, 0xfffffffffffffc01, 0x0, 0x80000001, 0xffffffff, 0x8, 0x4, 0x8000, 0x8, 0x3, 0x7f, 0x7, 0xfffffffffffffffe, 0x7, 0x8000, 0x3, 0x30f, 0x5, 0x0, 0x2, 0x3, 0x2, 0x9, 0x8, 0x8, 0x2b4, 0x200, 0x981, 0x0, 0x9, 0x4, 0x9, 0x5, 0x3c5, 0x3, 0x3, 0x8, 0x14ce, 0x7ac4, 0x100, 0x800, 0x4, 0x70, 0x7, 0x3, 0x0, 0x0, 0x6, 0x6, 0x8001, 0xa19, 0x9f7, 0x7, 0x3d10c00000000000, 0x8, 0x1, 0x40, 0x2, 0x26a, 0x800, 0x9, 0xc30, 0xf56, 0x7, 0x0, 0xfffffffffffffff9, 0x10001, 0x531c, 0x9ef, 0x3f, 0x2, 0x5, 0x3e48, 0x9, 0xfffffffffffffffd, 0x1f, 0x7ff, 0x401, 0x0, 0x3, 0x7fff, 0x2, 0x1, 0x3, 0xffff, 0x0, 0x2, 0x4, 0x7d3, 0x2, 0x101, 0x81, 0x2, 0x1, 0xc07c, 0x91, 0x10000, 0x6, 0x10001, 0x0, 0x5, 0x1f, 0x4, 0x1f, 0x5, 0x7fff, 0x7ff, 0x6, 0x8, 0x1, 0x7, 0x7, 0x7ff, 0x9, 0x7f, 0x7fffffff, 0x1, 0x10000, 0x2, 0x10001, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x5, 0x81, 0xc8, 0x8, 0x400, 0xf1c, 0x7d, 0x9, 0x4, 0x80, 0x4, 0x7, 0x1, 0x3, 0x1000, 0x3, 0x1, 0x2, 0x2, 0x80000000, 0xdb, 0x9, 0x100, 0x1, 0x200, 0x0, 0x9a, 0x0, 0x7fffffff, 0x7, 0x101, 0x8001, 0x5, 0xa94d, 0x7fff, 0x8, 0x1000, 0x0, 0xfff, 0x7ff, 0x8, 0x7f, 0x60ce, 0xffffffffffff0001, 0x1, 0x100000000, 0x4, 0xd6, 0x3, 0x9, 0xf66, 0xfffffffffffffffa, 0x0, 0x5, 0x8, 0x100000001, 0xfffffffffffffffc, 0x6, 0x2, 0x39e, 0x2, 0xffffffff, 0xfffffffffffffffb, 0xd8, 0x0, 0x7, 0x167, 0x10000, 0x9, 0x7fffffff, 0xe94, 0x5b5, 0x816, 0xfffffffffffffff7, 0x100000001, 0x20, 0xb7, 0xff, 0x30400000000, 0x4, 0x0, 0x8000, 0x7fffffff, 0x2, 0x1, 0xfffffffffffffe00, 0x4, 0x6, 0x400, 0x200, 0x3, 0x9, 0x0, 0x4, 0xfffffffffffff800, 0x45, 0x9, 0xfff, 0x8, 0x2, 0x2, 0x5084, 0x1, 0xe3f, 0x80000000, 0x2c, 0x6, 0x1, 0x4, 0x43, 0x3, 0x1, 0x85, 0x1ff, 0x2, 0x7, 0x9, 0x1ff, 0x38, 0x200, 0x40, 0xff, 0x3, 0xfffffffffffffffe, 0x68, 0x6, 0x8000, 0x6, 0xfffffffffffffe00, 0xda5, 0x4, 0xffffffff, 0xc6c, 0x3, 0x6, 0x101, 0x1ff, 0xffffffff7fffffff, 0x401, 0x0, 0xfffffffffffffffa, 0x8, 0x4, 0x2, 0x9, 0x2, 0xfc58, 0xfffffffffffffff8, 0x518, 0xdb4, 0x7, 0x9, 0x5, 0x8d50, 0x3, 0x4, 0x1f, 0x2, 0x1ff, 0x6, 0x1b59, 0x1a, 0xf2c, 0x9, 0x7fff, 0x80000001, 0x3, 0x3, 0x1ff, 0x2, 0x60f, 0xeb, 0x5, 0xe8d, 0xfff, 0x569, 0x983, 0x7, 0x8000, 0x3, 0x8, 0x5f, 0x8, 0x537, 0x5ae, 0x3f, 0x39, 0x9, 0x0, 0x1, 0x5, 0x3, 0x4, 0x1, 0xfffffffffffffffe, 0x400, 0x7f, 0xffff, 0x3ff, 0x8001, 0x401, 0xde, 0x400, 0xfffffffffffffeff, 0xaa, 0x257f, 0x1, 0x0, 0x7, 0xdb, 0x100, 0x7f, 0xfffffffffffffffb, 0x0, 0x5, 0x4777, 0x9, 0xa45, 0x9, 0x7fff, 0x415, 0x20, 0x7fffffff, 0x3, 0x3, 0x8, 0x5, 0x4, 0xbacf, 0x40, 0x1f, 0x3, 0x1, 0x5, 0x7ff, 0x9, 0x2672, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0xff, 0x400, 0x46, 0x5ac, 0x5, 0x20, 0x487, 0x101, 0x3, 0x5, 0x2, 0x2, 0x7, 0x8, 0x80, 0x0, 0x6132573d, 0x800, 0x6, 0x9c, 0x65d, 0x0, 0x401, 0x10001, 0x20, 0x1000, 0x8, 0x7ff, 0x18f7688a, 0x6f, 0x9, 0x3, 0x7fffffff, 0x3ff, 0xf0a6, 0x1ff, 0x1, 0x4, 0x101, 0x31, 0x5, 0x80000001, 0x4, 0x7, 0x401, 0x3f, 0x4, 0x5, 0x8, 0x7c9, 0x6, 0x6, 0x20, 0x100000001, 0x5f, 0x5, 0x80, 0x5, 0x6, 0xe3f3, 0x80, 0x9, 0x20, 0x7, 0x5, 0x5, 0xff, 0x1ff, 0x8, 0x4, 0x20, 0x4, 0x3ff, 0x7, 0x66b6f065, 0x9, 0x5, 0x3f, 0x401, 0x10000, 0x2, 0x19e, 0x3, 0x40, 0x280000000000000, 0x6, 0x4, 0xffff, 0x1, 0x80000001, 0x3ff, 0x9, 0xffffffff, 0x1, 0x8, 0x6, 0xd4, 0x8, 0x1, 0x96c, 0x3, 0xc61, 0x7ff, 0x8000, 0x7f, 0x4, 0x8, 0x0, 0x100000000, 0x1000, 0x8001, 0xfffffffffffffffa, 0x41f4, 0x5, 0x8217, 0x100, 0x100, 0xc3, 0x1, 0x0, 0xa6, 0xb6ff, 0x2fbe, 0x9, 0x2, 0x400, 0x2, 0x8, 0xffffffff, 0x0, 0x3, 0x6, 0xff, 0x0, 0x3f, 0xffff, 0x20, 0x3ff, 0x8, 0x8, 0x800, 0x145b, 0x40, 0x7, 0x4, 0x6, 0x8, 0x1f, 0x0, 0x4, 0x7, 0x8001, 0x1, 0x3ff, 0x9, 0x7b4, 0x1, 0x73, 0x5, 0x5, 0x0, 0x3, 0x1ff, 0x101, 0x6, 0x9, 0x3, 0xef87, 0x2, 0x5, 0x1, 0x9, 0x100000001, 0x67, 0x40, 0x2, 0x1000, 0x200, 0x40, 0x7, 0x83, 0x8f, 0x3, 0x0, 0x7, 0x4, 0x1ff, 0x2, 0x2, 0x8, 0xd6a, 0x1, 0x6, 0x8, 0x6, 0x240, 0x3, 0x7896, 0x8e54, 0xb48, 0x3, 0x8, 0x0, 0x3, 0x101, 0x5, 0x8, 0xfffffffffffffffc, 0x0, 0x1f, 0xffffffffffffff00, 0x3, 0x0, 0x3, 0x1000, 0x7, 0x8001, 0x4, 0x4a7, 0x8000, 0x7fff, 0x3, 0x5, 0x7, 0x80000001, 0x0, 0xf17, 0xffffffffffffffc0, 0x1c70, 0x2, 0xffff, 0x2, 0xc82, 0x8, 0x0, 0x8, 0x4, 0x7a6c, 0x4, 0x40, 0x800, 0x2, 0x101, 0x80000001, 0x3, 0x1, 0x9, 0xf300, 0x4, 0x8, 0x9, 0x80000001, 0x8, 0x2, 0x0, 0x8, 0x4, 0x9, 0x80000001, 0x0, 0x8, 0x0, 0x81, 0x7f, 0x3, 0x8, 0x2, 0x5, 0x100000000, 0x6, 0x3, 0x7f, 0x2, 0x6, 0x6, 0x4, 0x2, 0x5, 0x800, 0x0, 0x1eb, 0x7f, 0x1, 0x1, 0x5, 0x2, 0x5, 0x0, 0x9, 0x24a1, 0x3d5, 0xdf9, 0xfffffffffffffffb, 0x0, 0x3ff, 0xffffffff, 0x4, 0x3, 0x423, 0x98, 0x9, 0xec0d, 0x7915, 0x3, 0x2, 0xfffffffffffffe01, 0x0, 0x4, 0x0, 0x1f, 0x5, 0x80, 0x6, 0x5, 0x7f, 0x3, 0xffffffffffffff01, 0xfffffffffffff000, 0xffff, 0x400000000000, 0xc3f, 0x4, 0xf, 0xfffffffffffff800, 0x4, 0xff, 0xd06, 0x10000, 0x1, 0x722, 0xfffffffffffffffd, 0x101, 0x80000000, 0xffff, 0x0, 0x8a0, 0x200000000000, 0x0, 0x2, 0x8, 0x7b79, 0x0, 0x5, 0x4, 0x5, 0x9, 0x6, 0x800, 0x0, 0x401, 0x80000001, 0x9362, 0x40, 0x10001, 0x7, 0xdc8, 0x4a, 0xb103, 0x3, 0x2, 0x20, 0x3, 0x4, 0x2127, 0x6, 0x3, 0x56, 0xcf2, 0x400, 0x5, 0x7, 0x5, 0x8, 0x4901, 0x4, 0x8, 0xba, 0x80000000, 0x0, 0x4, 0x0, 0x7f, 0x2, 0x2, 0x4, 0x8, 0xd64, 0x8, 0x8, 0x400, 0x2f, 0x9, 0xffff, 0x4, 0xbbef, 0x835, 0xcb, 0x62, 0xfffffffffffffffe, 0x4, 0x3, 0xfffffffffffff037, 0x9, 0x401, 0x9, 0x2, 0x4, 0x100000001, 0x8, 0x5fad, 0x380000, 0x6, 0x6748, 0x0, 0x80000000, 0x7, 0xfff, 0x200, 0xb28, 0x80000000, 0xffffffff, 0x7, 0x2, 0x671, 0x2, 0xa7, 0x3, 0x6a5, 0x0, 0x37a9, 0x3f, 0xfa, 0xb716, 0xffffffffffffff0b, 0x1f, 0xe4c9, 0x4, 0x80000000, 0x0, 0x10001, 0x8000, 0x7, 0x8000, 0xea0a, 0x800, 0x6, 0x6, 0x1, 0x1, 0x2, 0x4, 0x1, 0x7, 0x1ff, 0x2, 0x0, 0x6, 0x6, 0x1, 0x1ecdb18e, 0x8, 0x8000, 0x1, 0xdae2, 0xfff, 0x80000000, 0x7, 0x20, 0xfb57, 0x551, 0x2, 0x8, 0x7, 0x9, 0x7, 0x3, 0x6, 0x20, 0x1ff, 0xffff, 0x0, 0x9, 0xef, 0x3, 0x3f, 0x8, 0xfffffffffffffe01, 0x0, 0x7, 0x1ff, 0x1, 0x7ff, 0x5, 0x81, 0x3, 0x5, 0x200, 0x2, 0x0, 0x5b, 0x100000000, 0xb6, 0x8, 0x4c, 0x5, 0x9, 0x5, 0x9a, 0xffffffffffffeae3, 0x2, 0x63a, 0x5, 0xffff, 0x20, 0x4, 0x1f, 0x2, 0x5, 0x7, 0x10000, 0x1, 0x1000, 0xffff, 0x5, 0x8, 0xffffffff, 0x80000001, 0x8841, 0x1f, 0xfff, 0x0, 0x7, 0x81, 0x80000000, 0xfffffffffffffffa, 0xfffffffffffeffff, 0x40, 0xfffffffffffffff8, 0x100000000, 0x6, 0x20, 0xe3c, 0x81, 0x3, 0x1, 0x0, 0x80000000, 0x50, 0x2, 0x7fff, 0x3, 0x5, 0x0, 0xfffffffffffffffc, 0x5, 0x6, 0xbfdc, 0x5, 0xffff, 0x8, 0x9, 0x401, 0x1, 0x358e, 0x8, 0x8, 0x3, 0x78a6, 0x7, 0x7, 0x40, 0x100000001, 0x2, 0x8, 0x0, 0x2, 0x8, 0x2, 0x100, 0x8, 0x5, 0xf1, 0x20, 0x3ff, 0x6d2, 0x800, 0x2, 0x1f, 0x1ff, 0x4, 0x200, 0x4, 0x1, 0x0, 0x2, 0xcc3c, 0x1ff, 0x7fff, 0x7ff, 0x7ff, 0x0, 0x8000, 0x5, 0x9, 0x7ff, 0x7ff, 0x1f, 0x100, 0x14d2, 0x52a6, 0x68, 0x5, 0x800, 0x1000, 0x3ff, 0x1, 0x4, 0x9, 0x837, 0x8001, 0x7, 0xffff, 0xb3, 0x401, 0x8001, 0xffffffff, 0x1, 0x0, 0x8000, 0x9, 0x2, 0xcc7, 0x40, 0x9, 0x3, 0x3, 0x3f, 0x100000000, 0xfffffffffffffffc, 0x100000000, 0x4, 0x5, 0x3, 0x100000000, 0xffffffffffffffff, 0x2, 0x5, 0x7b0d9aca, 0x10000, 0x5, 0x1f, 0x400, 0x1, 0x80000001, 0x5, 0x1, 0x1, 0xffff, 0x800, 0x200000000000, 0x0, 0x9, 0x10000, 0x3ff, 0x80000000, 0x2, 0x0, 0xd21, 0x3, 0x2, 0x4743, 0x4, 0x100000001, 0x13, 0x2, 0x10, 0x7, 0x1, 0x3, 0x7fffffff, 0x7fff, 0x8001, 0x6, 0x1, 0x0, 0x20, 0x4, 0x4, 0x9, 0x8, 0x101, 0x7f, 0x10001, 0x7, 0x0, 0x5, 0xbe, 0x3, 0x0, 0x1, 0xfff, 0x1f, 0x100000000, 0x400, 0x593d, 0x8c, 0x9755, 0x0, 0x77, 0x78, 0x3, 0x100000000, 0x8, 0x3, 0xf66, 0x0, 0x1000, 0x0, 0x2, 0xe72, 0x5, 0xffffffffffffcb4f, 0x5, 0x88, 0x7e, 0x10000, 0x4, 0x2, 0x1, 0x41, 0xae, 0x4, 0x40, 0x1, 0x10000, 0x5, 0x2, 0x4, 0x450, 0x5, 0x36, 0x6, 0xff, 0x2, 0x5, 0x90c9, 0x400, 0x6c1b, 0x4, 0xfffffffffffffffe, 0x100, 0x0, 0x0, 0x7, 0x1, 0x20, 0x80000000, 0xffffffff80000000, 0xadc8, 0xc9e, 0x40, 0x1ff, 0x3, 0x0, 0x4, 0x3, 0x3, 0x6ed, 0x2dc, 0x9, 0x0, 0x3f, 0x5c, 0x1, 0x1000000, 0x8001, 0x98, 0x0, 0x8, 0x20, 0x2, 0x80000001, 0x872, 0x566, 0x7fffffff, 0x8, 0x7fff, 0x4, 0x85, 0x7, 0x1f80000000, 0x0, 0x1, 0x1, 0xff, 0x7f, 0xfffffffffffffff9, 0x3f, 0x9, 0x8, 0x51, 0x15, 0x2, 0x2, 0x8, 0x7ff, 0x5, 0x7, 0x3f, 0x80000001, 0x0, 0x3, 0xb457, 0x5c, 0xffff0000000000, 0x4, 0x2, 0x2, 0xb18a, 0x8, 0x8001, 0x0, 0xfffffffffffffff8, 0x2, 0xb9, 0xfff, 0x9, 0x8, 0x504a, 0x5, 0x6, 0xe3b, 0x0, 0x0, 0x0, 0xe4, 0x80000001, 0x5, 0x0, 0x3ff, 0x1f, 0x7f, 0x1, 0x35, 0x3, 0x1, 0x10000000, 0x0, 0xad57, 0x3ff, 0x101, 0x4, 0x1000, 0x8, 0x1, 0x400, 0x7, 0x7fb3, 0x9, 0x1, 0x9, 0x5, 0x81, 0x6, 0x81, 0x5, 0x1, 0x3, 0x7fffffff, 0xd08, 0x7f, 0x0, 0x5f5d, 0x2, 0x4, 0x400, 0x22e0, 0x8, 0xfff, 0x0, 0x5b, 0x7f, 0x7ff, 0x14, 0x5c, 0x5, 0x100, 0x3, 0xe1e, 0x8000, 0x101, 0x9, 0x5, 0x9, 0x80000000, 0x876, 0x3, 0x8001, 0x100, 0x800, 0x100000000, 0x1, 0xe23, 0x80, 0x1, 0xeb17005, 0x4, 0x1, 0x2, 0x3, 0x7, 0x8, 0x3, 0x1, 0x4, 0x3, 0x101, 0x5, 0x200, 0x7f, 0x7f, 0x1000, 0x3, 0x4, 0x7, 0x0, 0x1, 0x0, 0x7, 0x0, 0x3, 0xa9, 0xb090, 0xf8, 0x7, 0x80000000, 0x5, 0x8, 0x8000, 0xaff8, 0x81, 0x3, 0x754, 0x3, 0x9a3, 0x4c4c96ad, 0x1, 0x7ff, 0x0, 0x1, 0x81, 0x4000000000000, 0x7, 0x3, 0x938, 0x8, 0x5, 0x2, 0x5, 0x800, 0x2, 0x5, 0x0, 0x1ff, 0xffffffff, 0x10001, 0x9, 0x0, 0x7bd, 0x80000001, 0x80000000, 0x2, 0x1cb, 0x1, 0x1, 0x431, 0x101, 0x0, 0x2, 0xc07b, 0x3, 0xffffffff, 0x6, 0x9, 0x7f, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x3ff, 0x1, 0x1, 0x8, 0x80, 0x4, 0x1, 0x0, 0x4, 0x3, 0x5, 0x81, 0xfffffffffffffffc, 0x8, 0x7, 0x8a, 0x9, 0x1f, 0x3, 0xc00000000000, 0x8, 0x9, 0x8, 0xf4c, 0x1, 0x0, 0xea, 0x1, 0x3ff, 0x8, 0x100, 0x3f, 0x7fff, 0x80, 0x1, 0x40, 0x0, 0x20, 0x6, 0x6, 0x5, 0x2, 0x1, 0x1, 0x9, 0x40, 0x200, 0x1, 0x3ff, 0x7, 0x7, 0x200, 0x3f, 0x3, 0x9, 0x8, 0x3, 0x8, 0x2, 0x6, 0x5, 0x3, 0x20, 0x1, 0x40, 0x7fff, 0x1, 0x2ea, 0x3f, 0x5dfb, 0xbe7, 0xbf9, 0x80000000, 0x5, 0xfff, 0x100000000, 0x10001, 0x8, 0xffa6, 0xffff, 0x400, 0x0, 0x9, 0x8, 0x8, 0x81, 0x1, 0x4, 0x9, 0x0, 0x12a76660, 0xfffffffffffffa79, 0xe5, 0x32, 0x6, 0x2, 0x80000001, 0x40, 0x3, 0x9, 0x5, 0x8, 0x5, 0x7, 0x8, 0x0, 0x5, 0x1, 0x7fff, 0x78, 0x5, 0x3, 0x10001, 0x7fffffff, 0x0, 0x4, 0x382f, 0x7, 0x6ff3, 0x8, 0x8000, 0x7ff, 0x100, 0x3, 0x1, 0xffff, 0x100000000, 0x3, 0x1f, 0x3, 0x7, 0x95, 0x3, 0x9, 0x1, 0x5, 0x9, 0x7f, 0x3ff, 0x8, 0x52f, 0x7fff, 0x9, 0x3ff, 0x8, 0x9, 0x1, 0x2, 0x324, 0x9, 0xf5a, 0x2, 0x9, 0x4b414295, 0x8, 0xfffffffffffffffa, 0x1f, 0x7ff, 0x80, 0x1, 0x8000, 0x1000, 0x800, 0x80000000, 0x6, 0x7fff, 0x1, 0x6, 0x5, 0x8, 0x6, 0x5, 0x20, 0x80, 0xf218, 0x1, 0x61a7, 0x9e21d20, 0x9, 0xff, 0xfffffffffffffffb, 0x5e, 0xcf5, 0x2761, 0x40, 0x9, 0x2, 0xe2, 0xbfa, 0x10001, 0x9, 0x7fff, 0x0, 0xfffffffffffffffe, 0x6, 0x7, 0x400, 0x6, 0x40000, 0x1], "eef61661c4e9ff42f8c9044a36c19f14c6f0425e37e960a0466694e450dae2cc7b37acba9fce2f4d7a7afd2eeb0e96c692c8485c972b076e714b38f1cf7484052291128a6fb940e09950b9c9c14408809d14c7f38f25ddc44e79332a0373dfcfdde5b5a08ba8e28b24521e4019fbb0fc97378a6c2281e7af365f0f28c403b5f16ae0f1cd823796"}}) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000080)={0x2, 0x6, 0x635}) read(r3, &(0x7f00000000c0)=""/11, 0xffffffffffffff4a) [ 767.804322] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 767.809719] ? syscall_return_slowpath+0x5e0/0x5e0 [ 767.814660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.819533] ? trace_hardirqs_on_caller+0x310/0x310 [ 767.824566] ? prepare_exit_to_usermode+0x291/0x3b0 [ 767.829594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.834455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.839654] RIP: 0033:0x457569 13:01:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '0yzkaller1\x00'}, 0x18) 13:01:51 executing program 3 (fault-call:4 fault-nth:50): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 767.842878] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.861783] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 767.861800] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 767.861809] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 767.861818] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 767.861828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 767.861837] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:51 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="f44337778cba", [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote={0xfe, 0x80, [0x0, 0x88caffff]}, @local, {[], @udp={0x0, 0x77d50800, 0x8}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000540)=[@text64={0x40, 0x0}], 0x1, 0x0, &(0x7f0000000500), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000140)={0x27, 0x3, 0x0, {0x5, 0x6, 0x0, '++self'}}, 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4001) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x80, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f00000001c0), 0x4) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000000c0)={0x5000, &(0x7f0000000040), 0x0, r3, 0x3}) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000280)=""/236) sendto$inet(r3, &(0x7f0000000200)="57bccbb97f3f1487b41819986210b947859d694896346be3226557dfbf09a25f11f322a35e731e67f9de714d32d1df7c1779376d4b6de835e3132927a00e5fd766e23fdaf5f410fa0ef8f5b2a867e52ab3ad4cf32ced413f7ba416a69205435594d64ee374d825adc978dc1946e8f4b89a", 0x71, 0x0, 0x0, 0x0) [ 767.934374] IPVS: Unknown mcast interface: 0yzkaller1 [ 767.969508] ip6_tunnel: non-ECT from fe80:00ff:0000:0000:0000:0000:0000:00bb with DS=0x5 13:01:51 executing program 1: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x0) 13:01:51 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/null\x00', 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r5 = geteuid() r6 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f0000000b40)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfc, 0x1400}, 0xc, &(0x7f0000000ac0)=[{&(0x7f0000000180)=ANY=[@ANYBLOB="200000001f0010027000fbdbdf2508100a00e000000208001b00", @ANYRES32=r2], 0x20}, {&(0x7f0000000200)={0x64, 0x10, 0x2, 0x70bd2d, 0x25dfdbfe, "", [@generic="333b9a5bf30285aeff15cc25259e2ab4155872480b19d241cb5465f1ef1fff1ef5db064f8907ae058d8501c4", @nested={0x28, 0x2b, [@typed={0x8, 0x42, @u32=0x6}, @typed={0x14, 0x84, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @typed={0x8, 0x5d, @pid=r4}]}]}, 0x64}, {&(0x7f00000005c0)={0x4d4, 0x2c, 0x200, 0x70bd2d, 0x25dfdbfe, "", [@typed={0x58, 0x7b, @binary="7cbf13fad3bd581562b8b75a6971141fef09a06bc540c96be1edf7468e07ddbb6ead2390e83cadd21838dff39659013b3b397bafaac02ad49b216cc1469abf915971428f1fd280378d570d32b65b314215"}, @nested={0x12c, 0x2f, [@typed={0x8, 0x23, @uid=r5}, @typed={0x8, 0x46, @ipv4=@rand_addr=0xfffffffffffffff9}, @typed={0x8, 0x8e, @pid=r6}, @generic="2cfac6fba6210dd5775b5a9400afe6c6e124fd33f0bc2f055cd926cfc0", @generic="073100ce4bed9fd2507ab04d71bfca3a6e3370fc6d64d7c8e55cd2dfec83c1e3a6fdcc58c3aa99d55733546a649899e5bbe74b9568919826d82f8970dd29050756a7a961928d128ab64bc5f56619deeafe2a82b830c45a1ee2f3b756a17be8d6c48cc73727808b2a8649b95fc680be3001fc616d574f1ed495618a3309482ed7dc2398ee4e34af0c773c84dff4f04c1ad7dbc8e742d21e1e0a53834b7ec0f25d8e6c42184e68675259207d0193da61b21c44af899bbea39a37a6b6e18b3a26f32ac4ac0622650ed2296b907eb3abe0d28df35fc704f104374b02c5011af8889079fff2dd61b678274bcf985f8da43f", @typed={0x4, 0x7c}]}, @nested={0x4c, 0x70, [@typed={0x8, 0x6e, @uid=r7}, @generic="4f721118a020f665020f128f0d7a4776c36854fce225e8cf38000b48adddaca4b3b8fdb2a0fb5a81b826f72565762db20db65c342e63564fe9f8479b32a7"]}, @nested={0x148, 0x8f, [@typed={0x8, 0x93, @uid=r8}, @generic="c0db09233060d5b38b9ca708f1814f565e33c2e2b306cd60c44fe5422795823efdfea046c90338d5b3db031284a19c69cb277b4c2cded616f593190c86b6c4a98bc74306fde7804d6c271d39b9cb89c19012326312a83d50cbe3c0c5234d6103402b7fe7f6c2efd5b519f552bf", @generic="bb27bab66ba219961afb4c031568eedc145d772c8dffa698bff840ae35c5af03760c5a96b6d30dbd8c7469e031acf9c0e5a933abc8767b92c160a41336b55dcf9244907c961b2bc4fe64a2bd2f50a30433bd47945aa0495dc47285d7b530a35c2a5fde914dc7e6aa9b1cb93eb62b", @typed={0x8, 0x1e, @uid=r9}, @generic="57d0e2e76a1dfc929f62de46982a20a375ebd49523d1ac905362678b80197c05e7b339ada03efeb892f34eb15213dd68e9e90da7a96ce73eae4e10c4e0c547981be193fd1fa4b3bd89a08fd9bcc91df5f5aec4068ca456"]}, @generic="156ef30d14c75f5da59031f0c97b440441d2a81abe709c896ee7f29c2e9ce6bb9b8e0a8f34225e35d36b4141b0c812a76194d7e91ad60d80db346c35f4f8cd1891b39f04ac7faf951de36e8ae0bfb223055a3ce814124936c6273586b89d5e015c40f8b0eac41df53571ca90731b52d9a40613161348b9906014f5a8cf03cfc3b07ac94eaeda521cffee007cf2cfe1858fe5741d", @nested={0x40, 0x6, [@generic="e803e7187cf2effc1dacf78e30c1eae996a3c2a2135a67e272f5e564735507b6db29bd13f0dc75f71d43007d50430b5f192c7b73febd0dab5e12176b"]}, @typed={0xc, 0x31, @u64=0x6}, @typed={0x8, 0x4, @fd=r1}, @generic="77f0606e9e03dff74fc668b1963667311a8313fd55657fc65860cdefd1828e0665e47b65224cf5c221fe79f2327e3d75b552607d8228e23010488d33c2a4fed6a317f48bcc242c033041b441515aadb90a832b8711d99e4778488f74c3b5920563bbf708ddecdcd1e4fd792645ad486e6485529c5e2324a9a1fcf0164305ecf861a0468d11a4983fb882d23a036ffc022e8cc3cb50d3d91968a5630c517ea9fe95983ceb1090bb55947894b290096daafb0bc1f540f73fe9e2c3cdc2af9eb773993fb8ee"]}, 0x4d4}], 0x3, &(0x7f0000000b00)=[@rights={0x20, 0x1, 0x1, [r0, r0, r2, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r0]}], 0x40, 0x48000}, 0x1) [ 768.013412] ip6_tunnel: non-ECT from fe80:00ff:0000:0000:0000:0000:0000:00bb with DS=0x5 [ 768.053372] FAULT_INJECTION: forcing a failure. 13:01:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'dyzkaller1\x00'}, 0x18) [ 768.053372] name failslab, interval 1, probability 0, space 0, times 0 [ 768.114389] CPU: 0 PID: 29850 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 768.121790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.131147] Call Trace: [ 768.133756] dump_stack+0x244/0x39d [ 768.137404] ? dump_stack_print_info.cold.1+0x20/0x20 [ 768.137434] should_fail.cold.4+0xa/0x17 [ 768.146684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 768.146702] ? do_syscall_64+0x1b9/0x820 [ 768.146720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.161222] ? trace_hardirqs_off+0xb8/0x310 [ 768.165660] ? kasan_check_read+0x11/0x20 [ 768.169842] ? mark_held_locks+0x130/0x130 [ 768.174087] ? trace_hardirqs_off+0xb8/0x310 [ 768.178523] ? find_held_lock+0x36/0x1c0 [ 768.182618] ? rcu_read_lock_sched_held+0x14f/0x180 [ 768.187688] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.193167] __should_failslab+0x124/0x180 [ 768.197417] should_failslab+0x9/0x14 [ 768.201229] kmem_cache_alloc_node+0x26e/0x730 [ 768.205824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.211375] ? refcount_sub_and_test_checked+0x203/0x310 [ 768.216841] __alloc_skb+0x119/0x770 [ 768.220573] ? netdev_alloc_frag+0x1f0/0x1f0 [ 768.224994] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.230456] ? lock_downgrade+0x900/0x900 [ 768.234621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.240188] ? aa_label_sk_perm+0x91/0x100 [ 768.244435] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 768.249547] ? aa_sk_perm+0x22b/0x8e0 [ 768.253359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.258904] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 768.264454] netlink_sendmsg+0xb29/0xfc0 [ 768.268534] ? netlink_unicast+0x760/0x760 [ 768.272776] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 768.277720] ? apparmor_socket_sendmsg+0x29/0x30 [ 768.282488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.288037] ? security_socket_sendmsg+0x94/0xc0 [ 768.292804] ? netlink_unicast+0x760/0x760 [ 768.297052] sock_sendmsg+0xd5/0x120 [ 768.300776] ___sys_sendmsg+0x51d/0x930 [ 768.304763] ? zap_class+0x640/0x640 [ 768.308496] ? copy_msghdr_from_user+0x580/0x580 [ 768.313266] ? get_pid_task+0xd6/0x1a0 [ 768.317185] ? find_held_lock+0x36/0x1c0 [ 768.321260] ? __might_fault+0x12b/0x1e0 [ 768.325335] ? lock_downgrade+0x900/0x900 [ 768.329521] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.334994] __sys_sendmmsg+0x246/0x6d0 [ 768.338992] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 768.343326] ? __lock_is_held+0xb5/0x140 [ 768.347406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.352958] ? check_preemption_disabled+0x48/0x280 [ 768.358002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 768.363552] ? fput+0x130/0x1a0 [ 768.366846] ? do_syscall_64+0x9a/0x820 [ 768.370831] ? do_syscall_64+0x9a/0x820 [ 768.374821] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 768.379415] ? trace_hardirqs_on+0xbd/0x310 [ 768.383750] ? __ia32_sys_read+0xb0/0xb0 [ 768.387826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.393199] ? trace_hardirqs_off_caller+0x310/0x310 [ 768.398319] __x64_sys_sendmmsg+0x9d/0x100 [ 768.402571] do_syscall_64+0x1b9/0x820 [ 768.406468] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 768.411847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 768.416787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.421666] ? trace_hardirqs_on_caller+0x310/0x310 [ 768.422049] IPVS: Unknown mcast interface: dyzkaller1 [ 768.426691] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 768.426710] ? prepare_exit_to_usermode+0x291/0x3b0 [ 768.426730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.426753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.451976] RIP: 0033:0x457569 13:01:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'pyzkaller1\x00'}, 0x18) 13:01:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000000)=0x10000000, 0x4) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000040)={0x4, 0x10a000}) [ 768.455177] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.455186] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 768.455201] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 768.455211] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 768.455219] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 768.455233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 13:01:51 executing program 3 (fault-call:4 fault-nth:51): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 768.481818] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 768.530646] IPVS: Unknown mcast interface: pyzkaller1 [ 768.550305] FAULT_INJECTION: forcing a failure. [ 768.550305] name failslab, interval 1, probability 0, space 0, times 0 13:01:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'uyzkaller1\x00'}, 0x18) [ 768.574824] CPU: 1 PID: 29874 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 768.582205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.591556] Call Trace: [ 768.591583] dump_stack+0x244/0x39d [ 768.591607] ? dump_stack_print_info.cold.1+0x20/0x20 [ 768.591655] should_fail.cold.4+0xa/0x17 [ 768.591676] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 768.591695] ? __save_stack_trace+0x8d/0xf0 [ 768.597899] ? save_stack+0xa9/0xd0 [ 768.597917] ? save_stack+0x43/0xd0 13:01:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'cyzkaller1\x00'}, 0x18) [ 768.597939] ? find_held_lock+0x36/0x1c0 [ 768.597961] ? perf_trace_ext4_es_insert_delayed_block+0x8a8/0x9a0 [ 768.622172] IPVS: Unknown mcast interface: uyzkaller1 [ 768.623862] ? perf_trace_ext4_es_insert_delayed_block+0x8a8/0x9a0 [ 768.623880] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.623904] ? check_preemption_disabled+0x48/0x280 [ 768.623925] __should_failslab+0x124/0x180 [ 768.623945] should_failslab+0x9/0x14 [ 768.651242] kmem_cache_alloc_node_trace+0x270/0x740 [ 768.651272] __kmalloc_node_track_caller+0x3c/0x70 [ 768.651292] __kmalloc_reserve.isra.40+0x41/0xe0 [ 768.651310] __alloc_skb+0x155/0x770 [ 768.651328] ? netdev_alloc_frag+0x1f0/0x1f0 [ 768.660559] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.660577] ? lock_downgrade+0x900/0x900 [ 768.660603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.660632] ? aa_label_sk_perm+0x91/0x100 [ 768.660651] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 768.660667] ? aa_sk_perm+0x22b/0x8e0 [ 768.677654] IPVS: Unknown mcast interface: cyzkaller1 [ 768.679226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.679244] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 768.679266] netlink_sendmsg+0xb29/0xfc0 [ 768.679291] ? netlink_unicast+0x760/0x760 [ 768.679303] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 768.679321] ? apparmor_socket_sendmsg+0x29/0x30 [ 768.749673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.755219] ? security_socket_sendmsg+0x94/0xc0 [ 768.759982] ? netlink_unicast+0x760/0x760 [ 768.764219] sock_sendmsg+0xd5/0x120 [ 768.767941] ___sys_sendmsg+0x51d/0x930 [ 768.771915] ? zap_class+0x640/0x640 [ 768.775638] ? copy_msghdr_from_user+0x580/0x580 [ 768.780399] ? get_pid_task+0xd6/0x1a0 [ 768.784292] ? find_held_lock+0x36/0x1c0 [ 768.788376] ? __might_fault+0x12b/0x1e0 [ 768.792434] ? lock_downgrade+0x900/0x900 [ 768.796598] ? perf_trace_sched_process_exec+0x860/0x860 [ 768.802067] __sys_sendmmsg+0x246/0x6d0 [ 768.806045] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 768.810360] ? __lock_is_held+0xb5/0x140 [ 768.814427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.819978] ? check_preemption_disabled+0x48/0x280 [ 768.825006] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 768.830533] ? fput+0x130/0x1a0 [ 768.833807] ? do_syscall_64+0x9a/0x820 [ 768.837771] ? do_syscall_64+0x9a/0x820 [ 768.841734] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 768.846306] ? trace_hardirqs_on+0xbd/0x310 [ 768.850633] ? __ia32_sys_read+0xb0/0xb0 [ 768.854696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.860062] ? trace_hardirqs_off_caller+0x310/0x310 [ 768.865160] __x64_sys_sendmmsg+0x9d/0x100 [ 768.869399] do_syscall_64+0x1b9/0x820 [ 768.873295] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 768.878678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 768.883625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.888472] ? trace_hardirqs_on_caller+0x310/0x310 [ 768.893493] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 768.898512] ? prepare_exit_to_usermode+0x291/0x3b0 [ 768.903550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 768.908410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.913622] RIP: 0033:0x457569 [ 768.916822] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.935730] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 768.943444] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 768.950719] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 768.957997] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 768.965279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 768.972557] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000300)={[{0x20, 0x5, 0x6, 0xffffffffffffffc0, 0x13, 0x91, 0x7, 0x400, 0x9, 0x3, 0x7, 0x9, 0x8a1}, {0x7, 0x401, 0x3ff, 0x9, 0x9, 0xffffffffffffffff, 0x9, 0x9, 0xffffffff, 0x47a6510000000000, 0x2000000000000, 0x4, 0xe3cf}, {0x6b, 0x1, 0x6, 0x20, 0x1ff, 0x3, 0x57, 0x10001, 0x5, 0x5, 0x5, 0x8, 0x4}], 0x7ff}) process_vm_writev(0x0, &(0x7f0000001580)=[{&(0x7f0000000000)=""/178, 0xb2}, {&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000000200)=""/47, 0x2f}, {&(0x7f0000000240)=""/74, 0x4a}], 0x4, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) fchmod(r2, 0xa) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000700)={0x7, 0x0, [{0x8000001b, 0x10001, 0x3, 0x5, 0x6}, {0x80000007, 0x38c, 0x401, 0x9, 0x2}, {0x40000001, 0xffffffffffffff73, 0x5c9, 0x5, 0xfffffffffffffff8}, {0xc0000019, 0x100000001, 0x5ab1, 0x8, 0x9}, {0x8000000f, 0x1, 0x4, 0x5, 0x7b}, {0x1, 0x81, 0x8001, 0x4, 0x3}, {0xc000000d, 0xe000000000000000, 0x1f, 0xffffffffffffff00, 0x4}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) r3 = getpgid(0x0) r4 = getpgrp(r3) process_vm_readv(r4, &(0x7f0000000540)=[{&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000440)=""/230, 0xe6}], 0x2, &(0x7f00000006c0)=[{&(0x7f0000000580)=""/58, 0x3a}, {&(0x7f00000005c0)=""/177, 0xb1}, {&(0x7f0000000680)=""/38, 0x26}], 0x3, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x3, 0xfff, 0x0, 0x0, 0x7fffffff, 0x0, 0xe99]}) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r5, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$SG_IO(r2, 0x2285, &(0x7f0000000d40)={0x0, 0x0, 0xdb, 0xffff, @scatter={0x4, 0x0, &(0x7f0000000b00)=[{&(0x7f00000008c0)=""/110, 0x6e}, {&(0x7f0000000940)=""/214, 0xd6}, {&(0x7f0000000a40)=""/86, 0x56}, {&(0x7f0000000ac0)=""/33, 0x21}]}, &(0x7f0000000b40)="89d2a692ecb695d2d2b7d14199ad05ba5d5732092dfbec9dee25dcfb69112db56a5a40a2073bf4b539f0eb2d858046cfde5a11eb580dcd5e77922276fa3bb5a4fcb72fd791aef058bf06f7e77ff5d21deb7d49ef388255f744170753b8f8b82122bebc19e0ad38b54519a0ea2682d1d66d7cd20aed744e330188290eff62fb2fd9ef2c93e2c2c409cdbb47645da6d2412b309f7b997883e42e37980b735f17874a7f9d1df9f9dd30ae9d3c634b90e3295c7a11484dde2909dc307b1a95b1876eae1c98eff2973b32a8d9832e944c056a69730bbc89b63957f2bfdc", &(0x7f0000000c40)=""/168, 0x20, 0x5, 0x0, &(0x7f0000000d00)}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) r7 = syz_open_dev$mice(&(0x7f0000000840)='/dev/input/mice\x00', 0x0, 0x80000) write$FUSE_WRITE(r7, &(0x7f0000000880)={0x18, 0x0, 0x2, {0x6}}, 0x18) sendto$inet(r6, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) unshare(0x100) r8 = openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r8, &(0x7f0000000800)={0x1, 0x1800000000000}, 0x2) write$binfmt_elf64(r6, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) ppoll(&(0x7f0000000080)=[{r5}], 0x1, 0x0, &(0x7f0000000280)={0x4}, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:01:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '.yzkaller1\x00'}, 0x18) 13:01:52 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) r1 = memfd_create(&(0x7f0000000200)="2f2625fe766d6e6574316c6f76626f786e657430747275737465646d696d655f7479706500", 0x5) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f00000002c0)={0x3, 0x2, {0x55, 0x40, 0xc31a, {0x5, 0x3}, {0x8, 0x514767d7}, @rumble={0x9, 0xe1ff}}, {0x0, 0x8, 0x5, {0x8a69, 0x1}, {0x3, 0x8}, @period={0x5b, 0x4, 0xe1d, 0x4, 0x400, {0x3e7, 0x1ff, 0x8, 0x9}, 0x0, &(0x7f0000000240)}}}) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x29, 0x802, 0x0) close(r2) socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r4 = getpgrp(0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x200000) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000180)={r5, r2, 0x1ff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r5, 0x10e, 0x5, &(0x7f00000001c0)=0x7fffffff, 0x4) 13:01:52 executing program 3 (fault-call:4 fault-nth:52): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:52 executing program 1: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) syz_open_dev$vivid(0x0, 0x1, 0x2) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x0) 13:01:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e24, 0x25, @mcast2, 0xfffffffffffffff9}, {0xa, 0x4e24, 0x7, @loopback, 0x1}, 0xffffffff00000001, [0x8, 0x0, 0x5c9, 0x1, 0x7fffffff, 0x1ff, 0x81, 0x8047]}, 0x5c) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="724a4c257710eb74517d88ac9e801034ebe2b7"], 0x13) accept4$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000240)=0x6e, 0x80000) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) r4 = getgid() write$FUSE_CREATE_OPEN(r1, &(0x7f0000000480)={0xa0, 0x0, 0x2, {{0x0, 0x1, 0x0, 0x0, 0x0, 0xc14, {0x3, 0x1000, 0x1, 0x7ff, 0x9, 0x6, 0x8000, 0x99, 0x8, 0x80000000, 0x6, r3, r4, 0x2}}}}, 0xa0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) prctl$PR_GET_DUMPABLE(0x3) [ 769.163659] IPVS: Unknown mcast interface: .yzkaller1 13:01:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '#yzkaller1\x00'}, 0x18) [ 769.198167] FAULT_INJECTION: forcing a failure. [ 769.198167] name failslab, interval 1, probability 0, space 0, times 0 [ 769.286731] CPU: 1 PID: 29899 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 769.294133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.297933] IPVS: Unknown mcast interface: #yzkaller1 [ 769.303488] Call Trace: [ 769.303515] dump_stack+0x244/0x39d [ 769.303538] ? dump_stack_print_info.cold.1+0x20/0x20 [ 769.303567] should_fail.cold.4+0xa/0x17 [ 769.303603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 769.303619] ? do_syscall_64+0x1b9/0x820 13:01:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'Xyzkaller1\x00'}, 0x18) [ 769.303638] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.338760] ? trace_hardirqs_off+0xb8/0x310 [ 769.339256] IPVS: ftp: loaded support on port[0] = 21 [ 769.343171] ? kasan_check_read+0x11/0x20 [ 769.343201] ? mark_held_locks+0x130/0x130 [ 769.343216] ? trace_hardirqs_off+0xb8/0x310 [ 769.343238] ? find_held_lock+0x36/0x1c0 [ 769.343259] ? raid_ctr+0x15e8/0xb145 [ 769.369087] ? rcu_read_lock_sched_held+0x14f/0x180 [ 769.369108] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.369135] __should_failslab+0x124/0x180 [ 769.379598] should_failslab+0x9/0x14 [ 769.379615] kmem_cache_alloc_node+0x26e/0x730 [ 769.379632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.379649] ? refcount_sub_and_test_checked+0x203/0x310 [ 769.379673] __alloc_skb+0x119/0x770 [ 769.379693] ? netdev_alloc_frag+0x1f0/0x1f0 [ 769.379707] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.379725] ? lock_downgrade+0x900/0x900 [ 769.387745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 769.387764] ? aa_label_sk_perm+0x91/0x100 [ 769.387784] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 769.387800] ? aa_sk_perm+0x22b/0x8e0 [ 769.387816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.387830] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 769.387849] netlink_sendmsg+0xb29/0xfc0 [ 769.403416] ? netlink_unicast+0x760/0x760 [ 769.403432] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 769.403450] ? apparmor_socket_sendmsg+0x29/0x30 [ 769.403470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.430925] ? security_socket_sendmsg+0x94/0xc0 [ 769.430942] ? netlink_unicast+0x760/0x760 [ 769.430962] sock_sendmsg+0xd5/0x120 [ 769.430980] ___sys_sendmsg+0x51d/0x930 [ 769.430997] ? zap_class+0x640/0x640 [ 769.445244] ? copy_msghdr_from_user+0x580/0x580 [ 769.445272] ? find_held_lock+0x36/0x1c0 [ 769.445296] ? __might_fault+0x12b/0x1e0 [ 769.483273] ? lock_downgrade+0x900/0x900 [ 769.483307] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.483335] __sys_sendmmsg+0x246/0x6d0 [ 769.483357] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 769.507590] ? __lock_is_held+0xb5/0x140 [ 769.517175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:01:52 executing program 3 (fault-call:4 fault-nth:53): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 769.517195] ? check_preemption_disabled+0x48/0x280 [ 769.517225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 769.517241] ? fput+0x130/0x1a0 [ 769.517258] ? do_syscall_64+0x9a/0x820 [ 769.517272] ? do_syscall_64+0x9a/0x820 [ 769.517287] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 769.517305] ? trace_hardirqs_on+0xbd/0x310 [ 769.525587] ? __ia32_sys_read+0xb0/0xb0 [ 769.525604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.525621] ? trace_hardirqs_off_caller+0x310/0x310 [ 769.525645] __x64_sys_sendmmsg+0x9d/0x100 [ 769.525665] do_syscall_64+0x1b9/0x820 [ 769.525679] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 769.525693] ? syscall_return_slowpath+0x5e0/0x5e0 [ 769.525710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 769.535283] ? trace_hardirqs_on_caller+0x310/0x310 [ 769.535300] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 769.535318] ? prepare_exit_to_usermode+0x291/0x3b0 [ 769.535340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 769.535362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.535374] RIP: 0033:0x457569 [ 769.535391] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 769.545909] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 769.545924] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 769.545933] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 769.545942] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 769.545951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 769.545960] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 769.699250] IPVS: Unknown mcast interface: Xyzkaller1 [ 769.708798] FAULT_INJECTION: forcing a failure. [ 769.708798] name failslab, interval 1, probability 0, space 0, times 0 [ 769.731659] CPU: 1 PID: 29916 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 769.739033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.739041] Call Trace: [ 769.739064] dump_stack+0x244/0x39d [ 769.739090] ? dump_stack_print_info.cold.1+0x20/0x20 [ 769.739120] should_fail.cold.4+0xa/0x17 [ 769.751043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 769.759828] ? __save_stack_trace+0x8d/0xf0 [ 769.759859] ? save_stack+0xa9/0xd0 [ 769.759879] ? save_stack+0x43/0xd0 [ 769.769023] ? find_held_lock+0x36/0x1c0 [ 769.769060] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.769086] ? check_preemption_disabled+0x48/0x280 [ 769.777001] __should_failslab+0x124/0x180 [ 769.777018] should_failslab+0x9/0x14 [ 769.777036] kmem_cache_alloc_node_trace+0x270/0x740 [ 769.784701] __kmalloc_node_track_caller+0x3c/0x70 [ 769.795137] __kmalloc_reserve.isra.40+0x41/0xe0 [ 769.803144] __alloc_skb+0x155/0x770 [ 769.813148] ? netdev_alloc_frag+0x1f0/0x1f0 [ 769.821590] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.831414] ? lock_downgrade+0x900/0x900 [ 769.831437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 769.831454] ? aa_label_sk_perm+0x91/0x100 [ 769.841114] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 769.841129] ? aa_sk_perm+0x22b/0x8e0 [ 769.841142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.841155] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 769.841173] netlink_sendmsg+0xb29/0xfc0 [ 769.841195] ? netlink_unicast+0x760/0x760 [ 769.859660] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 769.869229] ? apparmor_socket_sendmsg+0x29/0x30 [ 769.869246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.869266] ? security_socket_sendmsg+0x94/0xc0 [ 769.893417] ? netlink_unicast+0x760/0x760 [ 769.897658] sock_sendmsg+0xd5/0x120 [ 769.901376] ___sys_sendmsg+0x51d/0x930 [ 769.905355] ? zap_class+0x640/0x640 [ 769.909078] ? copy_msghdr_from_user+0x580/0x580 [ 769.909097] ? get_pid_task+0xd6/0x1a0 [ 769.909112] ? find_held_lock+0x36/0x1c0 [ 769.909134] ? __might_fault+0x12b/0x1e0 [ 769.909147] ? lock_downgrade+0x900/0x900 [ 769.909176] ? perf_trace_sched_process_exec+0x860/0x860 [ 769.930038] __sys_sendmmsg+0x246/0x6d0 [ 769.939431] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 769.939449] ? __lock_is_held+0xb5/0x140 [ 769.939472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 769.939493] ? check_preemption_disabled+0x48/0x280 [ 769.958378] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 769.963913] ? fput+0x130/0x1a0 [ 769.967192] ? do_syscall_64+0x9a/0x820 [ 769.967206] ? do_syscall_64+0x9a/0x820 [ 769.967222] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 769.967237] ? trace_hardirqs_on+0xbd/0x310 [ 769.967254] ? __ia32_sys_read+0xb0/0xb0 [ 769.988110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.993483] ? trace_hardirqs_off_caller+0x310/0x310 [ 769.998600] __x64_sys_sendmmsg+0x9d/0x100 [ 769.998619] do_syscall_64+0x1b9/0x820 [ 769.998633] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 769.998653] ? syscall_return_slowpath+0x5e0/0x5e0 [ 770.017022] ? trace_hardirqs_on_caller+0x310/0x310 [ 770.022046] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 770.027071] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 770.027086] ? __switch_to_asm+0x40/0x70 [ 770.027098] ? __switch_to_asm+0x34/0x70 [ 770.027115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.027135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.046708] RIP: 0033:0x457569 [ 770.055068] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.073965] RSP: 002b:00007f6cb5b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 770.073980] RAX: ffffffffffffffda RBX: 00007f6cb5b07c90 RCX: 0000000000457569 13:01:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'xyzkaller1\x00'}, 0x18) 13:01:53 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) socket$rds(0x15, 0x5, 0x0) [ 770.073989] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 770.073998] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 770.074007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b086d4 [ 770.074015] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200000, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="00000000008000000000000000000000"]}) close(r3) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0x1, 0x10000}) close(r2) [ 770.179584] IPVS: Unknown mcast interface: xyzkaller1 13:01:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000040)={0x3, "2deab67b4c68bf3de2155ba9b0e65e61d298c88082e41a6b2e2da0770385fb91", 0x2, 0x1}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0xffff, 0x4, [0x1, 0x7fffffff, 0x40, 0x83ee]}, &(0x7f0000000280)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f0000000180)='cpu.stat\x00'}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x3a9, 0x4, 0x1000, 0x10000, 0x0, 0x1e53, 0x2, 0x3, 0x5, 0x3, 0x2, 0x4, 0x1, 0x6, 0xff, 0x9, 0x3, 0x8, 0x10000, 0x10000, 0x3, 0x6, 0x7ff, 0x0, 0xfffffffffffffffd, 0x6, 0x1f, 0x7, 0x4, 0x7f, 0x3, 0x1, 0x6, 0x80000000, 0x1, 0x8, 0x0, 0x20, 0x7, @perf_bp={&(0x7f0000000080), 0x2}, 0x2800, 0x7, 0x2, 0x4, 0x0, 0x1, 0x8}, r3, 0x3, r1, 0x8) 13:01:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '+yzkaller1\x00'}, 0x18) 13:01:53 executing program 3 (fault-call:4 fault-nth:54): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 770.353760] IPVS: Unknown mcast interface: +yzkaller1 [ 770.375851] FAULT_INJECTION: forcing a failure. [ 770.375851] name failslab, interval 1, probability 0, space 0, times 0 [ 770.396410] CPU: 1 PID: 29944 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 770.403799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.413162] Call Trace: [ 770.415773] dump_stack+0x244/0x39d [ 770.419425] ? dump_stack_print_info.cold.1+0x20/0x20 [ 770.424647] should_fail.cold.4+0xa/0x17 [ 770.428727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 770.433837] ? do_syscall_64+0x1b9/0x820 [ 770.437906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.443283] ? trace_hardirqs_off+0xb8/0x310 [ 770.447703] ? kasan_check_read+0x11/0x20 [ 770.451880] ? mark_held_locks+0x130/0x130 [ 770.456127] ? trace_hardirqs_off+0xb8/0x310 [ 770.460560] ? find_held_lock+0x36/0x1c0 [ 770.464636] ? __uvc_ctrl_commit+0x168/0x930 [ 770.469073] ? rcu_read_lock_sched_held+0x14f/0x180 13:01:53 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00002aafe4)={0xa, 0x0, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x3) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), &(0x7f0000000540)=0xfffffffffffffe46) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x400, 0x121000) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000200)={@local, 0x0}, &(0x7f0000000240)=0x14) bind$packet(r1, &(0x7f0000000280)={0x11, 0xf, r2, 0x1, 0x401}, 0x14) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1000}}, 0x43) rt_sigprocmask(0x0, &(0x7f0000000380)={0x81}, &(0x7f00000003c0), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x12, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000, 0x900, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x98) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x4, 0x80, 0x8, 0x80, 0x8}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000100)={r5, 0x2}, 0x8) 13:01:53 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000240)) mount(&(0x7f0000000200)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000280)) r0 = syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x4, 0x1) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000004c0)={0x81, 0x0, [0x3, 0x3ff, 0x7ff, 0xa]}) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000540), &(0x7f0000000580)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000900)='./file0\x00') r1 = socket$netlink(0x10, 0x3, 0x17) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000003c0)='veth1_to_team\x00') add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) symlink(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2102002000, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, {0x101, 0x1ff, 0x3, 0x1ff, 0x4}, 0x1}, 0xa) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000400)=@dstopts={0x32, 0x0, [], [@ra={0x5, 0x2, 0x1}]}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) setxattr$security_smack_transmute(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) setreuid(0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000880)='./file0/file0\x00', 0x0, &(0x7f0000000940)='TRUE', 0x4, 0x0) accept(0xffffffffffffff9c, &(0x7f00000000c0)=@alg, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) prctl$PR_GET_FP_MODE(0x2e) ioctl$RTC_AIE_OFF(r2, 0x7002) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0xffffffffffffffff) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00') [ 770.474099] ? perf_trace_sched_process_exec+0x860/0x860 [ 770.479577] __should_failslab+0x124/0x180 [ 770.483824] should_failslab+0x9/0x14 [ 770.487639] kmem_cache_alloc_node+0x26e/0x730 [ 770.492228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.497767] ? refcount_sub_and_test_checked+0x203/0x310 [ 770.503228] __alloc_skb+0x119/0x770 [ 770.506953] ? netdev_alloc_frag+0x1f0/0x1f0 [ 770.506970] ? perf_trace_sched_process_exec+0x860/0x860 [ 770.506986] ? lock_downgrade+0x900/0x900 [ 770.507008] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 770.526540] ? aa_label_sk_perm+0x91/0x100 [ 770.530792] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 770.535732] ? aa_sk_perm+0x22b/0x8e0 [ 770.539552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.545085] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 770.550626] netlink_sendmsg+0xb29/0xfc0 [ 770.554690] ? netlink_unicast+0x760/0x760 [ 770.558920] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 770.563842] ? apparmor_socket_sendmsg+0x29/0x30 [ 770.568589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.574116] ? security_socket_sendmsg+0x94/0xc0 [ 770.578861] ? netlink_unicast+0x760/0x760 [ 770.583088] sock_sendmsg+0xd5/0x120 [ 770.586796] ___sys_sendmsg+0x51d/0x930 [ 770.590765] ? zap_class+0x640/0x640 [ 770.594477] ? copy_msghdr_from_user+0x580/0x580 [ 770.599234] ? get_pid_task+0xd6/0x1a0 [ 770.603119] ? find_held_lock+0x36/0x1c0 [ 770.607178] ? __might_fault+0x12b/0x1e0 [ 770.611230] ? lock_downgrade+0x900/0x900 [ 770.615380] ? perf_trace_sched_process_exec+0x860/0x860 [ 770.620828] __sys_sendmmsg+0x246/0x6d0 [ 770.624801] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 770.629115] ? __lock_is_held+0xb5/0x140 [ 770.633170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 770.638703] ? check_preemption_disabled+0x48/0x280 [ 770.643718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 770.649246] ? fput+0x130/0x1a0 [ 770.652532] ? do_syscall_64+0x9a/0x820 [ 770.656509] ? do_syscall_64+0x9a/0x820 [ 770.660474] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 770.665060] ? trace_hardirqs_on+0xbd/0x310 [ 770.669371] ? __ia32_sys_read+0xb0/0xb0 [ 770.673427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.678780] ? trace_hardirqs_off_caller+0x310/0x310 [ 770.683880] __x64_sys_sendmmsg+0x9d/0x100 [ 770.688108] do_syscall_64+0x1b9/0x820 [ 770.691988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 770.697348] ? syscall_return_slowpath+0x5e0/0x5e0 [ 770.702266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.707099] ? trace_hardirqs_on_caller+0x310/0x310 [ 770.712108] ? prepare_exit_to_usermode+0x291/0x3b0 [ 770.717122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 770.721959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.727135] RIP: 0033:0x457569 [ 770.730321] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.749210] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 770.756907] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 770.764166] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 770.771426] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 770.778689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 770.785945] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 771.589117] bridge0: port 1(bridge_slave_0) entered blocking state [ 771.595555] bridge0: port 1(bridge_slave_0) entered disabled state [ 771.603092] device bridge_slave_0 entered promiscuous mode [ 771.628600] bridge0: port 2(bridge_slave_1) entered blocking state [ 771.634968] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.641947] device bridge_slave_1 entered promiscuous mode [ 771.667163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 771.694256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 771.787894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 771.813677] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 771.946578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 771.953610] team0: Port device team_slave_0 added [ 771.975398] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 771.982973] team0: Port device team_slave_1 added [ 772.005397] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 772.030767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 772.059257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 772.083601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 772.486762] device bridge_slave_1 left promiscuous mode [ 772.492371] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.547590] device bridge_slave_0 left promiscuous mode [ 772.553052] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.634103] team0 (unregistering): Port device team_slave_1 removed [ 772.643603] team0 (unregistering): Port device team_slave_0 removed [ 772.653087] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 772.679460] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 772.732446] bond0 (unregistering): Released all slaves [ 772.809393] bridge0: port 2(bridge_slave_1) entered blocking state [ 772.815764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 772.822415] bridge0: port 1(bridge_slave_0) entered blocking state [ 772.828766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 772.835734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 773.446318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 774.031071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 774.133059] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 774.239946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 774.246118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 774.254320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 774.333097] 8021q: adding VLAN 0 to HW filter on device team0 13:01:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46e106e97dc66343180200000003003e48a15d35ec59a9ce35353514b9f9581d745b511bb97bd3"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:01:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '-yzkaller1\x00'}, 0x18) 13:01:58 executing program 3 (fault-call:4 fault-nth:55): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:58 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xff, 0x10500) ioctl$RTC_AIE_OFF(r2, 0x7002) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:01:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x100, 0x0, 0x0, 0x0) 13:01:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x88000, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000240)="c4e27d784e9a2e660f3a0cce5743040066ba4200ed65450f800c1d5ad166baf80cb8943be38cef66bafc0ced0f21bd65652e0fc719c421656637b8010000000f01d9", 0x42}], 0x1, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f00000000c0)={0x1, 0x6, 0x4, 0x3}) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000014000/0x2000)=nil) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x80000) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000100)={0xf5, 0x0, [0x9, 0x6, 0x9, 0x5]}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r5, 0xc02c5341, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000440)={0x8c48, 0x1, 'client1\x00', 0x4, "1ae1c8d99bb83485", "747951b340dab9980eb0819f721526eb250eedbc0ff04c975d1c543963cf4714", 0x4, 0x2}) getpeername$netlink(r5, &(0x7f0000000180), &(0x7f0000000300)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) ptrace$setopts(0x4206, r7, 0x1, 0x8) write(r5, &(0x7f00000001c0), 0xfee7d3c8) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x11c5543f}], 0x1, 0x0) [ 774.904481] IPVS: Unknown mcast interface: -yzkaller1 [ 774.924633] FAULT_INJECTION: forcing a failure. [ 774.924633] name failslab, interval 1, probability 0, space 0, times 0 [ 774.967416] CPU: 0 PID: 30239 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 774.974793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.984275] Call Trace: [ 774.986872] dump_stack+0x244/0x39d [ 774.990506] ? dump_stack_print_info.cold.1+0x20/0x20 [ 774.995794] should_fail.cold.4+0xa/0x17 [ 774.999855] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 775.004963] ? __save_stack_trace+0x8d/0xf0 [ 775.009311] ? save_stack+0xa9/0xd0 [ 775.012935] ? save_stack+0x43/0xd0 [ 775.016565] ? find_held_lock+0x36/0x1c0 [ 775.020750] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.026218] ? check_preemption_disabled+0x48/0x280 [ 775.031256] __should_failslab+0x124/0x180 [ 775.035490] should_failslab+0x9/0x14 [ 775.039288] kmem_cache_alloc_node_trace+0x270/0x740 [ 775.044398] __kmalloc_node_track_caller+0x3c/0x70 [ 775.049336] __kmalloc_reserve.isra.40+0x41/0xe0 [ 775.054100] __alloc_skb+0x155/0x770 [ 775.057816] ? netdev_alloc_frag+0x1f0/0x1f0 [ 775.062223] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.067699] ? lock_downgrade+0x900/0x900 [ 775.071858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.077905] ? aa_label_sk_perm+0x91/0x100 [ 775.082144] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 775.087071] ? aa_sk_perm+0x22b/0x8e0 [ 775.090887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.096441] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 775.101990] netlink_sendmsg+0xb29/0xfc0 [ 775.106065] ? netlink_unicast+0x760/0x760 [ 775.110306] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 775.115256] ? apparmor_socket_sendmsg+0x29/0x30 [ 775.120014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.125571] ? security_socket_sendmsg+0x94/0xc0 [ 775.130328] ? netlink_unicast+0x760/0x760 [ 775.134567] sock_sendmsg+0xd5/0x120 [ 775.138304] ___sys_sendmsg+0x51d/0x930 [ 775.142282] ? zap_class+0x640/0x640 [ 775.146002] ? copy_msghdr_from_user+0x580/0x580 [ 775.150765] ? get_pid_task+0xd6/0x1a0 [ 775.154660] ? find_held_lock+0x36/0x1c0 [ 775.158728] ? __might_fault+0x12b/0x1e0 [ 775.158744] ? lock_downgrade+0x900/0x900 [ 775.158770] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.158791] __sys_sendmmsg+0x246/0x6d0 [ 775.158811] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 775.158827] ? __lock_is_held+0xb5/0x140 [ 775.180716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.180737] ? check_preemption_disabled+0x48/0x280 [ 775.195308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 775.200848] ? fput+0x130/0x1a0 [ 775.200875] ? do_syscall_64+0x9a/0x820 [ 775.200889] ? do_syscall_64+0x9a/0x820 [ 775.208104] ? lockdep_hardirqs_on+0x3bb/0x5b0 13:01:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, '\nyzkaller1\x00'}, 0x18) 13:01:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f91a200000000006f5ce7f4093b4488831c6cc4dbfdd28c3bb4b1ff0000000000"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x100000001, 0x400) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) [ 775.208121] ? trace_hardirqs_on+0xbd/0x310 [ 775.208135] ? __ia32_sys_read+0xb0/0xb0 [ 775.208150] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.208162] ? trace_hardirqs_off_caller+0x310/0x310 [ 775.208180] __x64_sys_sendmmsg+0x9d/0x100 [ 775.239718] do_syscall_64+0x1b9/0x820 [ 775.243483] IPVS: Unknown mcast interface: [ 775.243483] yzkaller1 [ 775.243783] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 775.255688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 775.260618] ? trace_hardirqs_off_thunk+0x1a/0x1c 13:01:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'iyzkaller1\x00'}, 0x18) 13:01:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f61000005eb06d15a1adc700"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 775.265466] ? trace_hardirqs_on_caller+0x310/0x310 [ 775.270491] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 775.275515] ? prepare_exit_to_usermode+0x291/0x3b0 [ 775.280554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.282801] IPVS: Unknown mcast interface: iyzkaller1 [ 775.285405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.285417] RIP: 0033:0x457569 [ 775.285430] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:01:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'lyzkaller1\x00'}, 0x18) 13:01:58 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) accept4(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x80, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x18) [ 775.285437] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 775.317875] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 775.317885] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 775.317893] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 775.317902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 775.317911] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) fchmodat(r1, &(0x7f0000000140)='./file0\x00', 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46f41000004f31261e466a93ee00e83d0000"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x400000, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) fsetxattr$security_smack_transmute(r1, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) 13:01:58 executing program 3 (fault-call:4 fault-nth:56): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 775.382475] IPVS: Unknown mcast interface: lyzkaller1 13:01:58 executing program 1: set_mempolicy(0x400000000008006, &(0x7f0000000040)=0x10004, 0x7742) mbind(&(0x7f0000008000/0x4000)=nil, 0x4000, 0xffffffffffffffff, &(0x7f000000b000), 0x0, 0x8000000000000000) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x20000000) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x83) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'bond0\x00'}, 0x18) [ 775.459768] FAULT_INJECTION: forcing a failure. [ 775.459768] name failslab, interval 1, probability 0, space 0, times 0 [ 775.532053] CPU: 1 PID: 30279 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 775.539451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.548814] Call Trace: [ 775.551416] dump_stack+0x244/0x39d [ 775.555049] ? dump_stack_print_info.cold.1+0x20/0x20 [ 775.560266] should_fail.cold.4+0xa/0x17 [ 775.564341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 775.569455] ? do_syscall_64+0x1b9/0x820 [ 775.573528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.578895] ? trace_hardirqs_off+0xb8/0x310 [ 775.583312] ? kasan_check_read+0x11/0x20 [ 775.587462] ? mark_held_locks+0x130/0x130 [ 775.591767] ? trace_hardirqs_off+0xb8/0x310 [ 775.596173] ? find_held_lock+0x36/0x1c0 [ 775.600252] ? rcu_read_lock_sched_held+0x14f/0x180 [ 775.605266] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.610713] __should_failslab+0x124/0x180 [ 775.614949] should_failslab+0x9/0x14 [ 775.618831] kmem_cache_alloc_node+0x26e/0x730 [ 775.623398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.628921] ? refcount_sub_and_test_checked+0x203/0x310 [ 775.634359] __alloc_skb+0x119/0x770 [ 775.638083] ? netdev_alloc_frag+0x1f0/0x1f0 [ 775.642477] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.647924] ? lock_downgrade+0x900/0x900 [ 775.652073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.657595] ? aa_label_sk_perm+0x91/0x100 [ 775.661835] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 775.666746] ? aa_sk_perm+0x22b/0x8e0 [ 775.670539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.676068] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 775.681596] netlink_sendmsg+0xb29/0xfc0 [ 775.685641] ? netlink_unicast+0x760/0x760 [ 775.689866] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 775.694775] ? apparmor_socket_sendmsg+0x29/0x30 [ 775.699515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.705060] ? security_socket_sendmsg+0x94/0xc0 [ 775.709799] ? netlink_unicast+0x760/0x760 [ 775.714043] sock_sendmsg+0xd5/0x120 [ 775.717763] ___sys_sendmsg+0x51d/0x930 [ 775.721732] ? zap_class+0x640/0x640 [ 775.725430] ? copy_msghdr_from_user+0x580/0x580 [ 775.730177] ? get_pid_task+0xd6/0x1a0 [ 775.734065] ? find_held_lock+0x36/0x1c0 [ 775.738110] ? __might_fault+0x12b/0x1e0 [ 775.742151] ? lock_downgrade+0x900/0x900 [ 775.746290] ? perf_trace_sched_process_exec+0x860/0x860 [ 775.751732] __sys_sendmmsg+0x246/0x6d0 [ 775.755691] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 775.760110] ? __lock_is_held+0xb5/0x140 [ 775.764158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.769678] ? check_preemption_disabled+0x48/0x280 [ 775.774683] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 775.780211] ? fput+0x130/0x1a0 [ 775.783483] ? do_syscall_64+0x9a/0x820 [ 775.787438] ? do_syscall_64+0x9a/0x820 [ 775.791392] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 775.795965] ? trace_hardirqs_on+0xbd/0x310 [ 775.800288] ? __ia32_sys_read+0xb0/0xb0 [ 775.804334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.809678] ? trace_hardirqs_off_caller+0x310/0x310 [ 775.814766] __x64_sys_sendmmsg+0x9d/0x100 [ 775.818987] do_syscall_64+0x1b9/0x820 [ 775.822855] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 775.828207] ? syscall_return_slowpath+0x5e0/0x5e0 [ 775.833118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.837960] ? trace_hardirqs_on_caller+0x310/0x310 [ 775.842957] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 775.847957] ? prepare_exit_to_usermode+0x291/0x3b0 [ 775.852961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 775.857792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.862964] RIP: 0033:0x457569 [ 775.866137] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.885025] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 775.892724] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 775.899987] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 775.907242] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 775.914495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 775.921769] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:59 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x64aa9733558e0a6}, 0xfffffffffffffffd) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000140)="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") 13:01:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syz%aller1\x00'}, 0x18) 13:01:59 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x201, 0x100000000009) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) setsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0xf}, @broadcast, @broadcast}, 0xc) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x20123, 0x2}) 13:01:59 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xfffc, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$int_in(r0, 0x8000008010500d, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x4, 0x100}) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video2\x00', 0x2, 0x0) r2 = gettid() stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000540)={0x0, 0x0}) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000002880)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000028c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000029c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a00)={0x0, 0x0, 0x0}, &(0x7f0000002a40)=0xc) r11 = getpgid(0xffffffffffffffff) r12 = geteuid() fstat(r0, &(0x7f0000003f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000004000)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000140)="f89320f5a6ad34439acd74ee35a4c54090a67424ac599df350d9d13cc70499a73853c10236053ca107a88337ea19478bd9145a8e2b28625933402eeca1539bafec0b117ea5356abfe34d25aac4072675e31dc1672a1cad5064c28d50b19e3306d5ba61018b751200e1a0a3ad8d9e98e5b68af5f9fca1d13795f2ab7442fa50e3aaf33245ced2be2b1d07575e151860f9dbd6b3243a0f3e89f2bf32a9dbb02b65a502f0800fb089e1cc5c35c3c263", 0xae}, {&(0x7f0000000200)="35a24cd3128078498320f83b49f4516b90b029b7d686b9b38b302c73b7d4bb195cb632807b9fe8a0f1a74dfdded7ecdfb2eab924977f10c3f6a99a573750098085e11de0b0ef0234d806ad5ea9a66ffa934f56dd187c521ddcb5bb77566151ec617e", 0x62}, {&(0x7f0000000280)="79a6cf905914c660505ceef75c9b6af10e76236c70b50cb9a57f8eb89c2be88e5583009845317587ed7660f3087e686cca21d03462fa8828f83f7eddd404e15eda19d2e26932f0ce9b5a0ed65eab041a0a55b0d837d9be8310987f9a4fb10788d880dec2ac200c75c3d03f363c7b1be186b24569c115ab2e0839fc62910f272bea3e085447c4292be1db06195e2451a87c06758ba5b12af06cc023c2d1a5b948a8501ed400789f22b209e055971340dadcbff44c8446b48537691ef70fde0cc87a0ce5c9e788bb6e58fe9c1d2c0c3b0e1dc1fc7bed5dcc81dbf62b", 0xdb}, {&(0x7f0000000380)="0c7388ec71ef33a62cd772169eed146b8c0d1c487815a7554c82a29cc2d5f8d325128725391d97f8eed109ccaf40c9ee67c97fba037d6b5457456b7c6fc29dcd29a907dfb3c9", 0x46}], 0x4, &(0x7f0000000600)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0xb8, 0x20000000}, {&(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002840)=[{&(0x7f0000000740)="2eff0bcc4fa0c4f9c7808840fef8e0c903db564f5ef7427a84c45c1acb488af1c2818e1737076993d54f93b4111271b2a0c0c6410568e25c503ddeb1caf397133d27fda01b6734d55041671c799710802e25c90ef8e680f81cc56bf795555448a7b3f60914e3d54b4139e87e0d8666cb990ee29e40d30e2c72feafaaabcc3ab169490bb0c28c222966734a69", 0x8c}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="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", 0x1000}, {&(0x7f0000002800)="433c4b53e89ff362c4b0df957deba23b0e889f48a1e7a2b0dc6fe9404143d83f", 0x20}], 0x4, &(0x7f0000002a80)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x20, 0x8040}, {&(0x7f0000002ac0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000003ec0)=[{&(0x7f0000002b40)="61beef2c06473604d1d226c29743c6", 0xf}, {&(0x7f0000002b80)="570c798c975ba673a12f6071423925d0cd984ebda210304336cce9c4b8bb544665739b619ff7a381c4de6b3c24c13d56c4c9ff3ffa70bdecfffcd77497a79ba0ad89bbcf6c7f9a776a5e8f584125261d1a7f71c9111e048184205d7f4ab775be0fd162850c0f58b51886e2f794c6c8640c835ff24b5096083fb9b9720214", 0x7e}, {&(0x7f0000002c00)="0c61b30f8dd358a9a4a1c048496128104641896db2", 0x15}, {&(0x7f0000002c40)="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", 0x1000}, {&(0x7f0000003c40)="bc53521635de019ad10925324592c58564d3998e5a8137287aeb9a12e41c4b198ab544a771f138fcb083efab1bdd75eb1ba9b04b1f2b26d20f6ae0304fa8bc471c259cc8957f10cbfe56f0eaee6b586b8238", 0x52}, {&(0x7f0000003cc0)="f3a7b81556911be1370e66476a3a146c5a3217b889ea30eeec1a693c7fd5cc3c1c90bddcda1741f21bc2", 0x2a}, {&(0x7f0000003d00)="5f283d9203f6cf612415fa8ed8d0dc777eb4e9d53fcfb4ec8e67444c782b45c95053e9b837f4dcdc7a39c21dad07a98174f41e9892dc062d9c79b83044c286a72f9ff99f4cc8e25b76caa7ccdf33939a876d8d33359f22e2d3a66ebc993e316dfcac615f3baf6829936115bc9fca2b15a5bdf54bb687ef606e7fcaf79005e3229b7e973f33d654bed85201f717c3", 0x8e}, {&(0x7f0000003dc0)="719bbdab7a15e5cd86462709b9d0ad98ddc6b7f82158cae7bca841331b10e650acb01d9d21c058e2073041554e1f1647b0f262018be35eeaf040d4f93b6bdec9c7992c826766a118e9c3a1861a1ba2d2b200de9aef523c6e5c237d14a28336d12965bf3ec3d7d66604c80db15c6b6e047321b60414e7a82de8df3cd852ae4a252fb206d516e60b688d847178d5ef9e9e1cf25456782177c74d21a7deb5cf7c32d5182d974b392727c1fb6b6585c96ef6d2176efdaf3d5ae5d265f43f30d46005704e88b0bff7664a641b2192dac6a8a4efde0a3a1a07b9191b80c9b7d2bf8a2ee6f5b1", 0xe3}], 0x8, &(0x7f0000003fc0)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x20, 0x141f018330ee78c4}], 0x3, 0x20000000) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x50, 0x4, 0x5}}, 0x14) 13:01:59 executing program 3 (fault-call:4 fault-nth:57): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:01:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syz\naller1\x00'}, 0x18) [ 776.048719] IPVS: Unknown mcast interface: syz%aller1 [ 776.051018] FAULT_INJECTION: forcing a failure. [ 776.051018] name failslab, interval 1, probability 0, space 0, times 0 [ 776.069441] CPU: 1 PID: 30299 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 776.076813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.086157] Call Trace: [ 776.086189] dump_stack+0x244/0x39d [ 776.086227] ? dump_stack_print_info.cold.1+0x20/0x20 13:01:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 776.086257] should_fail.cold.4+0xa/0x17 [ 776.097603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 776.097619] ? __save_stack_trace+0x8d/0xf0 [ 776.097647] ? save_stack+0xa9/0xd0 [ 776.097661] ? save_stack+0x43/0xd0 [ 776.118340] ? find_held_lock+0x36/0x1c0 [ 776.122428] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.122448] ? check_preemption_disabled+0x48/0x280 [ 776.132878] __should_failslab+0x124/0x180 [ 776.137120] should_failslab+0x9/0x14 [ 776.137857] IPVS: Unknown mcast interface: syz [ 776.137857] aller1 [ 776.140922] kmem_cache_alloc_node_trace+0x270/0x740 [ 776.140949] __kmalloc_node_track_caller+0x3c/0x70 [ 776.140974] __kmalloc_reserve.isra.40+0x41/0xe0 [ 776.162369] __alloc_skb+0x155/0x770 [ 776.166091] ? netdev_alloc_frag+0x1f0/0x1f0 [ 776.170502] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.175955] ? lock_downgrade+0x900/0x900 [ 776.180109] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 776.185664] ? aa_label_sk_perm+0x91/0x100 [ 776.189911] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 776.194853] ? aa_sk_perm+0x22b/0x8e0 13:01:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzk\nller1\x00'}, 0x18) [ 776.198659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.204209] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 776.209757] netlink_sendmsg+0xb29/0xfc0 [ 776.213830] ? netlink_unicast+0x760/0x760 [ 776.218085] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 776.223029] ? apparmor_socket_sendmsg+0x29/0x30 [ 776.227789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.233327] ? security_socket_sendmsg+0x94/0xc0 [ 776.238101] ? netlink_unicast+0x760/0x760 [ 776.242733] sock_sendmsg+0xd5/0x120 [ 776.246455] ___sys_sendmsg+0x51d/0x930 [ 776.250424] ? zap_class+0x640/0x640 [ 776.254144] ? copy_msghdr_from_user+0x580/0x580 [ 776.258908] ? get_pid_task+0xd6/0x1a0 [ 776.262808] ? find_held_lock+0x36/0x1c0 [ 776.266896] ? __might_fault+0x12b/0x1e0 [ 776.270958] ? lock_downgrade+0x900/0x900 [ 776.275116] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.280595] __sys_sendmmsg+0x246/0x6d0 [ 776.284590] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 776.288916] ? __lock_is_held+0xb5/0x140 [ 776.292986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:01:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KDADDIO(r0, 0x4b34, 0x9) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$link(0x8, r1, r2) socketpair(0x15, 0xa, 0x80, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r3, &(0x7f0000000340)={0x18, 0xf, 0x2, {{0x0, 0x2, 0x2}, 0x9}}, 0x18) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)="585ccbe4ed83b8361f000000000000002206297b6897b66147b3c7218a9169a85ea0bdc9e1587a050000000000f1ff42e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d25500200000035c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5a7d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40000e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000400)={'veth1_to_bridge\x00', 0x800}) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x7ff, 0x40080) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2, 0x0) ioctl$VT_RELDISP(r7, 0x5605) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f00000002c0)={0x5}, 0x1) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r6, r5, r5}, 0x0, 0x0, 0x0) [ 776.298533] ? check_preemption_disabled+0x48/0x280 [ 776.303562] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 776.309100] ? fput+0x130/0x1a0 [ 776.312380] ? do_syscall_64+0x9a/0x820 [ 776.316358] ? do_syscall_64+0x9a/0x820 [ 776.320335] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 776.324919] ? trace_hardirqs_on+0xbd/0x310 [ 776.329246] ? __ia32_sys_read+0xb0/0xb0 [ 776.329261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.329276] ? trace_hardirqs_off_caller+0x310/0x310 [ 776.329295] __x64_sys_sendmmsg+0x9d/0x100 [ 776.329312] do_syscall_64+0x1b9/0x820 [ 776.329324] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.329340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 776.362186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.367047] ? trace_hardirqs_on_caller+0x310/0x310 [ 776.372080] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 776.377113] ? prepare_exit_to_usermode+0x291/0x3b0 [ 776.382126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.386970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.392150] RIP: 0033:0x457569 [ 776.395341] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 776.414228] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 776.421923] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 776.429182] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 776.436437] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 776.443692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 776.450949] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:01:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:01:59 executing program 3 (fault-call:4 fault-nth:58): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 776.533001] IPVS: Unknown mcast interface: syzk [ 776.533001] ller1 [ 776.565210] IPVS: Unknown mcast interface: syzk [ 776.565210] ller1 13:01:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzk%ller1\x00'}, 0x18) [ 776.617778] FAULT_INJECTION: forcing a failure. [ 776.617778] name failslab, interval 1, probability 0, space 0, times 0 [ 776.656393] CPU: 1 PID: 30334 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 776.663779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.673131] Call Trace: [ 776.675738] dump_stack+0x244/0x39d [ 776.679395] ? dump_stack_print_info.cold.1+0x20/0x20 [ 776.684603] should_fail.cold.4+0xa/0x17 [ 776.688679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 776.693793] ? do_syscall_64+0x1b9/0x820 [ 776.697858] ? trace_hardirqs_off+0xb8/0x310 [ 776.702267] ? kasan_check_read+0x11/0x20 [ 776.706435] ? mark_held_locks+0x130/0x130 [ 776.710672] ? trace_hardirqs_off+0xb8/0x310 [ 776.715088] ? find_held_lock+0x36/0x1c0 [ 776.719181] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.724649] __should_failslab+0x124/0x180 [ 776.724922] IPVS: Unknown mcast interface: syzk%ller1 [ 776.728913] should_failslab+0x9/0x14 [ 776.728929] kmem_cache_alloc_node+0x26e/0x730 [ 776.728946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.728961] ? refcount_sub_and_test_checked+0x203/0x310 [ 776.728984] __alloc_skb+0x119/0x770 [ 776.757187] ? netdev_alloc_frag+0x1f0/0x1f0 [ 776.761604] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.767064] ? lock_downgrade+0x900/0x900 [ 776.771232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 776.776789] ? aa_label_sk_perm+0x91/0x100 [ 776.781035] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 776.785964] ? aa_sk_perm+0x22b/0x8e0 [ 776.789784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.795327] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 776.800868] netlink_sendmsg+0xb29/0xfc0 [ 776.804952] ? netlink_unicast+0x760/0x760 [ 776.809187] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 776.814121] ? apparmor_socket_sendmsg+0x29/0x30 [ 776.818887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.824432] ? security_socket_sendmsg+0x94/0xc0 [ 776.829193] ? netlink_unicast+0x760/0x760 [ 776.833430] sock_sendmsg+0xd5/0x120 [ 776.837164] ___sys_sendmsg+0x51d/0x930 [ 776.841151] ? zap_class+0x640/0x640 [ 776.844876] ? copy_msghdr_from_user+0x580/0x580 [ 776.849638] ? get_pid_task+0xd6/0x1a0 [ 776.853537] ? find_held_lock+0x36/0x1c0 [ 776.857612] ? __might_fault+0x12b/0x1e0 [ 776.861702] ? lock_downgrade+0x900/0x900 [ 776.865863] ? perf_trace_sched_process_exec+0x860/0x860 [ 776.871331] __sys_sendmmsg+0x246/0x6d0 [ 776.875335] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 776.879672] ? __lock_is_held+0xb5/0x140 [ 776.883747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.889308] ? check_preemption_disabled+0x48/0x280 [ 776.894349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 776.899979] ? fput+0x130/0x1a0 [ 776.903269] ? do_syscall_64+0x9a/0x820 [ 776.907252] ? do_syscall_64+0x9a/0x820 [ 776.911237] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 776.915824] ? trace_hardirqs_on+0xbd/0x310 [ 776.920159] ? __ia32_sys_read+0xb0/0xb0 [ 776.924230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.929597] ? trace_hardirqs_off_caller+0x310/0x310 [ 776.934711] __x64_sys_sendmmsg+0x9d/0x100 [ 776.938958] do_syscall_64+0x1b9/0x820 [ 776.942851] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 776.948231] ? syscall_return_slowpath+0x5e0/0x5e0 [ 776.953152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.957986] ? trace_hardirqs_on_caller+0x310/0x310 [ 776.962999] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 776.968007] ? prepare_exit_to_usermode+0x291/0x3b0 [ 776.973019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 776.977863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.983037] RIP: 0033:0x457569 [ 776.986221] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.005111] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 777.012815] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 777.020071] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 777.027330] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 777.034586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 777.041842] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:00 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0xfffffffffffffd75) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000300)={0x88, &(0x7f0000000240)=""/136}) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x6, 0xd1d], 0x2, 0x0, 0x4, 0xffffffff, 0x200, 0x4, {0x3, 0x0, 0x7f, 0x2, 0xa74, 0x1ff, 0x6, 0x4, 0x1, 0x8001, 0xf50, 0x4, 0x4, 0x1ff, "64a14ee8d93f06192e6775bdaf77b87a0d4221086adda34b8f2e198bfb2403e9"}}) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000100)=""/247, &(0x7f0000000080)=0xf7) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xfd06) 13:02:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkauler1\x00'}, 0x18) 13:02:00 executing program 3 (fault-call:4 fault-nth:59): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 777.186825] IPVS: Unknown mcast interface: syzkauler1 [ 777.208379] FAULT_INJECTION: forcing a failure. [ 777.208379] name failslab, interval 1, probability 0, space 0, times 0 [ 777.297752] CPU: 1 PID: 30349 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 777.305256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.314608] Call Trace: [ 777.317210] dump_stack+0x244/0x39d [ 777.320849] ? dump_stack_print_info.cold.1+0x20/0x20 [ 777.326062] should_fail.cold.4+0xa/0x17 [ 777.330142] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 777.335260] ? __save_stack_trace+0x8d/0xf0 [ 777.339603] ? save_stack+0xa9/0xd0 [ 777.343240] ? save_stack+0x43/0xd0 [ 777.346879] ? find_held_lock+0x36/0x1c0 [ 777.350960] ? trace_event_raw_event_dax_pmd_load_hole_class+0xc8/0x4a0 [ 777.357743] ? trace_event_raw_event_dax_pmd_load_hole_class+0xc8/0x4a0 [ 777.364516] ? perf_trace_sched_process_exec+0x860/0x860 [ 777.369986] ? check_preemption_disabled+0x48/0x280 [ 777.375015] __should_failslab+0x124/0x180 [ 777.379259] should_failslab+0x9/0x14 [ 777.383062] kmem_cache_alloc_node_trace+0x270/0x740 [ 777.388191] __kmalloc_node_track_caller+0x3c/0x70 [ 777.393136] __kmalloc_reserve.isra.40+0x41/0xe0 [ 777.397899] __alloc_skb+0x155/0x770 [ 777.401626] ? netdev_alloc_frag+0x1f0/0x1f0 [ 777.406041] ? perf_trace_sched_process_exec+0x860/0x860 [ 777.411499] ? lock_downgrade+0x900/0x900 [ 777.415661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.421205] ? aa_label_sk_perm+0x91/0x100 [ 777.425451] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 777.430388] ? aa_sk_perm+0x22b/0x8e0 [ 777.434200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.439745] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 777.445302] netlink_sendmsg+0xb29/0xfc0 [ 777.449381] ? netlink_unicast+0x760/0x760 [ 777.453630] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 777.458569] ? apparmor_socket_sendmsg+0x29/0x30 [ 777.463332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.468875] ? security_socket_sendmsg+0x94/0xc0 [ 777.473641] ? netlink_unicast+0x760/0x760 [ 777.477890] sock_sendmsg+0xd5/0x120 [ 777.481628] ___sys_sendmsg+0x51d/0x930 [ 777.485615] ? zap_class+0x640/0x640 [ 777.489346] ? copy_msghdr_from_user+0x580/0x580 [ 777.494117] ? get_pid_task+0xd6/0x1a0 [ 777.498021] ? find_held_lock+0x36/0x1c0 [ 777.502107] ? __might_fault+0x12b/0x1e0 [ 777.506169] ? lock_downgrade+0x900/0x900 [ 777.510331] ? perf_trace_sched_process_exec+0x860/0x860 [ 777.515795] __sys_sendmmsg+0x246/0x6d0 [ 777.519783] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 777.524117] ? __lock_is_held+0xb5/0x140 [ 777.528197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.533740] ? check_preemption_disabled+0x48/0x280 [ 777.538779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 777.544324] ? fput+0x130/0x1a0 [ 777.547617] ? do_syscall_64+0x9a/0x820 [ 777.551597] ? do_syscall_64+0x9a/0x820 [ 777.555587] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 777.560174] ? trace_hardirqs_on+0xbd/0x310 [ 777.564496] ? __ia32_sys_read+0xb0/0xb0 [ 777.568563] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.573929] ? trace_hardirqs_off_caller+0x310/0x310 [ 777.579041] __x64_sys_sendmmsg+0x9d/0x100 [ 777.583290] do_syscall_64+0x1b9/0x820 [ 777.587181] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 777.592554] ? syscall_return_slowpath+0x5e0/0x5e0 [ 777.597496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.602341] ? trace_hardirqs_on_caller+0x310/0x310 [ 777.607364] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 777.612385] ? prepare_exit_to_usermode+0x291/0x3b0 [ 777.617416] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 777.622275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.627469] RIP: 0033:0x457569 13:02:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzka\nler1\x00'}, 0x18) [ 777.630666] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.649574] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 777.657293] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 777.664563] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 777.671840] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 777.679113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 777.686383] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzka.ler1\x00'}, 0x18) [ 777.715227] IPVS: Unknown mcast interface: syzka [ 777.715227] ler1 13:02:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:01 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) mq_timedreceive(r2, &(0x7f0000000140)=""/141, 0x8d, 0x7f, &(0x7f0000000200)={0x77359400}) personality(0x6000003) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) [ 777.808681] IPVS: Unknown mcast interface: syzka.ler1 13:02:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaLler1\x00'}, 0x18) 13:02:01 executing program 3 (fault-call:4 fault-nth:60): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 777.921697] IPVS: Unknown mcast interface: syzkaLler1 13:02:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaluer1\x00'}, 0x18) [ 777.977266] FAULT_INJECTION: forcing a failure. [ 777.977266] name failslab, interval 1, probability 0, space 0, times 0 [ 778.032180] CPU: 1 PID: 30391 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 778.039667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.049034] Call Trace: [ 778.051643] dump_stack+0x244/0x39d [ 778.055287] ? dump_stack_print_info.cold.1+0x20/0x20 [ 778.060498] should_fail.cold.4+0xa/0x17 [ 778.064606] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 778.066017] IPVS: Unknown mcast interface: syzkaluer1 [ 778.069723] ? do_syscall_64+0x1b9/0x820 13:02:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='/sbin/dhclient\x00', 0xf, 0x1) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 778.069739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.069757] ? trace_hardirqs_off+0xb8/0x310 [ 778.069771] ? kasan_check_read+0x11/0x20 [ 778.069798] ? mark_held_locks+0x130/0x130 [ 778.097162] ? trace_hardirqs_off+0xb8/0x310 [ 778.101593] ? find_held_lock+0x36/0x1c0 [ 778.105684] ? rcu_read_lock_sched_held+0x14f/0x180 [ 778.110724] ? perf_trace_sched_process_exec+0x860/0x860 [ 778.116193] __should_failslab+0x124/0x180 [ 778.120437] should_failslab+0x9/0x14 [ 778.124249] kmem_cache_alloc_node+0x26e/0x730 13:02:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkal\ner1\x00'}, 0x18) [ 778.128831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.134379] ? refcount_sub_and_test_checked+0x203/0x310 [ 778.139843] __alloc_skb+0x119/0x770 [ 778.143583] ? netdev_alloc_frag+0x1f0/0x1f0 [ 778.148003] ? perf_trace_sched_process_exec+0x860/0x860 [ 778.153463] ? lock_downgrade+0x900/0x900 [ 778.157626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.163169] ? aa_label_sk_perm+0x91/0x100 [ 778.163190] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 778.163202] ? aa_sk_perm+0x22b/0x8e0 [ 778.163219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.181653] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 778.181676] netlink_sendmsg+0xb29/0xfc0 [ 778.181696] ? netlink_unicast+0x760/0x760 [ 778.181712] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 778.200421] ? apparmor_socket_sendmsg+0x29/0x30 [ 778.205187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.210730] ? security_socket_sendmsg+0x94/0xc0 [ 778.215508] ? netlink_unicast+0x760/0x760 [ 778.219752] sock_sendmsg+0xd5/0x120 [ 778.223472] ___sys_sendmsg+0x51d/0x930 [ 778.227451] ? zap_class+0x640/0x640 [ 778.231190] ? copy_msghdr_from_user+0x580/0x580 [ 778.235947] ? get_pid_task+0xd6/0x1a0 [ 778.235969] ? find_held_lock+0x36/0x1c0 [ 778.235993] ? __might_fault+0x12b/0x1e0 [ 778.236013] ? lock_downgrade+0x900/0x900 [ 778.252139] ? perf_trace_sched_process_exec+0x860/0x860 [ 778.257607] __sys_sendmmsg+0x246/0x6d0 [ 778.261603] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 778.265928] ? __lock_is_held+0xb5/0x140 [ 778.269998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.275539] ? check_preemption_disabled+0x48/0x280 [ 778.280593] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 778.286134] ? fput+0x130/0x1a0 [ 778.289417] ? do_syscall_64+0x9a/0x820 [ 778.293397] ? do_syscall_64+0x9a/0x820 [ 778.297375] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 778.301960] ? trace_hardirqs_on+0xbd/0x310 [ 778.306276] ? __ia32_sys_read+0xb0/0xb0 [ 778.306294] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.306311] ? trace_hardirqs_off_caller+0x310/0x310 [ 778.306334] __x64_sys_sendmmsg+0x9d/0x100 [ 778.306353] do_syscall_64+0x1b9/0x820 [ 778.306367] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 778.306385] ? syscall_return_slowpath+0x5e0/0x5e0 [ 778.306401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.344071] ? trace_hardirqs_on_caller+0x310/0x310 [ 778.344089] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 778.344107] ? prepare_exit_to_usermode+0x291/0x3b0 [ 778.344128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 778.364070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.369275] RIP: 0033:0x457569 [ 778.372471] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 778.391374] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 778.399078] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 778.399087] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 778.399096] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 778.399105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 13:02:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000740)) 13:02:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 778.399114] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 778.425177] IPVS: Unknown mcast interface: syzkal [ 778.425177] er1 13:02:02 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000140)) accept4$unix(r2, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x800) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:02 executing program 3 (fault-call:4 fault-nth:61): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkal.er1\x00'}, 0x18) 13:02:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) [ 778.780088] FAULT_INJECTION: forcing a failure. [ 778.780088] name failslab, interval 1, probability 0, space 0, times 0 [ 778.795915] CPU: 0 PID: 30436 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 778.803305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.812663] Call Trace: [ 778.815262] dump_stack+0x244/0x39d [ 778.818907] ? dump_stack_print_info.cold.1+0x20/0x20 [ 778.824117] should_fail.cold.4+0xa/0x17 [ 778.828201] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 778.833321] ? __save_stack_trace+0x8d/0xf0 [ 778.837667] ? save_stack+0xa9/0xd0 [ 778.841308] ? save_stack+0x43/0xd0 [ 778.844942] ? find_held_lock+0x36/0x1c0 [ 778.849043] ? perf_trace_sched_process_exec+0x860/0x860 [ 778.854505] ? check_preemption_disabled+0x48/0x280 [ 778.859525] __should_failslab+0x124/0x180 [ 778.863759] should_failslab+0x9/0x14 [ 778.867559] kmem_cache_alloc_node_trace+0x270/0x740 [ 778.872693] __kmalloc_node_track_caller+0x3c/0x70 [ 778.877625] __kmalloc_reserve.isra.40+0x41/0xe0 [ 778.882392] __alloc_skb+0x155/0x770 [ 778.886114] ? netdev_alloc_frag+0x1f0/0x1f0 [ 778.890530] ? perf_trace_sched_process_exec+0x860/0x860 [ 778.895982] ? lock_downgrade+0x900/0x900 [ 778.900147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.905683] ? aa_label_sk_perm+0x91/0x100 [ 778.910046] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 778.914981] ? aa_sk_perm+0x22b/0x8e0 [ 778.918797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.924342] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 778.929896] netlink_sendmsg+0xb29/0xfc0 [ 778.933972] ? netlink_unicast+0x760/0x760 [ 778.938229] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 778.943167] ? apparmor_socket_sendmsg+0x29/0x30 [ 778.947927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.953468] ? security_socket_sendmsg+0x94/0xc0 [ 778.958225] ? netlink_unicast+0x760/0x760 [ 778.962467] sock_sendmsg+0xd5/0x120 [ 778.966187] ___sys_sendmsg+0x51d/0x930 [ 778.970153] ? zap_class+0x640/0x640 [ 778.973867] ? copy_msghdr_from_user+0x580/0x580 [ 778.978626] ? get_pid_task+0xd6/0x1a0 [ 778.982526] ? find_held_lock+0x36/0x1c0 [ 778.986599] ? __might_fault+0x12b/0x1e0 [ 778.990664] ? lock_downgrade+0x900/0x900 [ 778.994822] ? perf_trace_sched_process_exec+0x860/0x860 [ 779.000285] __sys_sendmmsg+0x246/0x6d0 [ 779.004268] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 779.008591] ? __lock_is_held+0xb5/0x140 [ 779.012663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.018293] ? check_preemption_disabled+0x48/0x280 [ 779.023332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 779.028868] ? fput+0x130/0x1a0 [ 779.032150] ? do_syscall_64+0x9a/0x820 [ 779.036140] ? do_syscall_64+0x9a/0x820 [ 779.040117] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 779.044705] ? trace_hardirqs_on+0xbd/0x310 [ 779.049037] ? __ia32_sys_read+0xb0/0xb0 [ 779.053110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.058479] ? trace_hardirqs_off_caller+0x310/0x310 [ 779.063586] __x64_sys_sendmmsg+0x9d/0x100 [ 779.067826] do_syscall_64+0x1b9/0x820 [ 779.071715] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 13:02:02 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xf, 0x5) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x7fffffff, 0x1, 0x3f, 0x4, 0x5, 0x100000001, 0x3, {0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x80000000, 0x1f, 0x6, 0x2}}, &(0x7f0000000440)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000480)={r1, @in6={{0xa, 0x4e23, 0x2, @local, 0x8}}}, &(0x7f0000000540)=0x84) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045505, &(0x7f0000000180)={0x2000000}) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000080)=""/238, 0x24000, 0x1000, 0x6}, 0x18) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x80000001, 0x0, 0xd4}, &(0x7f0000000280)=0x14) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x3}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x200400, 0x0) connect$pptp(r0, &(0x7f0000000340)={0x18, 0x2, {0x2, @rand_addr=0x1}}, 0x1e) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000200)=0x2) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000300)={0x9, 0x1f, 0x1}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 13:02:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x3302, 0x5c, 0x0, 0x5, 0x400, 0x8}, 0xff}, 0xa) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x404010}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x48, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x8001) r2 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000000)={'sit0\x00', 0x892}) r3 = socket$inet6(0xa, 0x5, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000040)={"7465616d30000000000200000500", 0x79}) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="a61364fc33948eba9a50340442897ec1c9a73466b49b708d27f8a986ad5970cc06408fa7452be3905c9800770f93640cf50d49e95b97f95618d583b222e5cc65fa9c2fbbfa57da921cfea5df4967492719f9124c8ffc19c08e14cb90c495ca82a74b371afdf79f360b5c11ea3a0a6ec553f2302586dfcf39902b488df8e147916b57c09c38b6308d7d6de83be847e95f6dc2f4a28331202ca62b5e8945"]]], 0x1}}, 0x40002) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0xc, 0x0, @empty, [0x0, 0x3e8]}, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'\x00', {0x2, 0x4e20, @remote}}) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000340)=""/39, &(0x7f00000003c0)=0x27) 13:02:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkalLer1\x00'}, 0x18) [ 779.077591] ? syscall_return_slowpath+0x5e0/0x5e0 [ 779.082519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.087389] ? trace_hardirqs_on_caller+0x310/0x310 [ 779.092420] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 779.097467] ? prepare_exit_to_usermode+0x291/0x3b0 [ 779.102493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.107340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.107353] RIP: 0033:0x457569 [ 779.107369] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.107377] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 779.107392] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 779.107400] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 779.107408] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 779.107416] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 779.107427] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 779.132674] IPVS: Unknown mcast interface: syzkalLer1 [ 779.144978] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor1' sets config #33554432 [ 779.202552] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor1' sets config #33554432 13:02:02 executing program 3 (fault-call:4 fault-nth:62): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkall%r1\x00'}, 0x18) 13:02:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="31000000000000e4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:02 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x400000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000004c0)="63707561636374c17e53b2c4833916d32e75736172655f7065282ccb89dbe8fa27d95009a1400993ee009d5e6807c952095acd7339ce1a68276860794266acc840b847af869ac34ae53d421f69e4accd0ebdcdafbf654cf8908925be39295a3a334d931b5d54e3a9bd0a5d1d2b775ccb2eb1a471073adb5b34cf1697bbf1a34aa012fe1aadd63c80dfa2dd9366d9b7a2ba71e8ef8764aff9766872136ccece096d15418a854d0377c503da659e26a48e5dea0e133c325746301450ce3734a062", 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0xaa0d, {0x80000001, 0x10001, 0xfffffffffffffff8, 0x4, 0x6, 0x4}}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$video(&(0x7f0000000400)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000080)={0xfdfffffb, 0x1, 0x1}) fcntl$addseals(r2, 0x409, 0x6) ioctl$VIDIOC_REQBUFS(r3, 0xc0405610, &(0x7f0000000040)={0x1}) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x4}) [ 779.384604] IPVS: Unknown mcast interface: syzkall%r1 [ 779.393728] FAULT_INJECTION: forcing a failure. [ 779.393728] name failslab, interval 1, probability 0, space 0, times 0 [ 779.444155] CPU: 0 PID: 30464 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 779.451533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.460883] Call Trace: [ 779.463482] dump_stack+0x244/0x39d [ 779.467130] ? dump_stack_print_info.cold.1+0x20/0x20 [ 779.472347] should_fail.cold.4+0xa/0x17 [ 779.476438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 779.481547] ? do_syscall_64+0x1b9/0x820 [ 779.485611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.490994] ? trace_hardirqs_off+0xb8/0x310 [ 779.495403] ? kasan_check_read+0x11/0x20 [ 779.499559] ? mark_held_locks+0x130/0x130 [ 779.503788] ? trace_hardirqs_off+0xb8/0x310 [ 779.508197] ? find_held_lock+0x36/0x1c0 [ 779.512270] ? rcu_read_lock_sched_held+0x14f/0x180 [ 779.517280] ? perf_trace_sched_process_exec+0x860/0x860 [ 779.522750] __should_failslab+0x124/0x180 [ 779.526990] should_failslab+0x9/0x14 [ 779.530782] kmem_cache_alloc_node+0x26e/0x730 [ 779.535358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.540891] ? refcount_sub_and_test_checked+0x203/0x310 [ 779.546339] __alloc_skb+0x119/0x770 [ 779.550046] ? netdev_alloc_frag+0x1f0/0x1f0 [ 779.554445] ? perf_trace_sched_process_exec+0x860/0x860 [ 779.559884] ? lock_downgrade+0x900/0x900 [ 779.564024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 779.569548] ? aa_label_sk_perm+0x91/0x100 [ 779.573774] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 779.578691] ? aa_sk_perm+0x22b/0x8e0 [ 779.582480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.588011] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 779.593545] netlink_sendmsg+0xb29/0xfc0 [ 779.597602] ? netlink_unicast+0x760/0x760 [ 779.601821] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 779.606740] ? apparmor_socket_sendmsg+0x29/0x30 [ 779.611481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.617011] ? security_socket_sendmsg+0x94/0xc0 [ 779.621754] ? netlink_unicast+0x760/0x760 [ 779.625989] sock_sendmsg+0xd5/0x120 [ 779.629697] ___sys_sendmsg+0x51d/0x930 [ 779.633659] ? zap_class+0x640/0x640 [ 779.637365] ? copy_msghdr_from_user+0x580/0x580 [ 779.642111] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 779.646686] ? trace_hardirqs_on+0xbd/0x310 [ 779.651009] ? find_held_lock+0x36/0x1c0 [ 779.655067] ? __might_fault+0x12b/0x1e0 [ 779.659206] ? lock_downgrade+0x900/0x900 [ 779.663349] ? __switch_to_asm+0x40/0x70 [ 779.667494] ? perf_trace_sched_process_exec+0x860/0x860 [ 779.672945] __sys_sendmmsg+0x246/0x6d0 [ 779.676925] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 779.681240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.686003] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 779.690585] ? retint_kernel+0x2d/0x2d [ 779.694464] ? trace_hardirqs_on_caller+0xc0/0x310 [ 779.699397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 779.704141] ? retint_kernel+0x2d/0x2d [ 779.708041] __x64_sys_sendmmsg+0x9d/0x100 [ 779.712261] ? do_syscall_64+0x1b4/0x820 [ 779.716311] do_syscall_64+0x1b9/0x820 [ 779.720184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 779.725537] ? syscall_return_slowpath+0x5e0/0x5e0 [ 779.730451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.735281] ? trace_hardirqs_on_caller+0x310/0x310 [ 779.740282] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 779.745285] ? prepare_exit_to_usermode+0x291/0x3b0 [ 779.750296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 779.755219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.760398] RIP: 0033:0x457569 [ 779.763583] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.782471] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 779.790163] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 779.797422] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 779.804683] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 779.811935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 779.819198] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:03 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$pppoe(0x18, 0x1, 0x0) r3 = dup2(r2, r2) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:02:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkall\nr1\x00'}, 0x18) 13:02:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2, 0x7fffffff}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x8, &(0x7f0000000240)=0x0) io_submit(r6, 0x2, &(0x7f00000015c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x61f2, r5, &(0x7f0000000280)="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", 0x1000}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x2}]) read(r4, &(0x7f00000000c0)=""/11, 0xb) 13:02:03 executing program 3 (fault-call:4 fault-nth:63): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 779.986492] IPVS: Unknown mcast interface: syzkall [ 779.986492] r1 [ 780.013785] FAULT_INJECTION: forcing a failure. [ 780.013785] name failslab, interval 1, probability 0, space 0, times 0 [ 780.025826] CPU: 1 PID: 30485 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 780.033182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.042524] Call Trace: [ 780.042548] dump_stack+0x244/0x39d [ 780.042568] ? dump_stack_print_info.cold.1+0x20/0x20 [ 780.042593] should_fail.cold.4+0xa/0x17 [ 780.048787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 780.048809] ? __save_stack_trace+0x8d/0xf0 [ 780.063123] ? save_stack+0xa9/0xd0 [ 780.071034] ? save_stack+0x43/0xd0 [ 780.074673] ? find_held_lock+0x36/0x1c0 [ 780.078758] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.084218] ? check_preemption_disabled+0x48/0x280 [ 780.089331] __should_failslab+0x124/0x180 [ 780.093561] should_failslab+0x9/0x14 [ 780.097457] kmem_cache_alloc_node_trace+0x270/0x740 [ 780.102563] __kmalloc_node_track_caller+0x3c/0x70 [ 780.107483] __kmalloc_reserve.isra.40+0x41/0xe0 [ 780.112231] __alloc_skb+0x155/0x770 [ 780.115946] ? netdev_alloc_frag+0x1f0/0x1f0 [ 780.120344] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.125780] ? lock_downgrade+0x900/0x900 [ 780.129924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 780.135474] ? aa_label_sk_perm+0x91/0x100 [ 780.139704] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 780.144621] ? aa_sk_perm+0x22b/0x8e0 [ 780.148407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.153938] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 780.159474] netlink_sendmsg+0xb29/0xfc0 [ 780.163550] ? netlink_unicast+0x760/0x760 [ 780.167770] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 780.172690] ? apparmor_socket_sendmsg+0x29/0x30 [ 780.177432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.182957] ? security_socket_sendmsg+0x94/0xc0 [ 780.187701] ? netlink_unicast+0x760/0x760 [ 780.191935] sock_sendmsg+0xd5/0x120 [ 780.195643] ___sys_sendmsg+0x51d/0x930 [ 780.199604] ? zap_class+0x640/0x640 [ 780.203324] ? copy_msghdr_from_user+0x580/0x580 [ 780.208071] ? get_pid_task+0xd6/0x1a0 [ 780.211959] ? find_held_lock+0x36/0x1c0 [ 780.216021] ? __might_fault+0x12b/0x1e0 [ 780.220093] ? lock_downgrade+0x900/0x900 [ 780.224245] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.229691] __sys_sendmmsg+0x246/0x6d0 [ 780.233773] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 780.238087] ? __lock_is_held+0xb5/0x140 [ 780.242144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.247671] ? check_preemption_disabled+0x48/0x280 [ 780.252704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 780.258231] ? fput+0x130/0x1a0 [ 780.261501] ? do_syscall_64+0x9a/0x820 [ 780.265466] ? do_syscall_64+0x9a/0x820 [ 780.269433] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 780.274012] ? trace_hardirqs_on+0xbd/0x310 [ 780.278325] ? __ia32_sys_read+0xb0/0xb0 [ 780.282380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.287734] ? trace_hardirqs_off_caller+0x310/0x310 [ 780.292944] __x64_sys_sendmmsg+0x9d/0x100 [ 780.297176] do_syscall_64+0x1b9/0x820 [ 780.301054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 780.306411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 780.311365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.316196] ? trace_hardirqs_on_caller+0x310/0x310 [ 780.321201] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 780.326209] ? prepare_exit_to_usermode+0x291/0x3b0 [ 780.331218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.336058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.341233] RIP: 0033:0x457569 [ 780.344425] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.363313] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 780.371008] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 780.378272] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 13:02:03 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x400000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000004c0)="63707561636374c17e53b2c4833916d32e75736172655f7065282ccb89dbe8fa27d95009a1400993ee009d5e6807c952095acd7339ce1a68276860794266acc840b847af869ac34ae53d421f69e4accd0ebdcdafbf654cf8908925be39295a3a334d931b5d54e3a9bd0a5d1d2b775ccb2eb1a471073adb5b34cf1697bbf1a34aa012fe1aadd63c80dfa2dd9366d9b7a2ba71e8ef8764aff9766872136ccece096d15418a854d0377c503da659e26a48e5dea0e133c325746301450ce3734a062", 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0xaa0d, {0x80000001, 0x10001, 0xfffffffffffffff8, 0x4, 0x6, 0x4}}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$video(&(0x7f0000000400)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000080)={0xfdfffffb, 0x1, 0x1}) fcntl$addseals(r2, 0x409, 0x6) ioctl$VIDIOC_REQBUFS(r3, 0xc0405610, &(0x7f0000000040)={0x1}) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x4}) 13:02:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkalle%1\x00'}, 0x18) [ 780.385523] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 780.392773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 780.400025] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:03 executing program 3 (fault-call:4 fault-nth:64): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 780.444552] IPVS: Unknown mcast interface: syzkalle%1 [ 780.461474] IPVS: Unknown mcast interface: syzkalle%1 13:02:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x5, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x800000020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0xfec3) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x18, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x254) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x6, 0x2, 0xfffffffffffff800, 0x6, 0x8, 0x93f8, 0x0, 0x200, 0x9, 0x7fffffff, 0xff}, 0xb) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0x0, 0x8, {{0x8001, 0x3, 0x2, r3}}}, 0x28) [ 780.567207] IPVS: Unknown mcast interface: syzkaller1 13:02:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00 \x00'}, 0x18) [ 780.592850] FAULT_INJECTION: forcing a failure. [ 780.592850] name failslab, interval 1, probability 0, space 0, times 0 [ 780.615262] IPVS: Unknown mcast interface: syzkaller1 [ 780.629857] CPU: 0 PID: 30518 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 13:02:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x18) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100)={0x307}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x20000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) fanotify_mark(r1, 0x2, 0x32, r2, &(0x7f00000000c0)='./file0\x00') [ 780.637271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.646627] Call Trace: [ 780.649224] dump_stack+0x244/0x39d [ 780.652863] ? dump_stack_print_info.cold.1+0x20/0x20 [ 780.658081] should_fail.cold.4+0xa/0x17 [ 780.662155] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 780.667262] ? do_syscall_64+0x1b9/0x820 [ 780.671332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.676698] ? trace_hardirqs_off+0xb8/0x310 [ 780.676714] ? kasan_check_read+0x11/0x20 [ 780.676742] ? mark_held_locks+0x130/0x130 [ 780.685266] ? trace_hardirqs_off+0xb8/0x310 [ 780.685290] ? find_held_lock+0x36/0x1c0 [ 780.685326] ? rcu_read_lock_sched_held+0x14f/0x180 [ 780.685342] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.685366] __should_failslab+0x124/0x180 [ 780.712701] should_failslab+0x9/0x14 [ 780.712718] kmem_cache_alloc_node+0x26e/0x730 [ 780.712736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.712753] ? refcount_sub_and_test_checked+0x203/0x310 [ 780.712776] __alloc_skb+0x119/0x770 [ 780.712796] ? netdev_alloc_frag+0x1f0/0x1f0 [ 780.712813] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.712829] ? lock_downgrade+0x900/0x900 [ 780.712849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 780.712867] ? aa_label_sk_perm+0x91/0x100 [ 780.755349] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 780.755367] ? aa_sk_perm+0x22b/0x8e0 [ 780.755385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.755400] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 780.755420] netlink_sendmsg+0xb29/0xfc0 [ 780.764562] ? netlink_unicast+0x760/0x760 [ 780.764577] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 780.764595] ? apparmor_socket_sendmsg+0x29/0x30 [ 780.764612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.764629] ? security_socket_sendmsg+0x94/0xc0 [ 780.764643] ? netlink_unicast+0x760/0x760 [ 780.764662] sock_sendmsg+0xd5/0x120 [ 780.815766] ___sys_sendmsg+0x51d/0x930 [ 780.815785] ? zap_class+0x640/0x640 [ 780.823455] ? copy_msghdr_from_user+0x580/0x580 [ 780.828221] ? get_pid_task+0xd6/0x1a0 [ 780.832116] ? find_held_lock+0x36/0x1c0 [ 780.836189] ? __might_fault+0x12b/0x1e0 [ 780.840246] ? lock_downgrade+0x900/0x900 [ 780.844403] ? perf_trace_sched_process_exec+0x860/0x860 [ 780.849869] __sys_sendmmsg+0x246/0x6d0 [ 780.853863] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 780.858194] ? __lock_is_held+0xb5/0x140 [ 780.862273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.867820] ? check_preemption_disabled+0x48/0x280 [ 780.872871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 780.878426] ? fput+0x130/0x1a0 [ 780.881732] ? do_syscall_64+0x9a/0x820 [ 780.885703] ? do_syscall_64+0x9a/0x820 [ 780.889661] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 780.894224] ? trace_hardirqs_on+0xbd/0x310 [ 780.898530] ? __ia32_sys_read+0xb0/0xb0 [ 780.902571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.907918] ? trace_hardirqs_off_caller+0x310/0x310 [ 780.913006] __x64_sys_sendmmsg+0x9d/0x100 [ 780.917238] do_syscall_64+0x1b9/0x820 [ 780.921108] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 780.926449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 780.931357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.936193] ? trace_hardirqs_on_caller+0x310/0x310 [ 780.941195] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 780.946224] ? prepare_exit_to_usermode+0x291/0x3b0 [ 780.951236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 780.956057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.961226] RIP: 0033:0x457569 [ 780.964405] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.983289] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 780.990975] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 780.998222] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 781.005468] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 781.012714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 781.019970] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:04 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x101, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000140)={0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000180)={0x41424344}, 0x7, 0xfffffffffffff38c) fsetxattr$security_smack_entry(r2, &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)='/dev/adsp#\x00', 0xb, 0x0) write$tun(r2, &(0x7f00000002c0)={@val, @val={0x0, 0x4, 0x5, 0x1f, 0x8000, 0x7fffffff}, @eth={@random="dee8d1e1660f", @local, [{[{0x9100, 0x81, 0x283}], {0x8100, 0xe2, 0x401}}], {@ipv4={0x800, {{0xf, 0x4, 0x9, 0x0, 0xc1, 0x68, 0x0, 0xffffffff, 0x77, 0x0, @multicast2, @broadcast, {[@lsrr={0x83, 0x27, 0x3ff, [@multicast2, @multicast2, @local, @broadcast, @remote, @rand_addr=0x400, @empty, @remote, @remote]}]}}, @tcp={{0x4e21, 0x4e23, r3, r4, 0x3, 0x0, 0xb, 0x8, 0xff, 0x0, 0x2868406a, {[@generic={0x1, 0x3, "d9"}, @nop, @sack_perm={0x4, 0x2}, @sack={0x5, 0x6, [0x3]}, @timestamp={0x8, 0xa, 0x7fff, 0x80}]}}, {"4b9d50af7745308e2ed3e3caf978b7b56a5d08145e696df16d62ab5207a106b20dbcc3baa1dd8564458c347bf4390704636cad6afa3b39ef20e22bb8c348b633ce7ad07418471ec12131545283bf7abaa16336d0c8a4e69a64"}}}}}}}, 0xe5) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:04 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x400000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000004c0)="63707561636374c17e53b2c4833916d32e75736172655f7065282ccb89dbe8fa27d95009a1400993ee009d5e6807c952095acd7339ce1a68276860794266acc840b847af869ac34ae53d421f69e4accd0ebdcdafbf654cf8908925be39295a3a334d931b5d54e3a9bd0a5d1d2b775ccb2eb1a471073adb5b34cf1697bbf1a34aa012fe1aadd63c80dfa2dd9366d9b7a2ba71e8ef8764aff9766872136ccece096d15418a854d0377c503da659e26a48e5dea0e133c325746301450ce3734a062", 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0xaa0d, {0x80000001, 0x10001, 0xfffffffffffffff8, 0x4, 0x6, 0x4}}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$video(&(0x7f0000000400)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000080)={0xfdfffffb, 0x1, 0x1}) fcntl$addseals(r2, 0x409, 0x6) ioctl$VIDIOC_REQBUFS(r3, 0xc0405610, &(0x7f0000000040)={0x1}) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x4}) 13:02:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 781.093324] IPVS: Unknown mcast interface: syzkaller1 13:02:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600434fefac050b8aeb00000003003e7000417ff1cc13826f7fd8f750beb0949911f94b58e72b0025f54888943653e72fded987b2fb00770c600118bbb268f9cd85a2230a5562f84199dde27a4aa1b283e1818b758a0649f7d35302c30b2da25a0fbb59d471ffb39f64a069836961557bc24779fa6d785f60ca3e3483b2db0531cb3011cd96847c01085515a302dfe8b0e37883818799b0393c2dd0d799cc718126971043ca846860d7ac2db1fe3efac900ee8b6c51041fb09ec6"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xfffffffffffff801, 0x30, 0x5, 0xfffffffffffffffa}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x100000001, @loopback, 0x20}}}, &(0x7f0000000240)=0x84) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r4, &(0x7f00000000c0)=""/11, 0xb) 13:02:04 executing program 2: r0 = socket(0x1, 0x5, 0x7) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000054}, 0x8800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e20, 0x8, @remote, 0x4}, {0xa, 0x4e24, 0x1, @mcast2, 0x7}, 0x3, [0x8cc, 0x3, 0x100, 0x7, 0x6, 0x7a, 0x0, 0x4000000000000000]}, 0x5c) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 13:02:04 executing program 3 (fault-call:4 fault-nth:65): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310500"}, 0x18) 13:02:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000007fff"}, 0x18) 13:02:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000003003e000000000000000f"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 781.167411] IPVS: Unknown mcast interface: syzkaller1 [ 781.188724] FAULT_INJECTION: forcing a failure. [ 781.188724] name failslab, interval 1, probability 0, space 0, times 0 [ 781.203227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 781.251600] CPU: 0 PID: 30553 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 781.258986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.268339] Call Trace: [ 781.270943] dump_stack+0x244/0x39d [ 781.274584] ? dump_stack_print_info.cold.1+0x20/0x20 [ 781.279791] should_fail.cold.4+0xa/0x17 [ 781.283854] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 781.288962] ? __save_stack_trace+0x8d/0xf0 [ 781.293280] ? save_stack+0xa9/0xd0 [ 781.296894] ? save_stack+0x43/0xd0 [ 781.300510] ? find_held_lock+0x36/0x1c0 [ 781.304567] ? perf_trace_sched_process_exec+0x860/0x860 [ 781.310004] ? check_preemption_disabled+0x48/0x280 [ 781.315005] __should_failslab+0x124/0x180 [ 781.319228] should_failslab+0x9/0x14 [ 781.323014] kmem_cache_alloc_node_trace+0x270/0x740 [ 781.328106] __kmalloc_node_track_caller+0x3c/0x70 [ 781.333026] __kmalloc_reserve.isra.40+0x41/0xe0 [ 781.337771] __alloc_skb+0x155/0x770 [ 781.341475] ? netdev_alloc_frag+0x1f0/0x1f0 [ 781.345884] ? perf_trace_sched_process_exec+0x860/0x860 [ 781.351324] ? lock_downgrade+0x900/0x900 [ 781.355470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 781.360991] ? aa_label_sk_perm+0x91/0x100 [ 781.365213] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 781.370235] ? aa_sk_perm+0x22b/0x8e0 [ 781.374019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.379541] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 781.385068] netlink_sendmsg+0xb29/0xfc0 [ 781.389119] ? netlink_unicast+0x760/0x760 [ 781.393340] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 781.398259] ? apparmor_socket_sendmsg+0x29/0x30 [ 781.403000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.408520] ? security_socket_sendmsg+0x94/0xc0 [ 781.413256] ? netlink_unicast+0x760/0x760 [ 781.417472] sock_sendmsg+0xd5/0x120 [ 781.421166] ___sys_sendmsg+0x51d/0x930 [ 781.425132] ? zap_class+0x640/0x640 [ 781.428833] ? copy_msghdr_from_user+0x580/0x580 [ 781.433573] ? get_pid_task+0xd6/0x1a0 [ 781.437445] ? find_held_lock+0x36/0x1c0 [ 781.441491] ? __might_fault+0x12b/0x1e0 [ 781.445533] ? lock_downgrade+0x900/0x900 [ 781.449672] ? perf_trace_sched_process_exec+0x860/0x860 [ 781.455112] __sys_sendmmsg+0x246/0x6d0 [ 781.459073] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 781.463377] ? __lock_is_held+0xb5/0x140 [ 781.467424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.472944] ? check_preemption_disabled+0x48/0x280 [ 781.477954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 781.483475] ? fput+0x130/0x1a0 [ 781.486740] ? do_syscall_64+0x9a/0x820 [ 781.490695] ? do_syscall_64+0x9a/0x820 [ 781.494649] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 781.499215] ? trace_hardirqs_on+0xbd/0x310 [ 781.503518] ? __ia32_sys_read+0xb0/0xb0 [ 781.507563] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.512911] ? trace_hardirqs_off_caller+0x310/0x310 [ 781.518003] __x64_sys_sendmmsg+0x9d/0x100 [ 781.522224] do_syscall_64+0x1b9/0x820 [ 781.526092] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 781.531525] ? syscall_return_slowpath+0x5e0/0x5e0 [ 781.536433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.541269] ? trace_hardirqs_on_caller+0x310/0x310 [ 781.546276] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 781.551278] ? prepare_exit_to_usermode+0x291/0x3b0 [ 781.556282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 781.561130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.566304] RIP: 0033:0x457569 [ 781.569496] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 781.588379] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 781.596069] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:04 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) [ 781.603322] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 781.610574] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 781.617942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 781.625194] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 781.638619] IPVS: Unknown mcast interface: syzkaller1 13:02:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x80000) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c461b0000f4100000000200000003003e"], 0x13) clone(0x401, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x37d2, 0x1, 0x7fffffff, 0xfffffffffffffffd, r4}, 0x10) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 781.741198] IPVS: Unknown mcast interface: syzkaller1 13:02:05 executing program 3 (fault-call:4 fault-nth:66): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00`\x00'}, 0x18) 13:02:05 executing program 2: r0 = socket(0x1, 0x5, 0x7) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000054}, 0x8800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e20, 0x8, @remote, 0x4}, {0xa, 0x4e24, 0x1, @mcast2, 0x7}, 0x3, [0x8cc, 0x3, 0x100, 0x7, 0x6, 0x7a, 0x0, 0x4000000000000000]}, 0x5c) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f00000001c0)=0x1, 0x4) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 13:02:05 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x4f, &(0x7f0000000000)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) [ 782.098198] IPVS: Unknown mcast interface: syzkaller1 [ 782.104377] FAULT_INJECTION: forcing a failure. [ 782.104377] name failslab, interval 1, probability 0, space 0, times 0 [ 782.117460] CPU: 0 PID: 30595 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 782.124854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.126523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 782.134200] Call Trace: [ 782.134227] dump_stack+0x244/0x39d [ 782.134254] ? dump_stack_print_info.cold.1+0x20/0x20 [ 782.155933] should_fail.cold.4+0xa/0x17 [ 782.160014] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 782.165114] ? do_syscall_64+0x1b9/0x820 [ 782.169169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.174530] ? trace_hardirqs_off+0xb8/0x310 [ 782.178938] ? kasan_check_read+0x11/0x20 [ 782.183100] ? mark_held_locks+0x130/0x130 [ 782.187330] ? trace_hardirqs_off+0xb8/0x310 [ 782.191743] ? find_held_lock+0x36/0x1c0 [ 782.195835] ? rcu_read_lock_sched_held+0x14f/0x180 [ 782.200854] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.206314] __should_failslab+0x124/0x180 [ 782.210551] should_failslab+0x9/0x14 [ 782.214348] kmem_cache_alloc_node+0x26e/0x730 [ 782.219015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.224551] ? refcount_sub_and_test_checked+0x203/0x310 [ 782.229998] __alloc_skb+0x119/0x770 [ 782.233716] ? netdev_alloc_frag+0x1f0/0x1f0 [ 782.238126] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.243570] ? lock_downgrade+0x900/0x900 [ 782.247726] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 782.253264] ? aa_label_sk_perm+0x91/0x100 [ 782.257500] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 782.262421] ? aa_sk_perm+0x22b/0x8e0 [ 782.266221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.271754] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 782.277295] netlink_sendmsg+0xb29/0xfc0 [ 782.281366] ? netlink_unicast+0x760/0x760 [ 782.285616] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 782.290555] ? apparmor_socket_sendmsg+0x29/0x30 [ 782.295308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.300846] ? security_socket_sendmsg+0x94/0xc0 [ 782.305592] ? netlink_unicast+0x760/0x760 [ 782.309837] sock_sendmsg+0xd5/0x120 [ 782.313550] ___sys_sendmsg+0x51d/0x930 [ 782.317519] ? zap_class+0x640/0x640 [ 782.321233] ? copy_msghdr_from_user+0x580/0x580 [ 782.325989] ? get_pid_task+0xd6/0x1a0 [ 782.329877] ? find_held_lock+0x36/0x1c0 [ 782.334033] ? __might_fault+0x12b/0x1e0 [ 782.338118] ? lock_downgrade+0x900/0x900 [ 782.342277] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.347730] __sys_sendmmsg+0x246/0x6d0 [ 782.351705] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 782.356022] ? __lock_is_held+0xb5/0x140 [ 782.360088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.365623] ? check_preemption_disabled+0x48/0x280 [ 782.370649] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 782.376187] ? fput+0x130/0x1a0 [ 782.379477] ? do_syscall_64+0x9a/0x820 [ 782.383443] ? do_syscall_64+0x9a/0x820 [ 782.387432] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 782.392015] ? trace_hardirqs_on+0xbd/0x310 [ 782.396333] ? __ia32_sys_read+0xb0/0xb0 [ 782.400395] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.405759] ? trace_hardirqs_off_caller+0x310/0x310 [ 782.410867] __x64_sys_sendmmsg+0x9d/0x100 [ 782.415195] do_syscall_64+0x1b9/0x820 [ 782.419095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 782.424474] ? syscall_return_slowpath+0x5e0/0x5e0 [ 782.429407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.434251] ? trace_hardirqs_on_caller+0x310/0x310 [ 782.439267] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 782.444289] ? prepare_exit_to_usermode+0x291/0x3b0 [ 782.449307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.454158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.459433] RIP: 0033:0x457569 [ 782.462626] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.481524] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 782.489227] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00 \x00'}, 0x18) 13:02:05 executing program 3 (fault-call:4 fault-nth:67): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 782.496579] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 782.503914] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 782.511182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 782.518449] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:05 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000340)={0x0, 0x1, 0x0, 0x800000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) [ 782.593035] IPVS: Unknown mcast interface: syzkaller1 [ 782.593610] FAULT_INJECTION: forcing a failure. [ 782.593610] name failslab, interval 1, probability 0, space 0, times 0 [ 782.651608] CPU: 1 PID: 30611 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 782.659113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.668472] Call Trace: [ 782.671073] dump_stack+0x244/0x39d [ 782.674715] ? dump_stack_print_info.cold.1+0x20/0x20 [ 782.679929] should_fail.cold.4+0xa/0x17 [ 782.684007] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 782.689114] ? __save_stack_trace+0x8d/0xf0 [ 782.693471] ? save_stack+0xa9/0xd0 [ 782.697114] ? save_stack+0x43/0xd0 [ 782.700751] ? find_held_lock+0x36/0x1c0 [ 782.704845] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.710316] ? check_preemption_disabled+0x48/0x280 [ 782.715339] __should_failslab+0x124/0x180 [ 782.719583] should_failslab+0x9/0x14 [ 782.723383] kmem_cache_alloc_node_trace+0x270/0x740 [ 782.728488] __kmalloc_node_track_caller+0x3c/0x70 [ 782.728506] __kmalloc_reserve.isra.40+0x41/0xe0 [ 782.728522] __alloc_skb+0x155/0x770 [ 782.741910] ? netdev_alloc_frag+0x1f0/0x1f0 [ 782.746326] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.751792] ? lock_downgrade+0x900/0x900 [ 782.755960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 782.761504] ? aa_label_sk_perm+0x91/0x100 [ 782.765766] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 782.770712] ? aa_sk_perm+0x22b/0x8e0 [ 782.774517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.780060] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 782.785601] netlink_sendmsg+0xb29/0xfc0 [ 782.789669] ? netlink_unicast+0x760/0x760 [ 782.793900] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 782.798854] ? apparmor_socket_sendmsg+0x29/0x30 [ 782.803610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.809152] ? security_socket_sendmsg+0x94/0xc0 [ 782.813910] ? netlink_unicast+0x760/0x760 [ 782.818159] sock_sendmsg+0xd5/0x120 [ 782.821877] ___sys_sendmsg+0x51d/0x930 [ 782.821894] ? zap_class+0x640/0x640 [ 782.821915] ? copy_msghdr_from_user+0x580/0x580 [ 782.821933] ? get_pid_task+0xd6/0x1a0 [ 782.821958] ? find_held_lock+0x36/0x1c0 [ 782.829754] ? __might_fault+0x12b/0x1e0 [ 782.829779] ? lock_downgrade+0x900/0x900 [ 782.829808] ? perf_trace_sched_process_exec+0x860/0x860 [ 782.829833] __sys_sendmmsg+0x246/0x6d0 [ 782.838437] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 782.838456] ? __lock_is_held+0xb5/0x140 [ 782.838478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.838495] ? check_preemption_disabled+0x48/0x280 [ 782.838522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 782.838539] ? fput+0x130/0x1a0 [ 782.887841] ? do_syscall_64+0x9a/0x820 [ 782.891837] ? do_syscall_64+0x9a/0x820 [ 782.895812] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 782.900396] ? trace_hardirqs_on+0xbd/0x310 [ 782.904735] ? __ia32_sys_read+0xb0/0xb0 [ 782.908811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.914193] ? trace_hardirqs_off_caller+0x310/0x310 [ 782.919312] __x64_sys_sendmmsg+0x9d/0x100 [ 782.923550] do_syscall_64+0x1b9/0x820 [ 782.927440] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 782.932809] ? syscall_return_slowpath+0x5e0/0x5e0 [ 782.937736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.942588] ? trace_hardirqs_on_caller+0x310/0x310 [ 782.947610] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 782.952645] ? prepare_exit_to_usermode+0x291/0x3b0 [ 782.957687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 782.962556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.967748] RIP: 0033:0x457569 [ 782.970947] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.989851] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:02:06 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r4 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x801, 0x0) write$FUSE_CREATE_OPEN(r5, &(0x7f0000000500)={0xa0, 0x0, 0x8, {{0x4, 0x0, 0xbe1, 0x401, 0x3914dd2d, 0x2, {0x2, 0x6, 0x100000001, 0x4, 0x9, 0x1, 0x6, 0x20, 0xffffffffffffffc1, 0x80000001, 0x8000, r2, r3, 0x2ccb0fe8, 0x1}}, {0x0, 0x3}}}, 0xa0) write$UHID_CREATE(r4, &(0x7f0000001080)={0x0, 'syz1\x00', "737978310000000000000000000000000000000200000057310f00000000000000000000000000170000220000000000000000000000000000000000001400", 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) inotify_init1(0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000040)=0x455) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) write$binfmt_script(r1, 0x0, 0x4ee) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x3) ioctl$TIOCLINUX2(r6, 0x541c, 0x0) 13:02:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="0e00000000000000ff00e3009f72e30f6384da963fa39bd85aadcdee3ec53ef8a8fbdc24335b945a49f898884a5c4a3f046db4c20606f3a73d089f5a5bf2be3ec2aae5cc1797f227db3f708d8b87e1cce8a4fba8a3f42894189d4583d854002febe61eeb50172a7dbcbfc95efda4656cc548385794f2cc623460eda55db546b60650712ccd74136a17ad0e5bfeeb158c209e6f81b81e3bfd3b4160dde036486c3999753d7af6505e03e60025e3827cf1589b6e4a44669e2d41095db1885dc0f0b6d4d2669ad03014e77916d8283e7932a8d4429453257b0b0c7b2e8691aab2c9c6d219c8f0fa3fb3516a41134e4cd0ee5b01714305"], 0xef) r2 = memfd_create(&(0x7f00000002c0)='/dev/dsp#\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x7, @mcast2, 0x3}, 0x1c) read(r3, &(0x7f00000000c0)=""/11, 0xb) r4 = semget(0x3, 0x6, 0x200) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x3) semtimedop(r4, &(0x7f0000000240)=[{0x1, 0x7, 0x800}, {0x7, 0x100000000, 0x1000}, {0x0, 0x5, 0x1000}, {0x1, 0x5, 0x800}, {0x3, 0x4, 0x1800}, {0x7, 0x1, 0x1800}], 0x6, &(0x7f0000000280)={0x77359400}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000100)={{0xffffffffffffffff, 0x3, 0x200, 0x3, 0x2c1}, 0x100000001, 0x9, 0x7}) 13:02:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00?\x00'}, 0x18) [ 782.997553] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 783.004816] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 783.012080] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 783.019360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 783.026622] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 783.084875] IPVS: Unknown mcast interface: syzkaller1 13:02:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:06 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) recvmmsg(r1, &(0x7f0000004340)=[{{&(0x7f0000000140)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/213, 0xd5}, {&(0x7f00000001c0)=""/112, 0x70}], 0x2, 0x0, 0x0, 0x7}, 0x6}, {{&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000440)=""/143, 0x8f}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000500)=""/23, 0x17}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/4096, 0x1000}], 0x5, &(0x7f00000025c0)=""/48, 0x30, 0x100000001}, 0x2}, {{&(0x7f0000002600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002780)=[{&(0x7f0000002680)=""/73, 0x49}, {&(0x7f0000002700)=""/1, 0x1}, {&(0x7f0000002740)=""/31, 0x1f}], 0x3, &(0x7f00000027c0)=""/181, 0xb5, 0x3}, 0x9e}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002880)=""/58, 0x3a}, {&(0x7f00000028c0)=""/127, 0x7f}, {&(0x7f0000002940)=""/108, 0x6c}], 0x3, &(0x7f0000002a00)=""/238, 0xee}, 0xb2}, {{&(0x7f0000002b00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002b80)=""/231, 0xe7}, {&(0x7f0000002c80)=""/240, 0xf0}, {&(0x7f0000002d80)=""/252, 0xfc}, {&(0x7f0000002e80)=""/4096, 0x1000}], 0x4, &(0x7f0000003ec0)=""/61, 0x3d, 0x537}}, {{&(0x7f0000003f00)=@can, 0x80, &(0x7f0000004200)=[{&(0x7f0000003f80)=""/43, 0x2b}, {&(0x7f0000003fc0)=""/254, 0xfe}, {&(0x7f00000040c0)=""/95, 0x5f}, {&(0x7f0000004140)=""/158, 0x9e}], 0x4, &(0x7f0000004240)=""/202, 0xca, 0xefe4}, 0x7}], 0x6, 0x40000000, &(0x7f00000044c0)={0x0, 0x989680}) r2 = syz_open_pts(0xffffffffffffffff, 0x410000) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000004500)=0x9) 13:02:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572317fffffff00"}, 0x18) 13:02:06 executing program 3 (fault-call:4 fault-nth:68): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 783.229212] FAULT_INJECTION: forcing a failure. [ 783.229212] name failslab, interval 1, probability 0, space 0, times 0 [ 783.243469] IPVS: Unknown mcast interface: syzkaller1ÿÿÿ [ 783.246900] CPU: 0 PID: 30652 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 783.256369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.265726] Call Trace: [ 783.268325] dump_stack+0x244/0x39d [ 783.271961] ? dump_stack_print_info.cold.1+0x20/0x20 [ 783.277158] should_fail.cold.4+0xa/0x17 [ 783.277188] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 783.277202] ? do_syscall_64+0x1b9/0x820 [ 783.277232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.277247] ? trace_hardirqs_off+0xb8/0x310 [ 783.277261] ? kasan_check_read+0x11/0x20 [ 783.277289] ? mark_held_locks+0x130/0x130 [ 783.277311] ? trace_hardirqs_off+0xb8/0x310 [ 783.277330] ? find_held_lock+0x36/0x1c0 [ 783.277377] ? rcu_read_lock_sched_held+0x14f/0x180 [ 783.286499] ? perf_trace_sched_process_exec+0x860/0x860 13:02:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310400"}, 0x18) 13:02:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@loopback}, &(0x7f0000000080)=0x369) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 783.286522] __should_failslab+0x124/0x180 [ 783.286539] should_failslab+0x9/0x14 [ 783.286552] kmem_cache_alloc_node+0x26e/0x730 [ 783.286567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.286582] ? refcount_sub_and_test_checked+0x203/0x310 [ 783.286599] __alloc_skb+0x119/0x770 [ 783.286614] ? netdev_alloc_frag+0x1f0/0x1f0 [ 783.286628] ? perf_trace_sched_process_exec+0x860/0x860 [ 783.286641] ? lock_downgrade+0x900/0x900 [ 783.286658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 783.286674] ? aa_label_sk_perm+0x91/0x100 13:02:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x1, 0x100) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e22, 0x8, @empty, 0x81}, r1}}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c464b86e443100100000000000000003e4f42ba499fbff6667713d51daca9d62f3c361504db16ffc68f797c47c342835ac37b0fd188"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000300)={0x6, 0x0, 0x2, 0x1f}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000340)={0xfff, r3}) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r4, &(0x7f00000000c0)=""/11, 0xb) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000100)) [ 783.286690] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 783.286702] ? aa_sk_perm+0x22b/0x8e0 [ 783.286716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.286728] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 783.286755] netlink_sendmsg+0xb29/0xfc0 [ 783.300545] ? netlink_unicast+0x760/0x760 [ 783.300559] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 783.300574] ? apparmor_socket_sendmsg+0x29/0x30 [ 783.308920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.308938] ? security_socket_sendmsg+0x94/0xc0 [ 783.308953] ? netlink_unicast+0x760/0x760 [ 783.308971] sock_sendmsg+0xd5/0x120 [ 783.308987] ___sys_sendmsg+0x51d/0x930 [ 783.309003] ? zap_class+0x640/0x640 [ 783.346972] IPVS: Unknown mcast interface: syzkaller1 [ 783.351415] ? copy_msghdr_from_user+0x580/0x580 [ 783.351434] ? get_pid_task+0xd6/0x1a0 [ 783.351470] ? find_held_lock+0x36/0x1c0 [ 783.351491] ? __might_fault+0x12b/0x1e0 [ 783.402659] ? lock_downgrade+0x900/0x900 [ 783.411798] ? perf_trace_sched_process_exec+0x860/0x860 [ 783.431023] __sys_sendmmsg+0x246/0x6d0 [ 783.431047] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 783.431062] ? __lock_is_held+0xb5/0x140 [ 783.431082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.438730] ? check_preemption_disabled+0x48/0x280 [ 783.438773] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 783.438789] ? fput+0x130/0x1a0 [ 783.438805] ? do_syscall_64+0x9a/0x820 [ 783.438820] ? do_syscall_64+0x9a/0x820 [ 783.438845] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 783.438861] ? trace_hardirqs_on+0xbd/0x310 [ 783.496954] ? __ia32_sys_read+0xb0/0xb0 [ 783.505741] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.531916] ? trace_hardirqs_off_caller+0x310/0x310 [ 783.537018] __x64_sys_sendmmsg+0x9d/0x100 [ 783.541240] do_syscall_64+0x1b9/0x820 [ 783.545130] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 783.550487] ? syscall_return_slowpath+0x5e0/0x5e0 [ 783.555438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.560273] ? trace_hardirqs_on_caller+0x310/0x310 [ 783.565269] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 783.570279] ? prepare_exit_to_usermode+0x291/0x3b0 [ 783.575284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 783.580108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.585294] RIP: 0033:0x457569 [ 783.588466] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.607344] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 783.615045] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 783.622309] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 783.629562] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 783.636814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 783.644065] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00?\x00'}, 0x18) 13:02:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4a000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, r2, 0x302, 0x70bd2b, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0x191) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) read(r4, &(0x7f00000000c0)=""/11, 0xb) 13:02:07 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r4 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x801, 0x0) write$FUSE_CREATE_OPEN(r5, &(0x7f0000000500)={0xa0, 0x0, 0x8, {{0x4, 0x0, 0xbe1, 0x401, 0x3914dd2d, 0x2, {0x2, 0x6, 0x100000001, 0x4, 0x9, 0x1, 0x6, 0x20, 0xffffffffffffffc1, 0x80000001, 0x8000, r2, r3, 0x2ccb0fe8, 0x1}}, {0x0, 0x3}}}, 0xa0) write$UHID_CREATE(r4, &(0x7f0000001080)={0x0, 'syz1\x00', "737978310000000000000000000000000000000200000057310f00000000000000000000000000170000220000000000000000000000000000000000001400", 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x11c) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) inotify_init1(0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000040)=0x455) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) write$binfmt_script(r1, 0x0, 0x4ee) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x3) ioctl$TIOCLINUX2(r6, 0x541c, 0x0) 13:02:07 executing program 3 (fault-call:4 fault-nth:69): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x32000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0xfff, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x6, 0x202203) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)={0x800100d, 0x1, 0x1}) write$input_event(r2, &(0x7f0000000380)={{0x0, 0x2710}, 0x17, 0x28, 0x8}, 0x18) keyctl$join(0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x40001}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000002c0)={{0x9, 0x4, 0xb3, 0x6, 0x401}, 0x2, 0x10, 0x2, 0x4, 0xff, "52f0db0a3854536ab75b2e62b02bb0a433e1bd79462c2d7bd1e564f3f599a1eb3015a9aac48bddbb1ef959051dc2b292a11c60dc2f693270dadc58fe095c8cc0d8d5656bc38517016a3ec4f4ea260e9f28f6f02436b066bed0cec893055197a47eb25c8142e9360ec32879b55177dd79a49475865bed868e32b5f78844285224"}) r4 = gettid() ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000140)) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) [ 783.752366] IPVS: Unknown mcast interface: syzkaller1 [ 783.775324] FAULT_INJECTION: forcing a failure. [ 783.775324] name failslab, interval 1, probability 0, space 0, times 0 [ 783.810132] CPU: 0 PID: 30687 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 783.817520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.817527] Call Trace: [ 783.817551] dump_stack+0x244/0x39d [ 783.817572] ? dump_stack_print_info.cold.1+0x20/0x20 [ 783.817599] should_fail.cold.4+0xa/0x17 [ 783.842448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 783.847553] ? __save_stack_trace+0x8d/0xf0 [ 783.851893] ? save_stack+0xa9/0xd0 [ 783.855530] ? save_stack+0x43/0xd0 [ 783.859162] ? find_held_lock+0x36/0x1c0 [ 783.863252] ? perf_trace_sched_process_exec+0x860/0x860 [ 783.868701] ? check_preemption_disabled+0x48/0x280 13:02:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310300"}, 0x18) [ 783.873728] __should_failslab+0x124/0x180 [ 783.877965] should_failslab+0x9/0x14 [ 783.881886] kmem_cache_alloc_node_trace+0x270/0x740 [ 783.887010] __kmalloc_node_track_caller+0x3c/0x70 [ 783.891940] __kmalloc_reserve.isra.40+0x41/0xe0 [ 783.896702] __alloc_skb+0x155/0x770 [ 783.900438] ? netdev_alloc_frag+0x1f0/0x1f0 [ 783.904848] ? perf_trace_sched_process_exec+0x860/0x860 [ 783.910286] ? lock_downgrade+0x900/0x900 [ 783.914437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 783.919987] ? aa_label_sk_perm+0x91/0x100 [ 783.924209] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 783.929125] ? aa_sk_perm+0x22b/0x8e0 [ 783.932917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.938546] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 783.944072] netlink_sendmsg+0xb29/0xfc0 [ 783.948136] ? netlink_unicast+0x760/0x760 [ 783.952353] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 783.957279] ? apparmor_socket_sendmsg+0x29/0x30 [ 783.962023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.967544] ? security_socket_sendmsg+0x94/0xc0 [ 783.972283] ? netlink_unicast+0x760/0x760 [ 783.976504] sock_sendmsg+0xd5/0x120 [ 783.980205] ___sys_sendmsg+0x51d/0x930 [ 783.984166] ? zap_class+0x640/0x640 [ 783.987871] ? copy_msghdr_from_user+0x580/0x580 [ 783.992623] ? get_pid_task+0xd6/0x1a0 [ 783.996502] ? find_held_lock+0x36/0x1c0 [ 784.000568] ? __might_fault+0x12b/0x1e0 [ 784.004615] ? lock_downgrade+0x900/0x900 [ 784.008761] ? perf_trace_sched_process_exec+0x860/0x860 [ 784.014201] __sys_sendmmsg+0x246/0x6d0 [ 784.018168] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 784.022473] ? __lock_is_held+0xb5/0x140 [ 784.026519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.032041] ? check_preemption_disabled+0x48/0x280 [ 784.037049] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 784.042568] ? fput+0x130/0x1a0 [ 784.045833] ? do_syscall_64+0x9a/0x820 [ 784.049790] ? do_syscall_64+0x9a/0x820 [ 784.053752] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 784.058318] ? trace_hardirqs_on+0xbd/0x310 [ 784.062639] ? __ia32_sys_read+0xb0/0xb0 [ 784.066706] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.072055] ? trace_hardirqs_off_caller+0x310/0x310 [ 784.077146] __x64_sys_sendmmsg+0x9d/0x100 [ 784.081388] do_syscall_64+0x1b9/0x820 [ 784.085348] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 784.090701] ? syscall_return_slowpath+0x5e0/0x5e0 [ 784.095625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.100453] ? trace_hardirqs_on_caller+0x310/0x310 [ 784.105451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 784.110446] ? prepare_exit_to_usermode+0x291/0x3b0 [ 784.115447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.120282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.125453] RIP: 0033:0x457569 [ 784.128630] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.147512] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 784.155204] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 784.162465] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 784.169726] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 784.176979] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 784.184231] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 784.201833] IPVS: Unknown mcast interface: syzkaller1 13:02:07 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1`\x00'}, 0x18) 13:02:07 executing program 3 (fault-call:4 fault-nth:70): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 784.287647] IPVS: Unknown mcast interface: syzkaller1` 13:02:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x32000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0xfff, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x6, 0x202203) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)={0x800100d, 0x1, 0x1}) write$input_event(r2, &(0x7f0000000380)={{0x0, 0x2710}, 0x17, 0x28, 0x8}, 0x18) keyctl$join(0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x40001}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000002c0)={{0x9, 0x4, 0xb3, 0x6, 0x401}, 0x2, 0x10, 0x2, 0x4, 0xff, "52f0db0a3854536ab75b2e62b02bb0a433e1bd79462c2d7bd1e564f3f599a1eb3015a9aac48bddbb1ef959051dc2b292a11c60dc2f693270dadc58fe095c8cc0d8d5656bc38517016a3ec4f4ea260e9f28f6f02436b066bed0cec893055197a47eb25c8142e9360ec32879b55177dd79a49475865bed868e32b5f78844285224"}) r4 = gettid() ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000140)) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) [ 784.330188] FAULT_INJECTION: forcing a failure. [ 784.330188] name failslab, interval 1, probability 0, space 0, times 0 [ 784.367350] CPU: 0 PID: 30712 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 784.374847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.384203] Call Trace: [ 784.386819] dump_stack+0x244/0x39d [ 784.390460] ? dump_stack_print_info.cold.1+0x20/0x20 [ 784.395666] should_fail.cold.4+0xa/0x17 [ 784.399748] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 784.404857] ? do_syscall_64+0x1b9/0x820 [ 784.408924] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.414292] ? trace_hardirqs_off+0xb8/0x310 [ 784.418711] ? kasan_check_read+0x11/0x20 [ 784.422872] ? mark_held_locks+0x130/0x130 [ 784.427110] ? trace_hardirqs_off+0xb8/0x310 [ 784.431530] ? find_held_lock+0x36/0x1c0 [ 784.435617] ? rcu_read_lock_sched_held+0x14f/0x180 [ 784.440642] ? perf_trace_sched_process_exec+0x860/0x860 [ 784.446110] __should_failslab+0x124/0x180 [ 784.450353] should_failslab+0x9/0x14 [ 784.454157] kmem_cache_alloc_node+0x26e/0x730 [ 784.458746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.464301] ? refcount_sub_and_test_checked+0x203/0x310 [ 784.469770] __alloc_skb+0x119/0x770 [ 784.473508] ? netdev_alloc_frag+0x1f0/0x1f0 13:02:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 784.477922] ? perf_trace_sched_process_exec+0x860/0x860 [ 784.483379] ? lock_downgrade+0x900/0x900 [ 784.487544] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 784.493089] ? aa_label_sk_perm+0x91/0x100 [ 784.497349] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 784.502285] ? aa_sk_perm+0x22b/0x8e0 [ 784.502305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.511636] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 784.517213] netlink_sendmsg+0xb29/0xfc0 [ 784.521300] ? netlink_unicast+0x760/0x760 [ 784.525548] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 784.530491] ? apparmor_socket_sendmsg+0x29/0x30 [ 784.535258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.535276] ? security_socket_sendmsg+0x94/0xc0 [ 784.535292] ? netlink_unicast+0x760/0x760 [ 784.545576] sock_sendmsg+0xd5/0x120 [ 784.545595] ___sys_sendmsg+0x51d/0x930 [ 784.545614] ? zap_class+0x640/0x640 [ 784.561240] ? copy_msghdr_from_user+0x580/0x580 [ 784.566012] ? get_pid_task+0xd6/0x1a0 [ 784.569922] ? find_held_lock+0x36/0x1c0 [ 784.574008] ? __might_fault+0x12b/0x1e0 [ 784.578084] ? lock_downgrade+0x900/0x900 [ 784.582252] ? perf_trace_sched_process_exec+0x860/0x860 [ 784.587742] __sys_sendmmsg+0x246/0x6d0 [ 784.591738] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 784.596074] ? __lock_is_held+0xb5/0x140 [ 784.600153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.605708] ? check_preemption_disabled+0x48/0x280 [ 784.610741] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 784.616284] ? fput+0x130/0x1a0 [ 784.619573] ? do_syscall_64+0x9a/0x820 [ 784.623553] ? do_syscall_64+0x9a/0x820 [ 784.627537] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 784.632126] ? trace_hardirqs_on+0xbd/0x310 [ 784.636455] ? __ia32_sys_read+0xb0/0xb0 [ 784.640526] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.645897] ? trace_hardirqs_off_caller+0x310/0x310 [ 784.651018] __x64_sys_sendmmsg+0x9d/0x100 [ 784.655265] do_syscall_64+0x1b9/0x820 [ 784.659161] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 784.664535] ? syscall_return_slowpath+0x5e0/0x5e0 [ 784.669473] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.674324] ? trace_hardirqs_on_caller+0x310/0x310 [ 784.679351] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 784.684375] ? prepare_exit_to_usermode+0x291/0x3b0 [ 784.689403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 784.694260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.699455] RIP: 0033:0x457569 [ 784.702655] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.721581] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:02:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000600"}, 0x18) [ 784.729299] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 784.736577] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 784.743850] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 784.751125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 784.758401] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 784.774616] IPVS: Unknown mcast interface: syzkaller1 13:02:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400204) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) 13:02:08 executing program 3 (fault-call:4 fault-nth:71): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 784.845778] IPVS: Unknown mcast interface: syzkaller1 [ 784.931900] FAULT_INJECTION: forcing a failure. [ 784.931900] name failslab, interval 1, probability 0, space 0, times 0 [ 784.966458] CPU: 0 PID: 30740 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 784.973862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.983221] Call Trace: [ 784.985808] dump_stack+0x244/0x39d [ 784.989447] ? dump_stack_print_info.cold.1+0x20/0x20 [ 784.994670] should_fail.cold.4+0xa/0x17 [ 784.998727] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 785.003826] ? __save_stack_trace+0x8d/0xf0 [ 785.008150] ? save_stack+0xa9/0xd0 [ 785.011770] ? save_stack+0x43/0xd0 [ 785.015390] ? find_held_lock+0x36/0x1c0 [ 785.019458] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.024907] ? check_preemption_disabled+0x48/0x280 [ 785.029918] __should_failslab+0x124/0x180 [ 785.034146] should_failslab+0x9/0x14 [ 785.037940] kmem_cache_alloc_node_trace+0x270/0x740 [ 785.043045] __kmalloc_node_track_caller+0x3c/0x70 [ 785.047973] __kmalloc_reserve.isra.40+0x41/0xe0 [ 785.052759] __alloc_skb+0x155/0x770 [ 785.056486] ? netdev_alloc_frag+0x1f0/0x1f0 [ 785.060897] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.066338] ? lock_downgrade+0x900/0x900 [ 785.070485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 785.076017] ? aa_label_sk_perm+0x91/0x100 [ 785.080254] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 785.085188] ? aa_sk_perm+0x22b/0x8e0 [ 785.088981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.094514] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 785.100049] netlink_sendmsg+0xb29/0xfc0 [ 785.104109] ? netlink_unicast+0x760/0x760 [ 785.108342] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 785.113277] ? apparmor_socket_sendmsg+0x29/0x30 [ 785.118031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.123564] ? security_socket_sendmsg+0x94/0xc0 [ 785.128321] ? netlink_unicast+0x760/0x760 [ 785.132570] sock_sendmsg+0xd5/0x120 [ 785.136300] ___sys_sendmsg+0x51d/0x930 [ 785.140271] ? zap_class+0x640/0x640 [ 785.143978] ? copy_msghdr_from_user+0x580/0x580 [ 785.148727] ? get_pid_task+0xd6/0x1a0 [ 785.152606] ? find_held_lock+0x36/0x1c0 [ 785.156686] ? __might_fault+0x12b/0x1e0 [ 785.160741] ? lock_downgrade+0x900/0x900 [ 785.164895] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.170348] __sys_sendmmsg+0x246/0x6d0 [ 785.174318] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 785.178655] ? __lock_is_held+0xb5/0x140 [ 785.182712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.188243] ? check_preemption_disabled+0x48/0x280 [ 785.193260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 785.198789] ? fput+0x130/0x1a0 [ 785.202060] ? do_syscall_64+0x9a/0x820 [ 785.206034] ? do_syscall_64+0x9a/0x820 [ 785.210024] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 785.214612] ? trace_hardirqs_on+0xbd/0x310 [ 785.218945] ? __ia32_sys_read+0xb0/0xb0 [ 785.223002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.228359] ? trace_hardirqs_off_caller+0x310/0x310 [ 785.233460] __x64_sys_sendmmsg+0x9d/0x100 [ 785.237688] do_syscall_64+0x1b9/0x820 [ 785.241566] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 785.247106] ? syscall_return_slowpath+0x5e0/0x5e0 [ 785.252030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.256873] ? trace_hardirqs_on_caller+0x310/0x310 [ 785.261990] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 785.267000] ? prepare_exit_to_usermode+0x291/0x3b0 [ 785.272012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.276862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.282050] RIP: 0033:0x457569 [ 785.285237] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.304130] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 785.311829] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 785.319093] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 785.326364] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 13:02:08 executing program 2: syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x37b5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 13:02:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\a\x00'}, 0x18) [ 785.333652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 785.340923] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:08 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb9, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x32000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0xfff, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x6, 0x202203) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)={0x800100d, 0x1, 0x1}) write$input_event(r2, &(0x7f0000000380)={{0x0, 0x2710}, 0x17, 0x28, 0x8}, 0x18) keyctl$join(0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000f6bfe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x40001}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f00000002c0)={{0x9, 0x4, 0xb3, 0x6, 0x401}, 0x2, 0x10, 0x2, 0x4, 0xff, "52f0db0a3854536ab75b2e62b02bb0a433e1bd79462c2d7bd1e564f3f599a1eb3015a9aac48bddbb1ef959051dc2b292a11c60dc2f693270dadc58fe095c8cc0d8d5656bc38517016a3ec4f4ea260e9f28f6f02436b066bed0cec893055197a47eb25c8142e9360ec32879b55177dd79a49475865bed868e32b5f78844285224"}) r4 = gettid() ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000140)) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) [ 785.383270] IPVS: Unknown mcast interface: syzkaller1 13:02:08 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000380)={0x4, 0x4, 0x5, 0x80000001, 0x8}, 0x14) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400800, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000400)={0x56, 0xfffffffffffffff8, 0x7, {0x5, 0x9}, {0x8001, 0x5}, @period={0x0, 0x8, 0x2, 0x1ff, 0xac, {0x8, 0x5, 0x101, 0x10000}, 0x3, &(0x7f00000003c0)=[0xd6, 0xaff0, 0x9]}}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000002c0)={@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x8, 0x7, "20cfe43851420947505f085db03f54d5da5be3da7ab2e2c572d4868e0151472c4a8f16e7124e39dee712fd71ab24ddff530aeb36d05f91258645a4862c829f", 0x2a}, {&(0x7f0000000180)=""/115, 0x73}, &(0x7f0000000200), 0x2}, 0xa0) 13:02:08 executing program 3 (fault-call:4 fault-nth:72): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000080)=0x7fffffff) [ 785.464729] FAULT_INJECTION: forcing a failure. [ 785.464729] name failslab, interval 1, probability 0, space 0, times 0 [ 785.502229] CPU: 1 PID: 30759 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 785.509658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.509666] Call Trace: [ 785.509688] dump_stack+0x244/0x39d [ 785.509715] ? dump_stack_print_info.cold.1+0x20/0x20 [ 785.530518] should_fail.cold.4+0xa/0x17 [ 785.530539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 785.530554] ? do_syscall_64+0x1b9/0x820 [ 785.530572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.549199] ? trace_hardirqs_off+0xb8/0x310 [ 785.549216] ? kasan_check_read+0x11/0x20 [ 785.549246] ? mark_held_locks+0x130/0x130 [ 785.549260] ? trace_hardirqs_off+0xb8/0x310 [ 785.549281] ? find_held_lock+0x36/0x1c0 [ 785.549314] ? rcu_read_lock_sched_held+0x14f/0x180 [ 785.566470] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.566497] __should_failslab+0x124/0x180 [ 785.566516] should_failslab+0x9/0x14 [ 785.575573] kmem_cache_alloc_node+0x26e/0x730 [ 785.575590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.575627] ? refcount_sub_and_test_checked+0x203/0x310 [ 785.604689] __alloc_skb+0x119/0x770 [ 785.604712] ? netdev_alloc_frag+0x1f0/0x1f0 13:02:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x2, 0x7fff, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:08 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) getpeername$unix(r0, &(0x7f0000000100), &(0x7f0000000080)=0x6e) ioctl$TIOCSTI(r1, 0x5412, 0x6) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) [ 785.604729] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.604750] ? lock_downgrade+0x900/0x900 [ 785.622469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 785.622488] ? aa_label_sk_perm+0x91/0x100 [ 785.622508] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 785.622527] ? aa_sk_perm+0x22b/0x8e0 [ 785.641027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.641044] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 785.641066] netlink_sendmsg+0xb29/0xfc0 [ 785.641089] ? netlink_unicast+0x760/0x760 [ 785.641104] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 785.641128] ? apparmor_socket_sendmsg+0x29/0x30 [ 785.641144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.641161] ? security_socket_sendmsg+0x94/0xc0 [ 785.641175] ? netlink_unicast+0x760/0x760 [ 785.641194] sock_sendmsg+0xd5/0x120 [ 785.641212] ___sys_sendmsg+0x51d/0x930 [ 785.641227] ? zap_class+0x640/0x640 [ 785.641248] ? copy_msghdr_from_user+0x580/0x580 [ 785.641268] ? get_pid_task+0xd6/0x1a0 [ 785.641288] ? find_held_lock+0x36/0x1c0 13:02:09 executing program 3 (fault-call:4 fault-nth:73): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003ee7b2e46f10957bc6fae138cf7561272e3370f3b503a52aa26c4170a2fcf01784d15bc457a320fb42029c3c5317c27ae50ed30ec370b81ace07df86"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 785.641314] ? __might_fault+0x12b/0x1e0 [ 785.641330] ? lock_downgrade+0x900/0x900 [ 785.641361] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.641388] __sys_sendmmsg+0x246/0x6d0 [ 785.641413] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 785.641431] ? __lock_is_held+0xb5/0x140 [ 785.641452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.641470] ? check_preemption_disabled+0x48/0x280 [ 785.641499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 785.641516] ? fput+0x130/0x1a0 [ 785.641533] ? do_syscall_64+0x9a/0x820 [ 785.641547] ? do_syscall_64+0x9a/0x820 [ 785.641564] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 785.641581] ? trace_hardirqs_on+0xbd/0x310 [ 785.641596] ? __ia32_sys_read+0xb0/0xb0 [ 785.641631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.641648] ? trace_hardirqs_off_caller+0x310/0x310 [ 785.641669] __x64_sys_sendmmsg+0x9d/0x100 [ 785.641687] do_syscall_64+0x1b9/0x820 [ 785.641701] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 785.641719] ? syscall_return_slowpath+0x5e0/0x5e0 [ 785.641734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.641750] ? trace_hardirqs_on_caller+0x310/0x310 [ 785.641767] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 785.641784] ? prepare_exit_to_usermode+0x291/0x3b0 [ 785.641806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 785.641828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.641839] RIP: 0033:0x457569 [ 785.641856] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 785.641865] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 785.641879] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 785.641888] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 785.641897] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 785.641906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 785.641915] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 785.765209] FAULT_INJECTION: forcing a failure. [ 785.765209] name failslab, interval 1, probability 0, space 0, times 0 [ 785.771393] IPVS: Unknown mcast interface: syzkaller1 [ 785.774367] CPU: 0 PID: 30788 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 785.780666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.791106] Call Trace: [ 785.791131] dump_stack+0x244/0x39d [ 785.791154] ? dump_stack_print_info.cold.1+0x20/0x20 [ 785.799258] should_fail.cold.4+0xa/0x17 [ 785.799276] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 785.799295] ? __save_stack_trace+0x8d/0xf0 [ 785.814415] ? save_stack+0xa9/0xd0 [ 785.829435] ? save_stack+0x43/0xd0 [ 785.829462] ? find_held_lock+0x36/0x1c0 [ 785.974957] ? ibdev_show+0x1c8/0x330 [ 785.974980] ? ibdev_show+0x1c8/0x330 [ 785.974995] ? perf_trace_sched_process_exec+0x860/0x860 [ 785.975017] ? check_preemption_disabled+0x48/0x280 [ 785.975038] __should_failslab+0x124/0x180 [ 785.975059] should_failslab+0x9/0x14 [ 786.001080] kmem_cache_alloc_node_trace+0x270/0x740 [ 786.001107] __kmalloc_node_track_caller+0x3c/0x70 [ 786.001128] __kmalloc_reserve.isra.40+0x41/0xe0 [ 786.001147] __alloc_skb+0x155/0x770 [ 786.001166] ? netdev_alloc_frag+0x1f0/0x1f0 [ 786.024021] ? perf_trace_sched_process_exec+0x860/0x860 [ 786.024039] ? lock_downgrade+0x900/0x900 [ 786.024063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.024080] ? aa_label_sk_perm+0x91/0x100 [ 786.024098] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 786.048332] ? aa_sk_perm+0x22b/0x8e0 [ 786.048349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.048364] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 786.048385] netlink_sendmsg+0xb29/0xfc0 [ 786.048407] ? netlink_unicast+0x760/0x760 [ 786.071535] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 786.071554] ? apparmor_socket_sendmsg+0x29/0x30 [ 786.071570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.071609] ? security_socket_sendmsg+0x94/0xc0 [ 786.071625] ? netlink_unicast+0x760/0x760 [ 786.071645] sock_sendmsg+0xd5/0x120 [ 786.099511] ___sys_sendmsg+0x51d/0x930 [ 786.099527] ? zap_class+0x640/0x640 [ 786.099548] ? copy_msghdr_from_user+0x580/0x580 [ 786.099568] ? get_pid_task+0xd6/0x1a0 [ 786.099610] ? find_held_lock+0x36/0x1c0 [ 786.119972] ? __might_fault+0x12b/0x1e0 [ 786.119990] ? lock_downgrade+0x900/0x900 [ 786.120020] ? perf_trace_sched_process_exec+0x860/0x860 [ 786.120047] __sys_sendmmsg+0x246/0x6d0 [ 786.137656] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 786.137675] ? __lock_is_held+0xb5/0x140 [ 786.137698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.137723] ? check_preemption_disabled+0x48/0x280 [ 786.156645] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 786.156661] ? fput+0x130/0x1a0 [ 786.156676] ? do_syscall_64+0x9a/0x820 [ 786.156694] ? do_syscall_64+0x9a/0x820 [ 786.173409] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 786.173427] ? trace_hardirqs_on+0xbd/0x310 [ 786.173442] ? __ia32_sys_read+0xb0/0xb0 [ 786.173456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.173474] ? trace_hardirqs_off_caller+0x310/0x310 [ 786.196839] __x64_sys_sendmmsg+0x9d/0x100 [ 786.196859] do_syscall_64+0x1b9/0x820 [ 786.196873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 786.196891] ? syscall_return_slowpath+0x5e0/0x5e0 [ 786.196904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.196922] ? trace_hardirqs_on_caller+0x310/0x310 [ 786.225115] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 786.225132] ? prepare_exit_to_usermode+0x291/0x3b0 [ 786.225153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.225175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.225190] RIP: 0033:0x457569 [ 786.248371] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 786.248380] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 786.248394] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 786.248404] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 786.248412] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 786.248421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 786.248430] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'osx.', '/dev/ptmx\x00'}, &(0x7f0000000140)="fa", 0x1, 0x2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:09 executing program 3 (fault-call:4 fault-nth:74): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x21, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x75, &(0x7f0000000040), 0x8) close(r2) close(r1) r3 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0xc1105511, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) 13:02:09 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="7cca32d64186c273ecdd6826b4bb4a6eef99a9d0b3e8e5eed941432f6389702f8c36e02f8635e63aab19000bd688d09c2286fa67a8db13168391affbb31808bad20c5af66cef63eee15ca8f57684c293f94f0ec0dc23c72692ea14eab25f8a82e75a496e55f4f60d786f4a4cde0dc9cbbff871f08094a768c29f761daf7099ea4e1e6552960babdba33bbffd1faccf4466055062a0d63f1b118ef0889d160ecb1cd4a594d9775ade0d7c3119b1c3c000f9422691e5d4220dd6698c868ce56d0038f2", 0xc2, r0}, 0x68) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) socket$kcm(0xa, 0x2, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) 13:02:09 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') mmap(&(0x7f0000bcd000/0x4000)=nil, 0x4000, 0x1, 0x200000000031, r0, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fddbdf2501000000080003005c00000008001d004e230000080001004e21000004000500"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000c0) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000002180)={&(0x7f0000001180)=""/4096, 0x1000}) getsockname$unix(r2, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) [ 786.448769] IPVS: Unknown mcast interface: syzkaller1 [ 786.458068] FAULT_INJECTION: forcing a failure. [ 786.458068] name failslab, interval 1, probability 0, space 0, times 0 [ 786.470770] CPU: 0 PID: 30815 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 786.478152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.487511] Call Trace: [ 786.490119] dump_stack+0x244/0x39d [ 786.493768] ? dump_stack_print_info.cold.1+0x20/0x20 [ 786.498971] should_fail.cold.4+0xa/0x17 [ 786.503032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 786.508132] ? do_syscall_64+0x1b9/0x820 [ 786.512186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.517544] ? trace_hardirqs_off+0xb8/0x310 [ 786.521973] ? kasan_check_read+0x11/0x20 [ 786.526129] ? mark_held_locks+0x130/0x130 [ 786.530372] ? trace_hardirqs_off+0xb8/0x310 [ 786.534801] ? find_held_lock+0x36/0x1c0 [ 786.538882] ? context_struct_compute_av+0x1508/0x1600 [ 786.544186] ? rcu_read_lock_sched_held+0x14f/0x180 13:02:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xfffffec4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x400}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fstat(0xffffffffffffffff, &(0x7f0000000140)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = gettid() clock_gettime(0x3, &(0x7f0000000400)) clock_nanosleep(0x2, 0x1, &(0x7f0000000040), &(0x7f0000000100)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) creat(&(0x7f0000000300)='./file0\x00', 0x2) sched_setparam(0x0, &(0x7f0000000240)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r4, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) tkill(r2, 0x1004000000016) getgroups(0x3, &(0x7f0000000440)=[0xee01, 0x0, 0xee01]) [ 786.549213] ? perf_trace_sched_process_exec+0x860/0x860 [ 786.554686] __should_failslab+0x124/0x180 [ 786.558938] should_failslab+0x9/0x14 [ 786.562754] kmem_cache_alloc_node+0x26e/0x730 [ 786.567347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.567366] ? refcount_sub_and_test_checked+0x203/0x310 [ 786.567391] __alloc_skb+0x119/0x770 [ 786.567411] ? netdev_alloc_frag+0x1f0/0x1f0 [ 786.567428] ? perf_trace_sched_process_exec+0x860/0x860 [ 786.567445] ? lock_downgrade+0x900/0x900 [ 786.567467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 786.578440] ? aa_label_sk_perm+0x91/0x100 [ 786.578461] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 786.578476] ? aa_sk_perm+0x22b/0x8e0 [ 786.578493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.578509] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 786.578527] netlink_sendmsg+0xb29/0xfc0 [ 786.578569] ? netlink_unicast+0x760/0x760 [ 786.633985] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 786.638912] ? apparmor_socket_sendmsg+0x29/0x30 [ 786.643666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.649198] ? security_socket_sendmsg+0x94/0xc0 [ 786.653949] ? netlink_unicast+0x760/0x760 [ 786.658182] sock_sendmsg+0xd5/0x120 [ 786.661891] ___sys_sendmsg+0x51d/0x930 [ 786.665861] ? zap_class+0x640/0x640 [ 786.669589] ? copy_msghdr_from_user+0x580/0x580 [ 786.674342] ? get_pid_task+0xd6/0x1a0 [ 786.678227] ? find_held_lock+0x36/0x1c0 [ 786.682290] ? __might_fault+0x12b/0x1e0 [ 786.686344] ? lock_downgrade+0x900/0x900 [ 786.690496] ? perf_trace_sched_process_exec+0x860/0x860 [ 786.695946] __sys_sendmmsg+0x246/0x6d0 [ 786.699924] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 786.704241] ? __lock_is_held+0xb5/0x140 [ 786.708301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.713835] ? check_preemption_disabled+0x48/0x280 [ 786.718856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 786.724387] ? fput+0x130/0x1a0 [ 786.727665] ? do_syscall_64+0x9a/0x820 [ 786.731637] ? do_syscall_64+0x9a/0x820 [ 786.735610] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 786.740187] ? trace_hardirqs_on+0xbd/0x310 [ 786.744505] ? __ia32_sys_read+0xb0/0xb0 [ 786.748577] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.753938] ? trace_hardirqs_off_caller+0x310/0x310 [ 786.759039] __x64_sys_sendmmsg+0x9d/0x100 [ 786.763272] do_syscall_64+0x1b9/0x820 [ 786.767154] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 786.772514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 786.777453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.782326] ? trace_hardirqs_on_caller+0x310/0x310 [ 786.787341] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 786.792352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 786.797366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 786.802210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.807391] RIP: 0033:0x457569 [ 786.810581] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 786.829476] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 786.837176] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 786.844438] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 786.851702] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 786.858964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 786.866228] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 786.904670] IPVS: Unknown mcast interface: syzkaller1 13:02:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:10 executing program 3 (fault-call:4 fault-nth:75): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 786.970638] IPVS: Unknown mcast interface: syzkaller1 13:02:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000500"}, 0x18) [ 787.002768] FAULT_INJECTION: forcing a failure. [ 787.002768] name failslab, interval 1, probability 0, space 0, times 0 [ 787.019948] CPU: 0 PID: 30847 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 787.027332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.036698] Call Trace: [ 787.039308] dump_stack+0x244/0x39d [ 787.042962] ? dump_stack_print_info.cold.1+0x20/0x20 [ 787.048177] should_fail.cold.4+0xa/0x17 [ 787.052262] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 787.057385] ? __save_stack_trace+0x8d/0xf0 [ 787.061741] ? save_stack+0xa9/0xd0 [ 787.065388] ? save_stack+0x43/0xd0 [ 787.069037] ? find_held_lock+0x36/0x1c0 [ 787.073135] ? perf_trace_sched_process_exec+0x860/0x860 [ 787.079149] ? check_preemption_disabled+0x48/0x280 [ 787.084182] __should_failslab+0x124/0x180 [ 787.088436] should_failslab+0x9/0x14 [ 787.092256] kmem_cache_alloc_node_trace+0x270/0x740 [ 787.097386] __kmalloc_node_track_caller+0x3c/0x70 [ 787.102332] __kmalloc_reserve.isra.40+0x41/0xe0 [ 787.107110] __alloc_skb+0x155/0x770 [ 787.110842] ? netdev_alloc_frag+0x1f0/0x1f0 [ 787.115262] ? perf_trace_sched_process_exec+0x860/0x860 [ 787.120724] ? lock_downgrade+0x900/0x900 [ 787.124898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 787.130454] ? aa_label_sk_perm+0x91/0x100 [ 787.134711] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 787.139656] ? aa_sk_perm+0x22b/0x8e0 [ 787.143476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.149050] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 787.154612] netlink_sendmsg+0xb29/0xfc0 [ 787.158698] ? netlink_unicast+0x760/0x760 [ 787.162943] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 787.167889] ? apparmor_socket_sendmsg+0x29/0x30 [ 787.172655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.178206] ? security_socket_sendmsg+0x94/0xc0 [ 787.182973] ? netlink_unicast+0x760/0x760 [ 787.187223] sock_sendmsg+0xd5/0x120 [ 787.190954] ___sys_sendmsg+0x51d/0x930 [ 787.194938] ? zap_class+0x640/0x640 [ 787.198669] ? copy_msghdr_from_user+0x580/0x580 [ 787.203441] ? get_pid_task+0xd6/0x1a0 [ 787.207350] ? find_held_lock+0x36/0x1c0 [ 787.211438] ? __might_fault+0x12b/0x1e0 [ 787.215537] ? lock_downgrade+0x900/0x900 [ 787.219719] ? perf_trace_sched_process_exec+0x860/0x860 [ 787.225192] __sys_sendmmsg+0x246/0x6d0 [ 787.229189] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 787.233554] ? __lock_is_held+0xb5/0x140 [ 787.237638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.243467] ? check_preemption_disabled+0x48/0x280 [ 787.248536] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 787.254087] ? fput+0x130/0x1a0 [ 787.257380] ? do_syscall_64+0x9a/0x820 [ 787.261371] ? do_syscall_64+0x9a/0x820 [ 787.265363] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 787.269963] ? trace_hardirqs_on+0xbd/0x310 [ 787.274297] ? __ia32_sys_read+0xb0/0xb0 [ 787.278370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.283752] ? trace_hardirqs_off_caller+0x310/0x310 [ 787.288874] __x64_sys_sendmmsg+0x9d/0x100 [ 787.293124] do_syscall_64+0x1b9/0x820 [ 787.297025] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 787.302407] ? syscall_return_slowpath+0x5e0/0x5e0 [ 787.307348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.312208] ? trace_hardirqs_on_caller+0x310/0x310 [ 787.317239] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 787.322275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 787.327315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.332182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.337383] RIP: 0033:0x457569 13:02:10 executing program 2: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206020000a84309c02623692500080000c90200f0ff66039848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83c43a11000000bf0cec6bab91d4000000000000", 0x55}], 0x1}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) [ 787.340590] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 787.359524] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 787.367243] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 787.374543] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 787.381826] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 787.389105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 787.396382] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 787.415275] IPVS: Unknown mcast interface: syzkaller1 13:02:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00`\x00'}, 0x18) 13:02:10 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=[{0x50, 0x11b, 0x1000, "1a3a8f0774f66db8d74e62cbc859978623109b3057e5b7048652dc25779006f6443a1dc0d46c674a5470e581f06011f50463107cd63ef3ca3771b9d9"}], 0x50}, 0x8800) close(r1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000000)={{0x5}}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) [ 787.480399] IPVS: Unknown mcast interface: syzkaller1 13:02:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000000)=0x3f, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast1}, @icmp=@address_reply}}}}, 0x0) 13:02:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000600"}, 0x18) [ 787.517754] IPVS: Unknown mcast interface: syzkaller1 13:02:10 executing program 3 (fault-call:4 fault-nth:76): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 787.595545] IPVS: Unknown mcast interface: syzkaller1 [ 787.605873] FAULT_INJECTION: forcing a failure. [ 787.605873] name failslab, interval 1, probability 0, space 0, times 0 [ 787.626640] CPU: 0 PID: 30880 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 787.634029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.643392] Call Trace: [ 787.645998] dump_stack+0x244/0x39d [ 787.649646] ? dump_stack_print_info.cold.1+0x20/0x20 [ 787.654867] should_fail.cold.4+0xa/0x17 [ 787.658952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 787.664071] ? do_syscall_64+0x1b9/0x820 [ 787.668148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.673542] ? trace_hardirqs_off+0xb8/0x310 [ 787.677965] ? kasan_check_read+0x11/0x20 [ 787.682136] ? mark_held_locks+0x130/0x130 [ 787.682152] ? trace_hardirqs_off+0xb8/0x310 [ 787.682175] ? find_held_lock+0x36/0x1c0 [ 787.682212] ? rcu_read_lock_sched_held+0x14f/0x180 [ 787.690837] ? perf_trace_sched_process_exec+0x860/0x860 [ 787.690865] __should_failslab+0x124/0x180 [ 787.690884] should_failslab+0x9/0x14 [ 787.690900] kmem_cache_alloc_node+0x26e/0x730 [ 787.690919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.699972] ? refcount_sub_and_test_checked+0x203/0x310 [ 787.699997] __alloc_skb+0x119/0x770 [ 787.700018] ? netdev_alloc_frag+0x1f0/0x1f0 [ 787.700035] ? perf_trace_sched_process_exec+0x860/0x860 13:02:11 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xfffffec4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x400}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) fstat(0xffffffffffffffff, &(0x7f0000000140)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = gettid() clock_gettime(0x3, &(0x7f0000000400)) clock_nanosleep(0x2, 0x1, &(0x7f0000000040), &(0x7f0000000100)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) creat(&(0x7f0000000300)='./file0\x00', 0x2) sched_setparam(0x0, &(0x7f0000000240)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r4, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) tkill(r2, 0x1004000000016) getgroups(0x3, &(0x7f0000000440)=[0xee01, 0x0, 0xee01]) [ 787.700051] ? lock_downgrade+0x900/0x900 [ 787.700075] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 787.700092] ? aa_label_sk_perm+0x91/0x100 [ 787.700113] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 787.709779] ? aa_sk_perm+0x22b/0x8e0 [ 787.709796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.709811] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 787.709834] netlink_sendmsg+0xb29/0xfc0 [ 787.709860] ? netlink_unicast+0x760/0x760 [ 787.718229] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 787.718248] ? apparmor_socket_sendmsg+0x29/0x30 [ 787.718264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.718282] ? security_socket_sendmsg+0x94/0xc0 [ 787.718297] ? netlink_unicast+0x760/0x760 [ 787.718315] sock_sendmsg+0xd5/0x120 [ 787.718332] ___sys_sendmsg+0x51d/0x930 [ 787.718347] ? zap_class+0x640/0x640 [ 787.718366] ? copy_msghdr_from_user+0x580/0x580 [ 787.718385] ? get_pid_task+0xd6/0x1a0 [ 787.729354] ? find_held_lock+0x36/0x1c0 [ 787.729380] ? __might_fault+0x12b/0x1e0 [ 787.729397] ? lock_downgrade+0x900/0x900 [ 787.729428] ? perf_trace_sched_process_exec+0x860/0x860 [ 787.729455] __sys_sendmmsg+0x246/0x6d0 [ 787.729502] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 787.855118] ? __lock_is_held+0xb5/0x140 [ 787.859179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.864710] ? check_preemption_disabled+0x48/0x280 [ 787.869727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 787.875261] ? fput+0x130/0x1a0 [ 787.878539] ? do_syscall_64+0x9a/0x820 [ 787.882515] ? do_syscall_64+0x9a/0x820 [ 787.886501] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 787.891080] ? trace_hardirqs_on+0xbd/0x310 [ 787.895393] ? __ia32_sys_read+0xb0/0xb0 [ 787.899450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.904824] ? trace_hardirqs_off_caller+0x310/0x310 [ 787.909924] __x64_sys_sendmmsg+0x9d/0x100 [ 787.914156] do_syscall_64+0x1b9/0x820 [ 787.918036] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 787.923395] ? syscall_return_slowpath+0x5e0/0x5e0 [ 787.928319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.933161] ? trace_hardirqs_on_caller+0x310/0x310 [ 787.938170] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 787.943180] ? prepare_exit_to_usermode+0x291/0x3b0 [ 787.948194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 787.953036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.958215] RIP: 0033:0x457569 [ 787.961404] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 787.980299] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 787.988002] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f894c4600000009000000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x2, 0x4) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7dfd, 0x100) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "371d9c320819e93f604714fe7fce1a39"}, 0x11, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x407, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={[0x0, 0x0, 0x3], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 13:02:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310600"}, 0x18) [ 787.995263] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 788.002526] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 788.009785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 788.017047] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:11 executing program 3 (fault-call:4 fault-nth:77): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 788.083409] IPVS: Unknown mcast interface: syzkaller1 13:02:11 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xff, 0x1d506242212b8bbe) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) sched_getscheduler(r3) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8907, 0x70cffe) 13:02:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x1, {0x8, 0x9, "76cc23704f7ea6d3e6ee834059fc3d18a031e427f79653d08d55f71d5e5155d9ffe9fd4b039c83b8f8e3b1bc669e32662a47f59f953c0f39d933313172c9e714df4e332b72d55878dae8e9efc454ff26a79693235649cedf68a403813078c54930c37aaf95099d8c25f809043490eb8ee42792f1b2811fdface993159f8c78837a30f5c224a8129d1ada9e7eb61f4d3f56eb888d78b3a8a12c64243a5fed568990e9cda95d3fe3461495e9a7724e3fea7c9a72f2a79935153ff85d78e18f99510f1ce587e81300957761ac6983dc72039fef0d618a70e30834cea5c8f7192297ea10fcddbac4c1af7300fd7a29d59dc5c79f37f25705842527c0b95d31cc432e", 0x3, 0x5, 0x4, 0x9, 0x371a, 0x80000001, 0x4}, r2}}, 0x128) r3 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) 13:02:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7dfd, 0x100) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "371d9c320819e93f604714fe7fce1a39"}, 0x11, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x407, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={[0x0, 0x0, 0x3], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 788.184574] FAULT_INJECTION: forcing a failure. [ 788.184574] name failslab, interval 1, probability 0, space 0, times 0 13:02:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600f5f86edb5cc1c7a60ee2fe5a095f"], 0x13) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000100)={0x7b, 0x0, [0x3ff, 0xfffffffffffffffe, 0x2e2c, 0x8001]}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x80, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) [ 788.271597] IPVS: Unknown mcast interface: syzkaller1 [ 788.285236] CPU: 1 PID: 30909 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 788.292625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.301984] Call Trace: [ 788.302008] dump_stack+0x244/0x39d [ 788.302031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 788.313426] should_fail.cold.4+0xa/0x17 [ 788.313463] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 788.322609] ? __save_stack_trace+0x8d/0xf0 [ 788.326938] ? save_stack+0xa9/0xd0 [ 788.330564] ? save_stack+0x43/0xd0 [ 788.334192] ? find_held_lock+0x36/0x1c0 [ 788.338255] ? acpi_cpufreq_cpu_init+0x288/0x1975 [ 788.343097] ? acpi_cpufreq_cpu_init+0x288/0x1975 [ 788.347932] ? perf_trace_sched_process_exec+0x860/0x860 [ 788.353385] ? check_preemption_disabled+0x48/0x280 [ 788.358399] __should_failslab+0x124/0x180 [ 788.362628] should_failslab+0x9/0x14 [ 788.366421] kmem_cache_alloc_node_trace+0x270/0x740 [ 788.371541] __kmalloc_node_track_caller+0x3c/0x70 [ 788.376483] __kmalloc_reserve.isra.40+0x41/0xe0 [ 788.381236] __alloc_skb+0x155/0x770 [ 788.384949] ? netdev_alloc_frag+0x1f0/0x1f0 [ 788.389355] ? perf_trace_sched_process_exec+0x860/0x860 [ 788.394800] ? lock_downgrade+0x900/0x900 [ 788.398951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 788.404489] ? aa_label_sk_perm+0x91/0x100 [ 788.408723] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 788.413648] ? aa_sk_perm+0x22b/0x8e0 [ 788.417454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.422986] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 788.428525] netlink_sendmsg+0xb29/0xfc0 [ 788.432586] ? netlink_unicast+0x760/0x760 [ 788.436813] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 788.441738] ? apparmor_socket_sendmsg+0x29/0x30 [ 788.446497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.452030] ? security_socket_sendmsg+0x94/0xc0 [ 788.456779] ? netlink_unicast+0x760/0x760 [ 788.461007] sock_sendmsg+0xd5/0x120 [ 788.464721] ___sys_sendmsg+0x51d/0x930 [ 788.468692] ? zap_class+0x640/0x640 [ 788.472402] ? copy_msghdr_from_user+0x580/0x580 [ 788.477153] ? get_pid_task+0xd6/0x1a0 [ 788.481038] ? find_held_lock+0x36/0x1c0 [ 788.485097] ? __might_fault+0x12b/0x1e0 [ 788.489188] ? lock_downgrade+0x900/0x900 [ 788.493340] ? perf_trace_sched_process_exec+0x860/0x860 [ 788.498795] __sys_sendmmsg+0x246/0x6d0 [ 788.502769] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 788.507088] ? __lock_is_held+0xb5/0x140 [ 788.511152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.516684] ? check_preemption_disabled+0x48/0x280 [ 788.521705] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.527238] ? fput+0x130/0x1a0 [ 788.530514] ? do_syscall_64+0x9a/0x820 [ 788.534484] ? do_syscall_64+0x9a/0x820 [ 788.538470] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 788.543049] ? trace_hardirqs_on+0xbd/0x310 [ 788.547361] ? __ia32_sys_read+0xb0/0xb0 [ 788.551414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.556788] ? trace_hardirqs_off_caller+0x310/0x310 [ 788.561893] __x64_sys_sendmmsg+0x9d/0x100 [ 788.566123] do_syscall_64+0x1b9/0x820 [ 788.570003] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 788.575363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 788.580284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 788.585120] ? trace_hardirqs_on_caller+0x310/0x310 [ 788.590129] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 788.595144] ? prepare_exit_to_usermode+0x291/0x3b0 [ 788.600162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 788.605000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.610183] RIP: 0033:0x457569 [ 788.613372] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 788.632263] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 788.639961] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 788.647223] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 788.654492] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 788.661756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 13:02:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000100)={0x5, 0x1, 0x300e, 0x1}) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x3ff, 0x4) setsockopt(r0, 0x8000000000000001, 0x10000000000009, &(0x7f0000003f00)="890528e4", 0x4) prctl$PR_GET_SECUREBITS(0x1b) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x8, 0x4) 13:02:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000400"}, 0x18) [ 788.669021] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r1, &(0x7f00000001c0)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(r1, r1, &(0x7f0000000000), 0x100000001) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x300, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f00000000c0)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r3, r2, &(0x7f0000000000), 0x100000001) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/126) 13:02:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f450900f31b08100000000300"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x40000, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r5}}, {@obj_user={'obj_user', 0x3d, "fa"}}]}}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ptmx\x00', 0x80000, 0x0) read(r6, &(0x7f00000000c0)=""/11, 0xb) [ 788.747068] IPVS: Unknown mcast interface: syzkaller1 13:02:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310200"}, 0x18) [ 788.832747] IPVS: Unknown mcast interface: syzkaller1 13:02:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600000003000000000000000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x4000, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:12 executing program 3 (fault-call:4 fault-nth:78): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 788.946523] FAULT_INJECTION: forcing a failure. [ 788.946523] name failslab, interval 1, probability 0, space 0, times 0 [ 788.958186] CPU: 0 PID: 30968 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 788.965571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.974935] Call Trace: [ 788.977547] dump_stack+0x244/0x39d [ 788.981196] ? dump_stack_print_info.cold.1+0x20/0x20 [ 788.986441] should_fail.cold.4+0xa/0x17 [ 788.990533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 788.995657] ? do_syscall_64+0x1b9/0x820 [ 788.999728] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.005108] ? trace_hardirqs_off+0xb8/0x310 [ 789.009534] ? kasan_check_read+0x11/0x20 [ 789.013705] ? mark_held_locks+0x130/0x130 [ 789.017950] ? trace_hardirqs_off+0xb8/0x310 [ 789.022379] ? find_held_lock+0x36/0x1c0 [ 789.026481] ? __irqentry_text_end+0x19c390/0x1f9658 [ 789.031614] ? rcu_read_lock_sched_held+0x14f/0x180 [ 789.036646] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.042120] __should_failslab+0x124/0x180 [ 789.046371] should_failslab+0x9/0x14 [ 789.050207] kmem_cache_alloc_node+0x26e/0x730 [ 789.054803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.060352] ? refcount_sub_and_test_checked+0x203/0x310 [ 789.065822] __alloc_skb+0x119/0x770 [ 789.069554] ? netdev_alloc_frag+0x1f0/0x1f0 [ 789.074490] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.079956] ? lock_downgrade+0x900/0x900 [ 789.084125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 789.089675] ? aa_label_sk_perm+0x91/0x100 [ 789.093925] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 789.098867] ? aa_sk_perm+0x22b/0x8e0 [ 789.102684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.108238] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 789.113798] netlink_sendmsg+0xb29/0xfc0 [ 789.117879] ? netlink_unicast+0x760/0x760 [ 789.122126] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 789.127071] ? apparmor_socket_sendmsg+0x29/0x30 [ 789.131838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.137387] ? security_socket_sendmsg+0x94/0xc0 [ 789.142181] ? netlink_unicast+0x760/0x760 [ 789.146456] sock_sendmsg+0xd5/0x120 [ 789.150182] ___sys_sendmsg+0x51d/0x930 [ 789.154166] ? zap_class+0x640/0x640 [ 789.157902] ? copy_msghdr_from_user+0x580/0x580 [ 789.162673] ? get_pid_task+0xd6/0x1a0 [ 789.166583] ? find_held_lock+0x36/0x1c0 [ 789.170665] ? __might_fault+0x12b/0x1e0 [ 789.174743] ? lock_downgrade+0x900/0x900 [ 789.178921] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.184416] __sys_sendmmsg+0x246/0x6d0 [ 789.188437] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 789.192777] ? __lock_is_held+0xb5/0x140 [ 789.196878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.202458] ? check_preemption_disabled+0x48/0x280 [ 789.207521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 789.213074] ? fput+0x130/0x1a0 [ 789.216371] ? do_syscall_64+0x9a/0x820 [ 789.220383] ? do_syscall_64+0x9a/0x820 [ 789.224421] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 789.229019] ? trace_hardirqs_on+0xbd/0x310 [ 789.233355] ? __ia32_sys_read+0xb0/0xb0 [ 789.237452] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.243083] ? trace_hardirqs_off_caller+0x310/0x310 [ 789.248218] __x64_sys_sendmmsg+0x9d/0x100 [ 789.252472] do_syscall_64+0x1b9/0x820 [ 789.256375] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 789.261772] ? syscall_return_slowpath+0x5e0/0x5e0 [ 789.266713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.271569] ? trace_hardirqs_on_caller+0x310/0x310 [ 789.276598] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 789.281625] ? prepare_exit_to_usermode+0x291/0x3b0 [ 789.286658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.291522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.296717] RIP: 0033:0x457569 [ 789.299920] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 789.318829] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 789.326551] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 789.333829] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 789.341109] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 789.348407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 789.355684] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:12 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x94) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000140)={@mcast1}, &(0x7f0000000180)=0x14) r1 = socket$kcm(0x11, 0x2, 0x300) recvmsg$kcm(r1, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8907, 0x70cffe) 13:02:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000100"}, 0x18) 13:02:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:12 executing program 3 (fault-call:4 fault-nth:79): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 789.513878] IPVS: Unknown mcast interface: syzkaller1 [ 789.530068] FAULT_INJECTION: forcing a failure. [ 789.530068] name failslab, interval 1, probability 0, space 0, times 0 [ 789.544782] CPU: 0 PID: 30984 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 789.552172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.561531] Call Trace: [ 789.564144] dump_stack+0x244/0x39d [ 789.567793] ? dump_stack_print_info.cold.1+0x20/0x20 [ 789.573009] should_fail.cold.4+0xa/0x17 [ 789.577093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 789.582216] ? __save_stack_trace+0x8d/0xf0 [ 789.586569] ? save_stack+0xa9/0xd0 [ 789.590210] ? save_stack+0x43/0xd0 [ 789.593868] ? find_held_lock+0x36/0x1c0 [ 789.597970] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.603453] ? check_preemption_disabled+0x48/0x280 [ 789.608492] __should_failslab+0x124/0x180 [ 789.612742] should_failslab+0x9/0x14 [ 789.616559] kmem_cache_alloc_node_trace+0x270/0x740 [ 789.621688] __kmalloc_node_track_caller+0x3c/0x70 [ 789.626633] __kmalloc_reserve.isra.40+0x41/0xe0 [ 789.631422] __alloc_skb+0x155/0x770 [ 789.635157] ? netdev_alloc_frag+0x1f0/0x1f0 [ 789.639580] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.645048] ? lock_downgrade+0x900/0x900 [ 789.649222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 789.654772] ? aa_label_sk_perm+0x91/0x100 [ 789.659027] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 789.663968] ? aa_sk_perm+0x22b/0x8e0 [ 789.667785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.673342] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 789.678926] netlink_sendmsg+0xb29/0xfc0 [ 789.683015] ? netlink_unicast+0x760/0x760 [ 789.687260] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 789.692204] ? apparmor_socket_sendmsg+0x29/0x30 [ 789.696977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.702535] ? security_socket_sendmsg+0x94/0xc0 [ 789.707300] ? netlink_unicast+0x760/0x760 [ 789.711553] sock_sendmsg+0xd5/0x120 [ 789.715286] ___sys_sendmsg+0x51d/0x930 [ 789.719275] ? zap_class+0x640/0x640 [ 789.723011] ? copy_msghdr_from_user+0x580/0x580 [ 789.727784] ? get_pid_task+0xd6/0x1a0 [ 789.731688] ? find_held_lock+0x36/0x1c0 [ 789.735773] ? __might_fault+0x12b/0x1e0 [ 789.739846] ? lock_downgrade+0x900/0x900 [ 789.744020] ? perf_trace_sched_process_exec+0x860/0x860 [ 789.749496] __sys_sendmmsg+0x246/0x6d0 [ 789.753494] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 789.757834] ? __lock_is_held+0xb5/0x140 [ 789.761917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.767476] ? check_preemption_disabled+0x48/0x280 [ 789.772519] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 789.778072] ? fput+0x130/0x1a0 [ 789.781391] ? do_syscall_64+0x9a/0x820 [ 789.785400] ? do_syscall_64+0x9a/0x820 [ 789.789406] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 789.794003] ? trace_hardirqs_on+0xbd/0x310 [ 789.798334] ? __ia32_sys_read+0xb0/0xb0 [ 789.802429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.807806] ? trace_hardirqs_off_caller+0x310/0x310 [ 789.812934] __x64_sys_sendmmsg+0x9d/0x100 [ 789.817186] do_syscall_64+0x1b9/0x820 [ 789.821084] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 789.826463] ? syscall_return_slowpath+0x5e0/0x5e0 [ 789.831424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.836282] ? trace_hardirqs_on_caller+0x310/0x310 [ 789.841311] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 789.846342] ? prepare_exit_to_usermode+0x291/0x3b0 [ 789.851424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 789.856289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.861491] RIP: 0033:0x457569 [ 789.864699] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 789.883606] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 789.891323] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 789.898622] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 789.905903] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 13:02:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000100)=0xc) 13:02:13 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2000000080803, 0x1) bind$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 13:02:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\a\x00'}, 0x18) [ 789.913184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 789.920465] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 789.987005] IPVS: Unknown mcast interface: syzkaller1 [ 790.021815] IPVS: Unknown mcast interface: syzkaller1 13:02:13 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5101, 0x0) 13:02:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f450019003e00000000000000000000000000"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:13 executing program 3 (fault-call:4 fault-nth:80): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000300"}, 0x18) 13:02:13 executing program 2: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r0, 0x0, 0x0) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e590704894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa2aa505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd68c5bd0c9dce09627928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c000000", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ptrace(0xffffffffffffffff, 0x0) [ 790.136042] IPVS: Unknown mcast interface: syzkaller1 [ 790.146052] ptrace attach of "/root/syz-executor2"[31018] was attempted by "/root/syz-executor2"[31021] [ 790.149068] FAULT_INJECTION: forcing a failure. [ 790.149068] name failslab, interval 1, probability 0, space 0, times 0 [ 790.170438] IPVS: Unknown mcast interface: syzkaller1 [ 790.179295] CPU: 1 PID: 31016 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 790.186699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.196066] Call Trace: [ 790.198673] dump_stack+0x244/0x39d [ 790.202326] ? dump_stack_print_info.cold.1+0x20/0x20 [ 790.207565] should_fail.cold.4+0xa/0x17 [ 790.211647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.216762] ? do_syscall_64+0x1b9/0x820 [ 790.220832] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.220855] ? trace_hardirqs_off+0xb8/0x310 [ 790.220873] ? kasan_check_read+0x11/0x20 [ 790.234788] ? mark_held_locks+0x130/0x130 [ 790.234806] ? trace_hardirqs_off+0xb8/0x310 [ 790.243481] ? find_held_lock+0x36/0x1c0 [ 790.247572] ? rcu_read_lock_sched_held+0x14f/0x180 [ 790.252601] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.252629] __should_failslab+0x124/0x180 [ 790.262308] should_failslab+0x9/0x14 [ 790.266145] kmem_cache_alloc_node+0x26e/0x730 [ 790.270741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.270760] ? refcount_sub_and_test_checked+0x203/0x310 [ 790.270782] __alloc_skb+0x119/0x770 [ 790.285483] ? netdev_alloc_frag+0x1f0/0x1f0 [ 790.289908] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.295387] ? lock_downgrade+0x900/0x900 [ 790.299560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 790.305110] ? aa_label_sk_perm+0x91/0x100 [ 790.309380] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 790.314314] ? aa_sk_perm+0x22b/0x8e0 [ 790.318130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.323662] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 790.329193] netlink_sendmsg+0xb29/0xfc0 [ 790.333267] ? netlink_unicast+0x760/0x760 [ 790.337586] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 790.342510] ? apparmor_socket_sendmsg+0x29/0x30 [ 790.347259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.352792] ? security_socket_sendmsg+0x94/0xc0 [ 790.357542] ? netlink_unicast+0x760/0x760 [ 790.361785] sock_sendmsg+0xd5/0x120 [ 790.365511] ___sys_sendmsg+0x51d/0x930 [ 790.369482] ? zap_class+0x640/0x640 [ 790.373190] ? copy_msghdr_from_user+0x580/0x580 [ 790.377940] ? get_pid_task+0xd6/0x1a0 [ 790.381830] ? find_held_lock+0x36/0x1c0 [ 790.385896] ? __might_fault+0x12b/0x1e0 [ 790.389951] ? lock_downgrade+0x900/0x900 [ 790.394126] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.399600] __sys_sendmmsg+0x246/0x6d0 [ 790.403578] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 790.407896] ? __lock_is_held+0xb5/0x140 [ 790.411956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.417490] ? check_preemption_disabled+0x48/0x280 [ 790.422508] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 790.428037] ? fput+0x130/0x1a0 [ 790.431358] ? do_syscall_64+0x9a/0x820 [ 790.435344] ? do_syscall_64+0x9a/0x820 [ 790.439309] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 790.443904] ? trace_hardirqs_on+0xbd/0x310 [ 790.448215] ? __ia32_sys_read+0xb0/0xb0 [ 790.452272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.457658] ? trace_hardirqs_off_caller+0x310/0x310 [ 790.462790] __x64_sys_sendmmsg+0x9d/0x100 [ 790.467021] do_syscall_64+0x1b9/0x820 [ 790.470902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 790.476263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 790.481185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.486023] ? trace_hardirqs_on_caller+0x310/0x310 [ 790.491039] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 790.496055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 790.501076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 790.505925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.511112] RIP: 0033:0x457569 [ 790.514301] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 790.533213] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 790.540926] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 790.548187] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 790.555448] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 790.562711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 790.569972] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:13 executing program 0: r0 = socket$kcm(0x11, 0xffffffffffffffff, 0x300) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x4, 0x2000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000180)=0x6000) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x29, 0x802, 0x0) syz_execute_func(&(0x7f0000000000)="36f3af430f72d305470f0f088e67f675320f67cc40cf460f910ac423d57d9502000000b0c4e11573d6b6f01038") close(r2) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000001c0), 0x4) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x7}, 0x28, 0x3) 13:02:13 executing program 1: memfd_create(&(0x7f0000738fff)="80", 0x0) 13:02:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000200"}, 0x18) 13:02:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_extract_tcp_res(&(0x7f0000000080), 0x8, 0x7f) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0x2, 0xfff, {0x0, 0x7530}, {0x77359400}, {0x3, 0x8, 0x6bd236b7, 0xffffffffffffffff}, 0x1, @can={{0x2, 0xf2d, 0x0, 0x5}, 0x5, 0x2, 0x0, 0x0, "db2b62faceecce64"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000080}, 0x4008000) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="0000030061040360533a000000000000000000"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:13 executing program 3 (fault-call:4 fault-nth:81): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) [ 790.663839] IPVS: Unknown mcast interface: syzkaller1 13:02:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x20000, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000640)={0x2, 0xfff, {0x0, 0x4522, 0x0, {0x6, 0x100000001}, {0x7, 0x10000}, @rumble={0x80000001, 0xfffffffffffffff7}}, {0x57, 0x7, 0x9, {0xd4, 0x7ff}, {0x6, 0x6}, @cond=[{0x0, 0x20, 0x0, 0x8, 0x0, 0x7}, {0x0, 0x3, 0xffffffff, 0x1, 0x8}]}}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"748f6e6c3000420300000011edee00"}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f00000000c0)="0f0f1ba00873850f01d1ba4000b8a989ef660f2ac3ba4000b85700eff3cfbad00466b8b200000066ef3e0f38003abaf80c66b8a206ef8766efbafc0cec", 0x3d}], 0x1, 0x0, &(0x7f00000001c0)=[@efer], 0x1) fcntl$dupfd(r1, 0x0, r2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000480)={&(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0], &(0x7f0000000380), &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x1, 0x0, 0x6}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) unshare(0x2000000) 13:02:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\a\x00'}, 0x18) 13:02:14 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000002c0)="1feed3e3ad78216a224c6351a4495d041cf9d61a11119019ab582695691bb5a38f0881473265f35111cd4b4bcc15c17466e5d6a1f4abd7f6cc91d17311414f3e53d8c034d1160c7658d67989682a22c0a5968e4be9b5c5e71c69bed7091aa24525963dffcfa7e8dcf89fca2599976238bc7377f79e92cb946586b87e85ac98bcebef7a5ff2c399e6b5447f432ef08147bcef8b114e064a1b7ea57722cf4afac8cf51d08f9d2a38c9b36080b2c51454e83e9ac517e02239f7fd378032517004013a9adc3e190d66ca5fbcd8eb6bdfa0232fc7be25db691de88e930cdd7ba310c790d2a4984f65aefab072cd6c38f94e2a8d4cc4", 0xf3}, {&(0x7f0000000200)="83299fcd6262d03dd4e08a46ee080ef0a77921b0ee731ffc0f44e8e3448874c99a388f402871929a96520eb7d8f5f696533a1d576d8ab512b47d15d0826d1d9beec46b75d901a3d22cfab505edb92293192d", 0x52}, {&(0x7f00000003c0)="5042ebaf7951368cf62faa5384b79ba45a5ae6bb352abf6fad555233bcec4d2bf93eb16ea195abba9a30c77765a852dbd970ee101caf2c2e4bc670a29fea7277c441d4706b128191db561b1aa1fe9fd4a3be0c5e36f031053b2c2ae6b930", 0x5e}, {&(0x7f0000000440)="fc8c489878804ef463db1bb2f4fb5644066a554332907daa1f42cb3c42adeeb30b1ac47826db224f2dfec43fdc6b6e140b6230b0c9bf384d13212537aa239af18121a327f01562b59874938ca3edfbc686902f74fa377310c8a284f24f3a99af56364718d7125b751dfc2aedc2062588d9266c0295a674593577d53de45cc6c71e4aad92b8b23d0633376d2cefccdf252995b76cf15656635e4467176cc4f3f746eb61e0490370127048c661f996b5384c43dece682419396e511576d11aed49a4b7ea", 0xc3}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="136fd09df59bc39f47c8b8ff59b7c5c69b7c1087e21309a53afb164a5829e266b8843b41c84505a0cd168e77d9bd7a15444c0d2179fcaf107b66c3e1dbf6e18c38825b88d40ad652d6107cfb0ccc9b003404d5a19c8cc1e0937d", 0x5a}, {&(0x7f00000015c0)="dd007b6e19cb9501f939d5994c8741a172fb259676034809adb58857", 0x1c}, {&(0x7f0000001600)="632b481a6b6b9b4dcf186d8d3eec0d3c80f09cf8816a3b0edcd1dacd934fcfdbb4ffdd9f181a819f9f3df03ff9273d8681e60c4e81fe14f15c08a178291edf3bf924515a5b34ff1a1850bb917d78be649133d620bfe2bb5f7f5fddf95c628838580fe906a9e84e906d013fbac6e51a0e93e2c72c3331a8e3295aa5e11b84fcd062", 0x81}], 0x8, 0x0, 0x0, 0x4800}, 0x800) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x802, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8907, 0x70cffe) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x301480) getdents64(r2, &(0x7f0000000140)=""/142, 0x8e) [ 790.691876] FAULT_INJECTION: forcing a failure. [ 790.691876] name failslab, interval 1, probability 0, space 0, times 0 [ 790.761990] CPU: 0 PID: 31051 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 790.769392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.778754] Call Trace: [ 790.781363] dump_stack+0x244/0x39d [ 790.785003] ? dump_stack_print_info.cold.1+0x20/0x20 [ 790.790203] should_fail.cold.4+0xa/0x17 [ 790.794264] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 790.799368] ? __save_stack_trace+0x8d/0xf0 [ 790.803700] ? save_stack+0xa9/0xd0 [ 790.807337] ? save_stack+0x43/0xd0 [ 790.810964] ? find_held_lock+0x36/0x1c0 [ 790.815023] ? btrfs_invalidatepage+0xa68/0x11b0 [ 790.819781] ? btrfs_invalidatepage+0xa68/0x11b0 [ 790.824533] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.829984] ? check_preemption_disabled+0x48/0x280 [ 790.834999] __should_failslab+0x124/0x180 [ 790.839232] should_failslab+0x9/0x14 [ 790.843028] kmem_cache_alloc_node_trace+0x270/0x740 [ 790.848132] __kmalloc_node_track_caller+0x3c/0x70 [ 790.853058] __kmalloc_reserve.isra.40+0x41/0xe0 [ 790.857817] __alloc_skb+0x155/0x770 [ 790.861527] ? netdev_alloc_frag+0x1f0/0x1f0 [ 790.865931] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.871377] ? lock_downgrade+0x900/0x900 [ 790.875527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 790.881058] ? aa_label_sk_perm+0x91/0x100 [ 790.885286] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 790.890234] ? aa_sk_perm+0x22b/0x8e0 [ 790.894032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.899566] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 790.905100] netlink_sendmsg+0xb29/0xfc0 [ 790.909161] ? netlink_unicast+0x760/0x760 [ 790.913388] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 790.918327] ? apparmor_socket_sendmsg+0x29/0x30 [ 790.923079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.928613] ? security_socket_sendmsg+0x94/0xc0 [ 790.933366] ? netlink_unicast+0x760/0x760 [ 790.937597] sock_sendmsg+0xd5/0x120 [ 790.941322] ___sys_sendmsg+0x51d/0x930 [ 790.945308] ? zap_class+0x640/0x640 [ 790.949023] ? copy_msghdr_from_user+0x580/0x580 [ 790.953774] ? get_pid_task+0xd6/0x1a0 [ 790.957661] ? find_held_lock+0x36/0x1c0 [ 790.961726] ? __might_fault+0x12b/0x1e0 [ 790.965796] ? lock_downgrade+0x900/0x900 [ 790.969950] ? perf_trace_sched_process_exec+0x860/0x860 [ 790.975401] __sys_sendmmsg+0x246/0x6d0 [ 790.979379] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 790.983697] ? __lock_is_held+0xb5/0x140 [ 790.987759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.993314] ? check_preemption_disabled+0x48/0x280 [ 790.998349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.003882] ? fput+0x130/0x1a0 [ 791.007158] ? do_syscall_64+0x9a/0x820 [ 791.011129] ? do_syscall_64+0x9a/0x820 [ 791.015098] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 791.019679] ? trace_hardirqs_on+0xbd/0x310 [ 791.023993] ? __ia32_sys_read+0xb0/0xb0 [ 791.028049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.033405] ? trace_hardirqs_off_caller+0x310/0x310 [ 791.038507] __x64_sys_sendmmsg+0x9d/0x100 [ 791.042739] do_syscall_64+0x1b9/0x820 [ 791.046619] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 791.051981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 791.056908] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.061743] ? trace_hardirqs_on_caller+0x310/0x310 [ 791.066752] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 791.071763] ? prepare_exit_to_usermode+0x291/0x3b0 [ 791.077252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.082108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.087306] RIP: 0033:0x457569 [ 791.090497] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000580)=@nat={'%at\x00', 0x19, 0x1, 0x1e0, [0x20000380, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x1d, 0x0, 0x0, 'team_slave_0\x00', 'bridge_slave_0\x00', 'bond_slave_1\x00', 'veth1_to_bridge\x00', @empty, [], @dev, [], 0xe0, 0x118, 0x150, [@stp={'stp\x00', 0x48, {{0x0, {0x0, 0x0, 0x0, @local, [], 0x0, 0x0, 0x0, 0x0, @local}}}}]}, [@snat={'snat\x00', 0x10, {{@local}}}]}, @snat={'snat\x00', 0x10, {{@random="5f5a1fad6899"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x258) [ 791.109393] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 791.117095] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 791.124358] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 791.131618] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 791.138881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 791.146146] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000500"}, 0x18) [ 791.172608] IPVS: Unknown mcast interface: syzkaller1 13:02:14 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_TSC(0x19, &(0x7f00000014c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) ioctl$BLKPBSZGET(r1, 0x127b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/current\x00') readlinkat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)=""/159, 0x9f) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0x0, 0xffffffffffffc3b9, 0x0, 0x64}, 0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) [ 791.235335] IPVS: Unknown mcast interface: syzkaller1 13:02:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000300"}, 0x18) [ 791.269015] kvm: pic: single mode not supported [ 791.269073] kvm: pic: level sensitive irq not supported [ 791.275133] kvm: pic: single mode not supported [ 791.280573] kvm: pic: level sensitive irq not supported [ 791.305320] IPVS: stopping master sync thread 31081 ... 13:02:14 executing program 3 (fault-call:4 fault-nth:82): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 791.311135] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 13:02:14 executing program 2: r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)) [ 791.341165] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 791.358035] IPVS: Unknown mcast interface: syzkaller1 [ 791.381083] IPVS: Unknown mcast interface: syzkaller1 [ 791.408893] FAULT_INJECTION: forcing a failure. [ 791.408893] name failslab, interval 1, probability 0, space 0, times 0 [ 791.429713] CPU: 1 PID: 31090 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 791.437094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.437102] Call Trace: [ 791.437123] dump_stack+0x244/0x39d [ 791.437143] ? dump_stack_print_info.cold.1+0x20/0x20 [ 791.457942] should_fail.cold.4+0xa/0x17 [ 791.462017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 791.462034] ? do_syscall_64+0x1b9/0x820 [ 791.462048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.462065] ? trace_hardirqs_off+0xb8/0x310 [ 791.476567] ? kasan_check_read+0x11/0x20 [ 791.476596] ? mark_held_locks+0x130/0x130 [ 791.476611] ? trace_hardirqs_off+0xb8/0x310 [ 791.476631] ? find_held_lock+0x36/0x1c0 [ 791.485193] ? rcu_read_lock_sched_held+0x14f/0x180 [ 791.485211] ? perf_trace_sched_process_exec+0x860/0x860 [ 791.508360] __should_failslab+0x124/0x180 [ 791.512613] should_failslab+0x9/0x14 [ 791.516434] kmem_cache_alloc_node+0x26e/0x730 [ 791.521025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.526560] ? refcount_sub_and_test_checked+0x203/0x310 [ 791.532029] __alloc_skb+0x119/0x770 [ 791.535741] ? netdev_alloc_frag+0x1f0/0x1f0 [ 791.540144] ? perf_trace_sched_process_exec+0x860/0x860 [ 791.545586] ? lock_downgrade+0x900/0x900 [ 791.549741] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.555292] ? aa_label_sk_perm+0x91/0x100 [ 791.559521] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 791.564455] ? aa_sk_perm+0x22b/0x8e0 [ 791.568280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.573809] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 791.579342] netlink_sendmsg+0xb29/0xfc0 [ 791.583397] ? netlink_unicast+0x760/0x760 [ 791.587631] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 791.592551] ? apparmor_socket_sendmsg+0x29/0x30 [ 791.597303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.602841] ? security_socket_sendmsg+0x94/0xc0 [ 791.607585] ? netlink_unicast+0x760/0x760 [ 791.611821] sock_sendmsg+0xd5/0x120 [ 791.615526] ___sys_sendmsg+0x51d/0x930 [ 791.619491] ? zap_class+0x640/0x640 [ 791.623198] ? copy_msghdr_from_user+0x580/0x580 [ 791.627948] ? get_pid_task+0xd6/0x1a0 [ 791.631827] ? find_held_lock+0x36/0x1c0 [ 791.635886] ? __might_fault+0x12b/0x1e0 [ 791.639937] ? lock_downgrade+0x900/0x900 [ 791.644085] ? perf_trace_sched_process_exec+0x860/0x860 [ 791.649530] __sys_sendmmsg+0x246/0x6d0 [ 791.653503] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 791.657820] ? __lock_is_held+0xb5/0x140 [ 791.661878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.667409] ? check_preemption_disabled+0x48/0x280 [ 791.672422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.677953] ? fput+0x130/0x1a0 [ 791.681224] ? do_syscall_64+0x9a/0x820 [ 791.685208] ? do_syscall_64+0x9a/0x820 [ 791.689173] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 791.693746] ? trace_hardirqs_on+0xbd/0x310 [ 791.698064] ? __ia32_sys_read+0xb0/0xb0 [ 791.702119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.707477] ? trace_hardirqs_off_caller+0x310/0x310 [ 791.712575] __x64_sys_sendmmsg+0x9d/0x100 [ 791.716809] do_syscall_64+0x1b9/0x820 [ 791.720698] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 791.726059] ? syscall_return_slowpath+0x5e0/0x5e0 [ 791.730981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.735814] ? trace_hardirqs_on_caller+0x310/0x310 [ 791.740823] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 791.745920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 791.750928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 791.755770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.760949] RIP: 0033:0x457569 [ 791.764135] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 791.783023] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 791.790727] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 791.797991] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 13:02:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000f4101f0d000000000003003ebb9e37a834fe10b2117e431d2ba8fda1ec67b44bc64cdfde7dcefc16b42814c1c9e2c89baaac7d64dce43fd5469eda39aa00bb52dc4113bdbd94531386d35e4117e70305eb13161ae3cf953fdc91fe04c9020b48"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x0, 0x80000001, 0x100, 0x3, {0x3f, 0x0, 0x8, 0x19de}}) 13:02:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:15 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x100000000000019b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) 13:02:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x100002000000105, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) [ 791.805264] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 791.812526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 791.819785] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 791.864916] IPVS: Unknown mcast interface: syzkaller1 13:02:15 executing program 3 (fault-call:4 fault-nth:83): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b00)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000002f80)={&(0x7f0000001b40)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0xffffffffffffff99, 0x2, "0ef1c35fd925286ea540cf3d1042d188d3b5c1a3560683baf9ceafe1b0e2f1fb4707c685eda781a9f4cd83e34c2977fcdca6d331f43f2dfc5c210c21500f4c", 0x32}, 0x80, 0x0, 0x0, &(0x7f0000002f00)=[{0x48, 0xff, 0x6, "07c93230c62cd0f99eece58d6e49aebec6e826ffad91e4e30f3c063e01e1c60696da661fa636c80443baef10b1b3387f75"}], 0x48, 0x14}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000240)=@generic, 0x61, &(0x7f0000000840)=[{&(0x7f00000003c0)=""/71, 0x47}, {&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000580)=""/67, 0x43}, {&(0x7f00000006c0)=""/165, 0xa5}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000340)=""/41, 0x29}], 0x6, 0x0, 0x0, 0x6}, 0x1) recvmsg$kcm(r1, 0x0, 0x20) sendmsg$kcm(r0, 0x0, 0x8080) socket$kcm(0x2, 0x3, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)="2e2f6367726f75702e6e65742f73797a31eb2f3af6915b36cad76f9f499abb9522fd44d3c2753cd4e02695861427d50f55985e0862f1044d91c2b1ac1e055cb3517427d64164b0d9fb757203f45b277f98ce755d245468c91833316518ec245c79bcd6e4f133a4cb05f470ac7513ce63f2f3153ef4b0beb0b866a4f425d72ed9fe4c3987", 0x1ff) socket$kcm(0x29, 0x235aefe14533da7c, 0x0) 13:02:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x50d480, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:15 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000680), 0x13f, 0x2}}, 0x20) syz_genetlink_get_family_id$ipvs(0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x80) setxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x1) mount$fuseblk(&(0x7f00000002c0)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) [ 791.978687] FAULT_INJECTION: forcing a failure. [ 791.978687] name failslab, interval 1, probability 0, space 0, times 0 [ 791.993524] IPVS: Unknown mcast interface: syzkaller1 [ 792.022087] CPU: 1 PID: 31121 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 792.029472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.038836] Call Trace: [ 792.041448] dump_stack+0x244/0x39d [ 792.045097] ? dump_stack_print_info.cold.1+0x20/0x20 [ 792.050316] should_fail.cold.4+0xa/0x17 [ 792.054398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 792.059519] ? __save_stack_trace+0x8d/0xf0 [ 792.063862] ? save_stack+0xa9/0xd0 [ 792.067516] ? save_stack+0x43/0xd0 [ 792.071164] ? find_held_lock+0x36/0x1c0 [ 792.075270] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.080743] ? check_preemption_disabled+0x48/0x280 [ 792.085780] __should_failslab+0x124/0x180 [ 792.090033] should_failslab+0x9/0x14 [ 792.093857] kmem_cache_alloc_node_trace+0x270/0x740 [ 792.099090] __kmalloc_node_track_caller+0x3c/0x70 [ 792.104042] __kmalloc_reserve.isra.40+0x41/0xe0 [ 792.108814] __alloc_skb+0x155/0x770 [ 792.112545] ? netdev_alloc_frag+0x1f0/0x1f0 [ 792.116971] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.122440] ? lock_downgrade+0x900/0x900 [ 792.126611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 792.132167] ? aa_label_sk_perm+0x91/0x100 [ 792.136422] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 792.141369] ? aa_sk_perm+0x22b/0x8e0 [ 792.145182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.150754] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 792.156312] netlink_sendmsg+0xb29/0xfc0 [ 792.160401] ? netlink_unicast+0x760/0x760 [ 792.164652] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 792.169599] ? apparmor_socket_sendmsg+0x29/0x30 [ 792.174369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.179922] ? security_socket_sendmsg+0x94/0xc0 [ 792.184693] ? netlink_unicast+0x760/0x760 [ 792.188960] sock_sendmsg+0xd5/0x120 [ 792.192694] ___sys_sendmsg+0x51d/0x930 [ 792.196684] ? zap_class+0x640/0x640 [ 792.200419] ? copy_msghdr_from_user+0x580/0x580 [ 792.205190] ? get_pid_task+0xd6/0x1a0 [ 792.209110] ? find_held_lock+0x36/0x1c0 [ 792.213192] ? __might_fault+0x12b/0x1e0 [ 792.217283] ? lock_downgrade+0x900/0x900 [ 792.221458] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.226935] __sys_sendmmsg+0x246/0x6d0 [ 792.231193] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 792.235546] ? __lock_is_held+0xb5/0x140 [ 792.239630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.245187] ? check_preemption_disabled+0x48/0x280 [ 792.250271] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 792.255823] ? fput+0x130/0x1a0 [ 792.259115] ? do_syscall_64+0x9a/0x820 [ 792.263103] ? do_syscall_64+0x9a/0x820 [ 792.267088] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 792.271686] ? trace_hardirqs_on+0xbd/0x310 [ 792.276024] ? __ia32_sys_read+0xb0/0xb0 [ 792.280099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.285479] ? trace_hardirqs_off_caller+0x310/0x310 [ 792.290605] __x64_sys_sendmmsg+0x9d/0x100 [ 792.294860] do_syscall_64+0x1b9/0x820 [ 792.298763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 792.304148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 792.309096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 792.313954] ? trace_hardirqs_on_caller+0x310/0x310 13:02:15 executing program 2: 13:02:15 executing program 2: 13:02:15 executing program 1: 13:02:15 executing program 2: 13:02:15 executing program 2: 13:02:15 executing program 2: 13:02:15 executing program 1: [ 792.318990] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 792.324024] ? prepare_exit_to_usermode+0x291/0x3b0 [ 792.329062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 792.333915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.339106] RIP: 0033:0x457569 [ 792.339122] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 792.339131] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:02:15 executing program 3 (fault-call:4 fault-nth:84): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 792.339144] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 792.339156] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 792.361258] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 792.361268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 792.361277] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 792.438749] FAULT_INJECTION: forcing a failure. [ 792.438749] name failslab, interval 1, probability 0, space 0, times 0 [ 792.470532] CPU: 0 PID: 31149 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 792.477920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.487289] Call Trace: [ 792.489905] dump_stack+0x244/0x39d [ 792.493557] ? dump_stack_print_info.cold.1+0x20/0x20 [ 792.498785] should_fail.cold.4+0xa/0x17 [ 792.502882] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 792.508128] ? do_syscall_64+0x1b9/0x820 [ 792.512232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.517612] ? trace_hardirqs_off+0xb8/0x310 [ 792.522035] ? kasan_check_read+0x11/0x20 [ 792.526231] ? mark_held_locks+0x130/0x130 [ 792.530483] ? trace_hardirqs_off+0xb8/0x310 [ 792.534934] ? find_held_lock+0x36/0x1c0 [ 792.539008] ? __ib_umem_release+0x568/0xa70 [ 792.543448] ? rcu_read_lock_sched_held+0x14f/0x180 [ 792.548481] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.553952] __should_failslab+0x124/0x180 [ 792.558233] should_failslab+0x9/0x14 [ 792.562048] kmem_cache_alloc_node+0x26e/0x730 [ 792.566646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.572218] ? refcount_sub_and_test_checked+0x203/0x310 [ 792.577685] __alloc_skb+0x119/0x770 [ 792.581423] ? netdev_alloc_frag+0x1f0/0x1f0 13:02:15 executing program 0: 13:02:15 executing program 2: 13:02:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000500"}, 0x18) 13:02:15 executing program 1: 13:02:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000080)=0x2, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f00000000c0)=""/11, 0xb) 13:02:15 executing program 1: [ 792.585846] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.591311] ? lock_downgrade+0x900/0x900 [ 792.595480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 792.601033] ? aa_label_sk_perm+0x91/0x100 [ 792.605284] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 792.610245] ? aa_sk_perm+0x22b/0x8e0 [ 792.614064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.619619] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 792.625178] netlink_sendmsg+0xb29/0xfc0 [ 792.629285] ? netlink_unicast+0x760/0x760 [ 792.633529] ? aa_sock_msg_perm.isra.14+0xba/0x160 13:02:15 executing program 0: [ 792.638471] ? apparmor_socket_sendmsg+0x29/0x30 [ 792.643263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.648809] ? security_socket_sendmsg+0x94/0xc0 [ 792.648824] ? netlink_unicast+0x760/0x760 [ 792.648844] sock_sendmsg+0xd5/0x120 [ 792.648862] ___sys_sendmsg+0x51d/0x930 [ 792.648879] ? zap_class+0x640/0x640 [ 792.669253] ? copy_msghdr_from_user+0x580/0x580 [ 792.674118] ? get_pid_task+0xd6/0x1a0 [ 792.678029] ? find_held_lock+0x36/0x1c0 [ 792.682117] ? __might_fault+0x12b/0x1e0 13:02:16 executing program 1: prctl$PR_CAPBSET_DROP(0x18, 0x0) capset(&(0x7f0000000200)={0x19980330}, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffd}) [ 792.686216] ? lock_downgrade+0x900/0x900 [ 792.690399] ? perf_trace_sched_process_exec+0x860/0x860 [ 792.695879] __sys_sendmmsg+0x246/0x6d0 [ 792.699884] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 792.704243] ? __lock_is_held+0xb5/0x140 [ 792.708325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.713877] ? check_preemption_disabled+0x48/0x280 [ 792.718919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 792.724464] ? fput+0x130/0x1a0 [ 792.724482] ? do_syscall_64+0x9a/0x820 [ 792.724498] ? do_syscall_64+0x9a/0x820 [ 792.724512] ? lockdep_hardirqs_on+0x3bb/0x5b0 13:02:16 executing program 0: r0 = gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r0, 0x1000, 0x0) exit_group(0x0) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, &(0x7f00000001c0), 0x1000) tkill(r0, 0x6) ptrace(0x10, r0) [ 792.724529] ? trace_hardirqs_on+0xbd/0x310 [ 792.731765] ? __ia32_sys_read+0xb0/0xb0 [ 792.731783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.731801] ? trace_hardirqs_off_caller+0x310/0x310 [ 792.731823] __x64_sys_sendmmsg+0x9d/0x100 [ 792.763453] do_syscall_64+0x1b9/0x820 [ 792.767358] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 792.772736] ? syscall_return_slowpath+0x5e0/0x5e0 [ 792.777684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 792.780361] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) [ 792.782538] ? trace_hardirqs_on_caller+0x310/0x310 [ 792.782556] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 792.782574] ? prepare_exit_to_usermode+0x291/0x3b0 [ 792.782596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 792.782617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.814977] IPVS: Unknown mcast interface: syzkaller1 [ 792.816684] RIP: 0033:0x457569 13:02:16 executing program 1: mknod(&(0x7f0000000140)="e91f7189591e9233614b00", 0x8, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000740)="e91f7189591e9233614b00", 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000002c0)=0x2000000100000001, 0x4) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) 13:02:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 792.816701] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 792.816710] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 792.816725] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 792.816734] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 792.816748] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 792.866252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 792.866262] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:16 executing program 3 (fault-call:4 fault-nth:85): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:16 executing program 2: [ 792.963382] IPVS: Unknown mcast interface: syzkaller1 13:02:16 executing program 0: 13:02:16 executing program 2: 13:02:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\a\x00'}, 0x18) [ 793.003928] ptrace attach of ""[31167] was attempted by ""[31169] [ 793.033059] FAULT_INJECTION: forcing a failure. [ 793.033059] name failslab, interval 1, probability 0, space 0, times 0 [ 793.066400] CPU: 0 PID: 31192 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 793.074247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.083608] Call Trace: [ 793.086220] dump_stack+0x244/0x39d [ 793.089873] ? dump_stack_print_info.cold.1+0x20/0x20 [ 793.093851] IPVS: Unknown mcast interface: syzkaller1 [ 793.095087] should_fail.cold.4+0xa/0x17 [ 793.095110] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 793.095133] ? __save_stack_trace+0x8d/0xf0 [ 793.113801] ? save_stack+0xa9/0xd0 [ 793.117448] ? save_stack+0x43/0xd0 [ 793.121099] ? find_held_lock+0x36/0x1c0 [ 793.125221] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.130692] ? check_preemption_disabled+0x48/0x280 [ 793.135732] __should_failslab+0x124/0x180 [ 793.139983] should_failslab+0x9/0x14 [ 793.143804] kmem_cache_alloc_node_trace+0x270/0x740 [ 793.148938] __kmalloc_node_track_caller+0x3c/0x70 [ 793.153888] __kmalloc_reserve.isra.40+0x41/0xe0 [ 793.158666] __alloc_skb+0x155/0x770 [ 793.162400] ? netdev_alloc_frag+0x1f0/0x1f0 [ 793.166825] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.172292] ? lock_downgrade+0x900/0x900 [ 793.176460] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 793.182012] ? aa_label_sk_perm+0x91/0x100 [ 793.186265] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 793.191207] ? aa_sk_perm+0x22b/0x8e0 [ 793.195023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.200574] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 793.206128] netlink_sendmsg+0xb29/0xfc0 [ 793.210231] ? netlink_unicast+0x760/0x760 [ 793.214476] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 793.219428] ? apparmor_socket_sendmsg+0x29/0x30 [ 793.224210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.229760] ? security_socket_sendmsg+0x94/0xc0 [ 793.234527] ? netlink_unicast+0x760/0x760 [ 793.238779] sock_sendmsg+0xd5/0x120 [ 793.242738] ___sys_sendmsg+0x51d/0x930 [ 793.246729] ? zap_class+0x640/0x640 [ 793.250467] ? copy_msghdr_from_user+0x580/0x580 [ 793.255244] ? get_pid_task+0xd6/0x1a0 [ 793.259171] ? find_held_lock+0x36/0x1c0 [ 793.263257] ? __might_fault+0x12b/0x1e0 [ 793.267330] ? lock_downgrade+0x900/0x900 [ 793.271503] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.276978] __sys_sendmmsg+0x246/0x6d0 [ 793.280974] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 793.285314] ? __lock_is_held+0xb5/0x140 [ 793.289397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.294950] ? check_preemption_disabled+0x48/0x280 [ 793.299997] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 793.305551] ? fput+0x130/0x1a0 [ 793.308847] ? do_syscall_64+0x9a/0x820 [ 793.312838] ? do_syscall_64+0x9a/0x820 [ 793.316827] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 793.321422] ? trace_hardirqs_on+0xbd/0x310 [ 793.325752] ? __ia32_sys_read+0xb0/0xb0 [ 793.329824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.335226] ? trace_hardirqs_off_caller+0x310/0x310 [ 793.340348] __x64_sys_sendmmsg+0x9d/0x100 [ 793.344598] do_syscall_64+0x1b9/0x820 [ 793.348493] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 793.353868] ? syscall_return_slowpath+0x5e0/0x5e0 [ 793.358809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 793.363669] ? trace_hardirqs_on_caller+0x310/0x310 [ 793.368700] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 793.373731] ? prepare_exit_to_usermode+0x291/0x3b0 [ 793.378763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 793.383622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.388819] RIP: 0033:0x457569 [ 793.392022] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 793.410932] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 793.418648] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 793.425925] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 793.433203] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 793.440481] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 793.447759] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, &(0x7f0000000300)="26652481584b25d7e49ce3c1998e2f7d6952d50b405ae1d8e80be68793d261365ad3414f25dadbfb240fb91f51772e484f6f2dca5fcafffe851ceb24bb0fa55a405dad743bf39589287c9eb8438936db890de07d2944ee7f92f282e3433fcc13ce88d75210877ea5ff1b50ef714880f06d19ec1210e6163307344994682128192ebcad780783b498e39d9f1e7d27ccf573820ba8b2c4f524184f2c33ec5a8e5735cffe3ed93d") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:16 executing program 2: 13:02:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00?\x00'}, 0x18) 13:02:16 executing program 0: 13:02:16 executing program 3 (fault-call:4 fault-nth:86): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 793.679783] FAULT_INJECTION: forcing a failure. [ 793.679783] name failslab, interval 1, probability 0, space 0, times 0 [ 793.686979] IPVS: Unknown mcast interface: syzkaller1 [ 793.716270] CPU: 1 PID: 31212 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 793.723674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.733032] Call Trace: [ 793.735643] dump_stack+0x244/0x39d [ 793.739295] ? dump_stack_print_info.cold.1+0x20/0x20 [ 793.744507] should_fail.cold.4+0xa/0x17 [ 793.748601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 793.753727] ? do_syscall_64+0x1b9/0x820 [ 793.757802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.763183] ? trace_hardirqs_off+0xb8/0x310 [ 793.767600] ? kasan_check_read+0x11/0x20 [ 793.771775] ? mark_held_locks+0x130/0x130 [ 793.776022] ? trace_hardirqs_off+0xb8/0x310 [ 793.780454] ? find_held_lock+0x36/0x1c0 [ 793.784551] ? rcu_read_lock_sched_held+0x14f/0x180 [ 793.789582] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.795057] __should_failslab+0x124/0x180 [ 793.799311] should_failslab+0x9/0x14 [ 793.803141] kmem_cache_alloc_node+0x26e/0x730 [ 793.807732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.813282] ? refcount_sub_and_test_checked+0x203/0x310 [ 793.818751] __alloc_skb+0x119/0x770 [ 793.822482] ? netdev_alloc_frag+0x1f0/0x1f0 [ 793.826904] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.832365] ? lock_downgrade+0x900/0x900 [ 793.836529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 793.842080] ? aa_label_sk_perm+0x91/0x100 [ 793.846341] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 793.851282] ? aa_sk_perm+0x22b/0x8e0 [ 793.855092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.860661] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 793.866217] netlink_sendmsg+0xb29/0xfc0 [ 793.870300] ? netlink_unicast+0x760/0x760 [ 793.874543] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 793.879482] ? apparmor_socket_sendmsg+0x29/0x30 [ 793.884250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.889801] ? security_socket_sendmsg+0x94/0xc0 [ 793.894565] ? netlink_unicast+0x760/0x760 [ 793.898817] sock_sendmsg+0xd5/0x120 [ 793.902544] ___sys_sendmsg+0x51d/0x930 [ 793.906530] ? zap_class+0x640/0x640 [ 793.910260] ? copy_msghdr_from_user+0x580/0x580 [ 793.915031] ? get_pid_task+0xd6/0x1a0 [ 793.918939] ? find_held_lock+0x36/0x1c0 [ 793.923023] ? __might_fault+0x12b/0x1e0 [ 793.927096] ? lock_downgrade+0x900/0x900 [ 793.931289] ? perf_trace_sched_process_exec+0x860/0x860 [ 793.936766] __sys_sendmmsg+0x246/0x6d0 [ 793.940763] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 793.945099] ? __lock_is_held+0xb5/0x140 [ 793.949199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.954747] ? check_preemption_disabled+0x48/0x280 [ 793.959785] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 793.965331] ? fput+0x130/0x1a0 [ 793.968629] ? do_syscall_64+0x9a/0x820 [ 793.972618] ? do_syscall_64+0x9a/0x820 [ 793.976607] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 793.981207] ? trace_hardirqs_on+0xbd/0x310 [ 793.985539] ? __ia32_sys_read+0xb0/0xb0 [ 793.989613] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.994995] ? trace_hardirqs_off_caller+0x310/0x310 [ 794.000135] __x64_sys_sendmmsg+0x9d/0x100 [ 794.004383] do_syscall_64+0x1b9/0x820 [ 794.008282] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 794.013662] ? syscall_return_slowpath+0x5e0/0x5e0 [ 794.018599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.023460] ? trace_hardirqs_on_caller+0x310/0x310 [ 794.028493] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 794.033520] ? prepare_exit_to_usermode+0x291/0x3b0 [ 794.038550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.043412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.048609] RIP: 0033:0x457569 [ 794.051822] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 794.070732] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 794.078454] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 794.085736] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 794.093010] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 794.100289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 794.107566] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 794.122503] tmpfs: Bad mount option &e$XK%×äœãÁ™Ž/}iRÕ @ZáØè 懓Òa6ZÓAO%ÚÛû$¹Qw.HOo-Ê_Êÿþ…ë$»¥Z@]­t;ó•‰(|ž¸C‰6Û‰ à})Dî’ò‚ãC?ÌΈ×R‡~¥ÿPïqH€ðmìæ34I”h!(.¼­xƒ´˜ãŸ}'Ìõs‚ ¨²Äõ$O,3ìZŽW5Ïþ>Ù 13:02:18 executing program 1: 13:02:18 executing program 0: 13:02:18 executing program 2: 13:02:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000400"}, 0x18) 13:02:18 executing program 3 (fault-call:4 fault-nth:87): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000180)="8cdb87293f800b82d07b2c8712bf5e4509c051c1d62fba14880b8fb4d18939f1edfaef3cc434805a8a7bbf70504966b187255f1238f03d47332169763fe1f1eaf8c6125726dbb8a8f26321ba37b7a5e7a490621406f84368bcdf17a93b6c4a55345f958da4f2b6611a49c6ecf3c5", 0x6) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000740)={{0x4, 0x7, 0x4c78000000000, 0x0, '\x00', 0x3aa2}, 0x0, [0x2, 0x7, 0x4a846a02, 0x3, 0x1ff, 0xa4f2, 0x81, 0x9, 0x6, 0x1000, 0x0, 0x1ff, 0x3, 0x4, 0x2, 0x906, 0x5, 0x8, 0x2, 0x35, 0x1f, 0x9, 0x10000, 0x61, 0x5, 0x572, 0x1, 0x3, 0x0, 0x4, 0x6, 0x10001, 0x1ff, 0x4, 0x5, 0x8001, 0x8, 0x1, 0x0, 0x4, 0x10000, 0x0, 0x7f, 0x6, 0x6, 0x0, 0x100000001, 0x7, 0x100, 0x8, 0xfffffffffffffff9, 0x1ff, 0x3ff, 0x800, 0x4, 0x8, 0x6, 0xfffffffffffffe01, 0x0, 0x401, 0x0, 0x7, 0x9, 0xaf00, 0x80000000, 0x1000, 0x1000, 0x3, 0xfffffffffffff057, 0x40, 0x6, 0x3, 0x1f, 0x4, 0x6, 0x8, 0x19, 0x0, 0x3074, 0x2, 0x72, 0x6aa, 0x5804ff37, 0x3, 0xffffffffffffff08, 0x7fff, 0x0, 0x10001, 0x7, 0xa2, 0x9, 0x4, 0x5, 0x9, 0x9, 0x640d, 0x7, 0xdfbd, 0x7, 0x0, 0x7, 0xf1c, 0x2, 0x11, 0xa0, 0x4, 0x3, 0x40, 0xba, 0xc8eb, 0x9, 0x9, 0x5, 0x6, 0x7fffffff, 0xffffffffffff8000, 0xf911, 0xbc, 0x7, 0x2, 0x9, 0x40, 0x1f, 0x3f, 0x100, 0x80, 0x7f, 0x3], {0x0, 0x1c9c380}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:18 executing program 2: [ 795.539239] IPVS: Unknown mcast interface: syzkaller1 13:02:18 executing program 0: 13:02:18 executing program 1: [ 795.578455] FAULT_INJECTION: forcing a failure. [ 795.578455] name failslab, interval 1, probability 0, space 0, times 0 [ 795.626712] CPU: 0 PID: 31237 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 795.634106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.643461] Call Trace: [ 795.646063] dump_stack+0x244/0x39d [ 795.649702] ? dump_stack_print_info.cold.1+0x20/0x20 [ 795.654915] should_fail.cold.4+0xa/0x17 [ 795.658986] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 795.664111] ? __save_stack_trace+0x8d/0xf0 [ 795.668454] ? save_stack+0xa9/0xd0 [ 795.672091] ? save_stack+0x43/0xd0 [ 795.675740] ? find_held_lock+0x36/0x1c0 [ 795.679810] ? qxl_draw_dirty_fb+0x1318/0x1c50 [ 795.684406] ? qxl_draw_dirty_fb+0x1318/0x1c50 [ 795.688994] ? perf_trace_sched_process_exec+0x860/0x860 [ 795.694473] ? check_preemption_disabled+0x48/0x280 [ 795.699503] __should_failslab+0x124/0x180 [ 795.703742] should_failslab+0x9/0x14 [ 795.707550] kmem_cache_alloc_node_trace+0x270/0x740 [ 795.712662] __kmalloc_node_track_caller+0x3c/0x70 [ 795.717599] __kmalloc_reserve.isra.40+0x41/0xe0 [ 795.717619] __alloc_skb+0x155/0x770 13:02:19 executing program 2: 13:02:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100), 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:02:19 executing program 1: clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0xe9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000100)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:02:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 795.717638] ? netdev_alloc_frag+0x1f0/0x1f0 [ 795.717654] ? perf_trace_sched_process_exec+0x860/0x860 [ 795.730492] ? lock_downgrade+0x900/0x900 [ 795.730520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 795.745626] ? aa_label_sk_perm+0x91/0x100 [ 795.749875] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 795.754811] ? aa_sk_perm+0x22b/0x8e0 [ 795.758620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.764163] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 795.769728] netlink_sendmsg+0xb29/0xfc0 13:02:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x8000) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e21, 0x8, @loopback, 0x8}, {0xa, 0x4e21, 0xf56, @remote, 0x4}, 0xf8f, [0x8000, 0x8, 0xfffffffffffffff9, 0xe1be, 0xd57, 0x2, 0x1f, 0x7]}, 0x5c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 795.773801] ? netlink_unicast+0x760/0x760 [ 795.778056] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 795.783092] ? apparmor_socket_sendmsg+0x29/0x30 [ 795.787740] ptrace attach of "/root/syz-executor1"[31254] was attempted by "/root/syz-executor1"[31255] [ 795.787852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.802885] ? security_socket_sendmsg+0x94/0xc0 [ 795.807645] ? netlink_unicast+0x760/0x760 [ 795.811890] sock_sendmsg+0xd5/0x120 [ 795.815702] ___sys_sendmsg+0x51d/0x930 [ 795.819688] ? zap_class+0x640/0x640 13:02:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) [ 795.823407] ? copy_msghdr_from_user+0x580/0x580 [ 795.828160] ? get_pid_task+0xd6/0x1a0 [ 795.828181] ? find_held_lock+0x36/0x1c0 [ 795.828206] ? __might_fault+0x12b/0x1e0 [ 795.840171] ? lock_downgrade+0x900/0x900 [ 795.844342] ? perf_trace_sched_process_exec+0x860/0x860 [ 795.849807] __sys_sendmmsg+0x246/0x6d0 [ 795.853799] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 795.858127] ? __lock_is_held+0xb5/0x140 [ 795.862193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 795.867736] ? check_preemption_disabled+0x48/0x280 [ 795.872786] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 795.878340] ? fput+0x130/0x1a0 [ 795.881627] ? do_syscall_64+0x9a/0x820 [ 795.885611] ? do_syscall_64+0x9a/0x820 [ 795.889602] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 795.894195] ? trace_hardirqs_on+0xbd/0x310 [ 795.898523] ? __ia32_sys_read+0xb0/0xb0 [ 795.902594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.907958] ? trace_hardirqs_off_caller+0x310/0x310 [ 795.913083] __x64_sys_sendmmsg+0x9d/0x100 [ 795.917310] do_syscall_64+0x1b9/0x820 [ 795.921187] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 795.926538] ? syscall_return_slowpath+0x5e0/0x5e0 [ 795.931449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 795.936277] ? trace_hardirqs_on_caller+0x310/0x310 [ 795.941308] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 795.946303] ? prepare_exit_to_usermode+0x291/0x3b0 [ 795.951305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 795.956134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.961312] RIP: 0033:0x457569 13:02:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 795.964492] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 795.983372] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 795.991150] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 795.998404] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 796.005656] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 796.012910] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 796.020158] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 796.060259] IPVS: Unknown mcast interface: syzkaller1 13:02:19 executing program 3 (fault-call:4 fault-nth:88): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:19 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4d) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r1, 0x10d, 0xe4, &(0x7f0000000140), &(0x7f0000000100)=0x4) r2 = open(&(0x7f0000000040)='./file0\x00', 0x900, 0xc0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000080)={0x9, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}]}) 13:02:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="646566f30f10b4dc00000000660f38823b1ec4e1475c93010000009a00500000f300c4c2919ecf0f07b9090400000f3226f3ad36660f38dce5", 0x39}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000000c0)={0x0, @aes256}) 13:02:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000300"}, 0x18) [ 796.169558] IPVS: Unknown mcast interface: syzkaller1 [ 796.186454] FAULT_INJECTION: forcing a failure. [ 796.186454] name failslab, interval 1, probability 0, space 0, times 0 [ 796.201204] CPU: 0 PID: 31278 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 796.208569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.217917] Call Trace: [ 796.220507] dump_stack+0x244/0x39d [ 796.224155] ? dump_stack_print_info.cold.1+0x20/0x20 [ 796.229356] should_fail.cold.4+0xa/0x17 [ 796.233426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 796.238533] ? do_syscall_64+0x1b9/0x820 [ 796.242603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.247980] ? trace_hardirqs_off+0xb8/0x310 [ 796.252854] ? kasan_check_read+0x11/0x20 [ 796.257021] ? mark_held_locks+0x130/0x130 [ 796.261257] ? trace_hardirqs_off+0xb8/0x310 [ 796.265673] ? find_held_lock+0x36/0x1c0 [ 796.269748] ? rcu_read_lock_sched_held+0x14f/0x180 [ 796.274771] ? perf_trace_sched_process_exec+0x860/0x860 [ 796.280228] __should_failslab+0x124/0x180 [ 796.284472] should_failslab+0x9/0x14 [ 796.288271] kmem_cache_alloc_node+0x26e/0x730 [ 796.292854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.298392] ? refcount_sub_and_test_checked+0x203/0x310 [ 796.303860] __alloc_skb+0x119/0x770 [ 796.307579] ? netdev_alloc_frag+0x1f0/0x1f0 [ 796.312008] ? perf_trace_sched_process_exec+0x860/0x860 [ 796.317451] ? lock_downgrade+0x900/0x900 [ 796.321601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.327138] ? aa_label_sk_perm+0x91/0x100 [ 796.331396] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 796.336324] ? aa_sk_perm+0x22b/0x8e0 [ 796.340127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.345663] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 796.351203] netlink_sendmsg+0xb29/0xfc0 [ 796.355275] ? netlink_unicast+0x760/0x760 [ 796.359506] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 796.364444] ? apparmor_socket_sendmsg+0x29/0x30 [ 796.369204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.374750] ? security_socket_sendmsg+0x94/0xc0 [ 796.379521] ? netlink_unicast+0x760/0x760 [ 796.383774] sock_sendmsg+0xd5/0x120 [ 796.387510] ___sys_sendmsg+0x51d/0x930 [ 796.391507] ? zap_class+0x640/0x640 [ 796.395231] ? copy_msghdr_from_user+0x580/0x580 [ 796.399996] ? get_pid_task+0xd6/0x1a0 [ 796.403887] ? find_held_lock+0x36/0x1c0 [ 796.407956] ? __might_fault+0x12b/0x1e0 [ 796.412032] ? lock_downgrade+0x900/0x900 [ 796.416194] ? perf_trace_sched_process_exec+0x860/0x860 [ 796.421664] __sys_sendmmsg+0x246/0x6d0 [ 796.425648] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 796.429985] ? __lock_is_held+0xb5/0x140 [ 796.434056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.439600] ? check_preemption_disabled+0x48/0x280 [ 796.444637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 796.450171] ? fput+0x130/0x1a0 [ 796.453466] ? do_syscall_64+0x9a/0x820 [ 796.457445] ? do_syscall_64+0x9a/0x820 [ 796.461424] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 796.466010] ? trace_hardirqs_on+0xbd/0x310 [ 796.470329] ? __ia32_sys_read+0xb0/0xb0 [ 796.474388] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.479764] ? trace_hardirqs_off_caller+0x310/0x310 [ 796.484883] __x64_sys_sendmmsg+0x9d/0x100 [ 796.489119] do_syscall_64+0x1b9/0x820 [ 796.493008] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 796.498374] ? syscall_return_slowpath+0x5e0/0x5e0 [ 796.503304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 796.508155] ? trace_hardirqs_on_caller+0x310/0x310 [ 796.513174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 796.518204] ? prepare_exit_to_usermode+0x291/0x3b0 [ 796.523230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 796.528077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.533264] RIP: 0033:0x457569 [ 796.536458] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 796.555447] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 796.555461] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local}, 0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'team0\x00'}, 0x18) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x3}) dup3(r0, r1, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x7) 13:02:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00 \x00'}, 0x18) [ 796.555468] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 796.555474] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 796.555487] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 796.570429] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) [ 796.637065] IPVS: Unknown mcast interface: syzkaller1 13:02:19 executing program 3 (fault-call:4 fault-nth:89): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000240)={0x103, 0x29, 0x2, {0x8001, [{{0x80, 0x2, 0x8}, 0x3, 0x9, 0x7, './file0'}, {{0x40, 0x4, 0x4}, 0x8, 0x0, 0x7, './file0'}, {{0x2, 0x4, 0x2}, 0xb41, 0x8, 0x7, './file0'}, {{0x5, 0x2, 0x5}, 0x6, 0x8, 0x7, './file0'}, {{0x1, 0x1, 0x6}, 0x6, 0x4, 0x7, './file0'}, {{0x4, 0x0, 0x7}, 0x8, 0x9, 0x7, './file0'}, {{0x80, 0x2}, 0x600, 0x7, 0x7, './file0'}, {{0x8, 0x3, 0x2}, 0x3, 0x1, 0x7, './file0'}]}}, 0x103) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00`\x00'}, 0x18) 13:02:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) 13:02:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) [ 796.780426] FAULT_INJECTION: forcing a failure. [ 796.780426] name failslab, interval 1, probability 0, space 0, times 0 [ 796.803361] IPVS: Unknown mcast interface: syzkaller1 [ 796.826010] CPU: 1 PID: 31303 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 796.833392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.833398] Call Trace: [ 796.833417] dump_stack+0x244/0x39d [ 796.833435] ? dump_stack_print_info.cold.1+0x20/0x20 [ 796.854138] should_fail.cold.4+0xa/0x17 [ 796.858206] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 796.863314] ? __save_stack_trace+0x8d/0xf0 [ 796.867642] ? save_stack+0xa9/0xd0 [ 796.867657] ? save_stack+0x43/0xd0 [ 796.867677] ? find_held_lock+0x36/0x1c0 [ 796.867696] ? vimc_cap_start_streaming+0xe8/0x120 [ 796.867718] ? vimc_cap_start_streaming+0xe8/0x120 [ 796.888791] ? perf_trace_sched_process_exec+0x860/0x860 [ 796.888813] ? check_preemption_disabled+0x48/0x280 [ 796.888831] __should_failslab+0x124/0x180 [ 796.899278] should_failslab+0x9/0x14 [ 796.899295] kmem_cache_alloc_node_trace+0x270/0x740 [ 796.899319] __kmalloc_node_track_caller+0x3c/0x70 [ 796.899337] __kmalloc_reserve.isra.40+0x41/0xe0 [ 796.907342] __alloc_skb+0x155/0x770 [ 796.907363] ? netdev_alloc_frag+0x1f0/0x1f0 [ 796.907379] ? perf_trace_sched_process_exec+0x860/0x860 [ 796.907393] ? lock_downgrade+0x900/0x900 [ 796.907416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 796.917414] ? aa_label_sk_perm+0x91/0x100 [ 796.917432] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 796.917449] ? aa_sk_perm+0x22b/0x8e0 [ 796.917462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.917476] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 796.930296] netlink_sendmsg+0xb29/0xfc0 [ 796.930316] ? netlink_unicast+0x760/0x760 [ 796.949627] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 796.958308] ? apparmor_socket_sendmsg+0x29/0x30 [ 796.958322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 796.958334] ? security_socket_sendmsg+0x94/0xc0 [ 796.958348] ? netlink_unicast+0x760/0x760 [ 796.977634] sock_sendmsg+0xd5/0x120 [ 796.977651] ___sys_sendmsg+0x51d/0x930 [ 796.987301] ? zap_class+0x640/0x640 [ 796.997544] ? copy_msghdr_from_user+0x580/0x580 [ 796.997560] ? get_pid_task+0xd6/0x1a0 [ 796.997576] ? find_held_lock+0x36/0x1c0 [ 797.002777] IPVS: ftp: loaded support on port[0] = 21 [ 797.005485] ? __might_fault+0x12b/0x1e0 [ 797.017878] ? lock_downgrade+0x900/0x900 [ 797.017909] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.017943] __sys_sendmmsg+0x246/0x6d0 [ 797.017966] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 797.017982] ? __lock_is_held+0xb5/0x140 [ 797.025894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.025908] ? check_preemption_disabled+0x48/0x280 [ 797.025940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 797.035142] ? fput+0x130/0x1a0 [ 797.035158] ? do_syscall_64+0x9a/0x820 13:02:20 executing program 3 (fault-call:4 fault-nth:90): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 797.035170] ? do_syscall_64+0x9a/0x820 [ 797.035198] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 797.044767] ? trace_hardirqs_on+0xbd/0x310 [ 797.044782] ? __ia32_sys_read+0xb0/0xb0 [ 797.044795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.044811] ? trace_hardirqs_off_caller+0x310/0x310 [ 797.057139] __x64_sys_sendmmsg+0x9d/0x100 [ 797.057156] do_syscall_64+0x1b9/0x820 [ 797.057168] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 797.057182] ? syscall_return_slowpath+0x5e0/0x5e0 [ 797.057197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 797.067710] ? trace_hardirqs_on_caller+0x310/0x310 [ 797.067727] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 797.067742] ? prepare_exit_to_usermode+0x291/0x3b0 [ 797.067762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 797.067781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.067796] RIP: 0033:0x457569 [ 797.080521] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000600"}, 0x18) [ 797.080529] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 797.080543] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 797.080550] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 797.080561] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 797.089070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 797.089079] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 797.265630] FAULT_INJECTION: forcing a failure. [ 797.265630] name failslab, interval 1, probability 0, space 0, times 0 [ 797.305431] CPU: 0 PID: 31333 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 797.312810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.322156] Call Trace: [ 797.322180] dump_stack+0x244/0x39d [ 797.322202] ? dump_stack_print_info.cold.1+0x20/0x20 [ 797.322227] should_fail.cold.4+0xa/0x17 [ 797.322246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 797.328416] ? do_syscall_64+0x1b9/0x820 [ 797.328430] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.328447] ? trace_hardirqs_off+0xb8/0x310 [ 797.328462] ? kasan_check_read+0x11/0x20 [ 797.328485] ? mark_held_locks+0x130/0x130 [ 797.328500] ? trace_hardirqs_off+0xb8/0x310 [ 797.337713] ? find_held_lock+0x36/0x1c0 [ 797.337748] ? rcu_read_lock_sched_held+0x14f/0x180 [ 797.337760] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.337784] __should_failslab+0x124/0x180 [ 797.346894] should_failslab+0x9/0x14 [ 797.346915] kmem_cache_alloc_node+0x26e/0x730 [ 797.346935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.346948] ? refcount_sub_and_test_checked+0x203/0x310 [ 797.346967] __alloc_skb+0x119/0x770 [ 797.356780] ? netdev_alloc_frag+0x1f0/0x1f0 [ 797.356794] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.356808] ? lock_downgrade+0x900/0x900 [ 797.356826] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.356843] ? aa_label_sk_perm+0x91/0x100 [ 797.365172] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 797.365186] ? aa_sk_perm+0x22b/0x8e0 [ 797.365201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.365213] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 797.365231] netlink_sendmsg+0xb29/0xfc0 [ 797.373659] ? netlink_unicast+0x760/0x760 [ 797.373672] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 797.373688] ? apparmor_socket_sendmsg+0x29/0x30 [ 797.373705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.384119] ? security_socket_sendmsg+0x94/0xc0 [ 797.384132] ? netlink_unicast+0x760/0x760 [ 797.384149] sock_sendmsg+0xd5/0x120 [ 797.384167] ___sys_sendmsg+0x51d/0x930 [ 797.392160] ? zap_class+0x640/0x640 [ 797.392178] ? copy_msghdr_from_user+0x580/0x580 [ 797.392194] ? get_pid_task+0xd6/0x1a0 [ 797.392211] ? find_held_lock+0x36/0x1c0 [ 797.402290] ? __might_fault+0x12b/0x1e0 [ 797.402305] ? lock_downgrade+0x900/0x900 [ 797.402332] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.411465] __sys_sendmmsg+0x246/0x6d0 [ 797.411489] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 797.411505] ? __lock_is_held+0xb5/0x140 [ 797.421333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.421348] ? check_preemption_disabled+0x48/0x280 [ 797.421375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 797.421392] ? fput+0x130/0x1a0 [ 797.431028] ? do_syscall_64+0x9a/0x820 [ 797.431042] ? do_syscall_64+0x9a/0x820 13:02:20 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) 13:02:20 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) 13:02:20 executing program 3 (fault-call:4 fault-nth:91): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:20 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) [ 797.431056] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 797.431072] ? trace_hardirqs_on+0xbd/0x310 [ 797.440193] ? __ia32_sys_read+0xb0/0xb0 [ 797.440208] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.440224] ? trace_hardirqs_off_caller+0x310/0x310 [ 797.440244] __x64_sys_sendmmsg+0x9d/0x100 [ 797.449539] do_syscall_64+0x1b9/0x820 [ 797.449552] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 797.449569] ? syscall_return_slowpath+0x5e0/0x5e0 [ 797.449585] ? trace_hardirqs_on_caller+0x310/0x310 [ 797.449602] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 797.459154] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 797.459168] ? __switch_to_asm+0x40/0x70 [ 797.459179] ? __switch_to_asm+0x34/0x70 [ 797.459198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 797.459217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.468326] RIP: 0033:0x457569 [ 797.468342] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 797.468350] RSP: 002b:00007f6cb5b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 797.468364] RAX: ffffffffffffffda RBX: 00007f6cb5b07c90 RCX: 0000000000457569 [ 797.468372] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 797.468383] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 797.478634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b086d4 [ 797.478643] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 797.744355] FAULT_INJECTION: forcing a failure. [ 797.744355] name failslab, interval 1, probability 0, space 0, times 0 13:02:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000500"}, 0x18) [ 797.805644] CPU: 1 PID: 31350 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 797.813028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 797.822373] Call Trace: [ 797.822404] dump_stack+0x244/0x39d [ 797.822427] ? dump_stack_print_info.cold.1+0x20/0x20 [ 797.822454] should_fail.cold.4+0xa/0x17 [ 797.837863] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 797.842980] ? __save_stack_trace+0x8d/0xf0 [ 797.847324] ? save_stack+0xa9/0xd0 [ 797.850968] ? save_stack+0x43/0xd0 [ 797.854614] ? find_held_lock+0x36/0x1c0 [ 797.857117] IPVS: Unknown mcast interface: syzkaller1 [ 797.858704] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.858725] ? check_preemption_disabled+0x48/0x280 [ 797.874357] __should_failslab+0x124/0x180 [ 797.878604] should_failslab+0x9/0x14 [ 797.882411] kmem_cache_alloc_node_trace+0x270/0x740 [ 797.887534] __kmalloc_node_track_caller+0x3c/0x70 [ 797.892475] __kmalloc_reserve.isra.40+0x41/0xe0 [ 797.897242] __alloc_skb+0x155/0x770 [ 797.900973] ? netdev_alloc_frag+0x1f0/0x1f0 13:02:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00`\x00'}, 0x18) [ 797.905400] ? perf_trace_sched_process_exec+0x860/0x860 [ 797.910863] ? lock_downgrade+0x900/0x900 [ 797.915034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 797.920574] ? aa_label_sk_perm+0x91/0x100 [ 797.924810] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 797.929732] ? aa_sk_perm+0x22b/0x8e0 [ 797.929749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.929764] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 797.929784] netlink_sendmsg+0xb29/0xfc0 [ 797.929807] ? netlink_unicast+0x760/0x760 [ 797.952908] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 797.957843] ? apparmor_socket_sendmsg+0x29/0x30 [ 797.962611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 797.962628] IPVS: Unknown mcast interface: syzkaller1 [ 797.968142] ? security_socket_sendmsg+0x94/0xc0 [ 797.968157] ? netlink_unicast+0x760/0x760 [ 797.968173] sock_sendmsg+0xd5/0x120 [ 797.968188] ___sys_sendmsg+0x51d/0x930 [ 797.968204] ? zap_class+0x640/0x640 [ 797.993688] ? copy_msghdr_from_user+0x580/0x580 [ 797.993709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 798.003185] ? find_held_lock+0x36/0x1c0 [ 798.003206] ? __might_fault+0x12b/0x1e0 [ 798.011288] ? lock_downgrade+0x900/0x900 [ 798.015450] ? perf_trace_sched_process_exec+0x860/0x860 [ 798.020909] __sys_sendmmsg+0x246/0x6d0 [ 798.024899] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 798.029224] ? __lock_is_held+0xb5/0x140 [ 798.033295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 798.038856] ? check_preemption_disabled+0x48/0x280 [ 798.043903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 798.049440] ? fput+0x130/0x1a0 [ 798.052722] ? do_syscall_64+0x9a/0x820 [ 798.056698] ? do_syscall_64+0x9a/0x820 [ 798.060672] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 798.065259] ? trace_hardirqs_on+0xbd/0x310 [ 798.069581] ? __ia32_sys_read+0xb0/0xb0 [ 798.073855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.079233] ? trace_hardirqs_off_caller+0x310/0x310 [ 798.084348] __x64_sys_sendmmsg+0x9d/0x100 [ 798.088592] do_syscall_64+0x1b9/0x820 [ 798.092482] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 798.097852] ? syscall_return_slowpath+0x5e0/0x5e0 [ 798.102794] ? trace_hardirqs_on_caller+0x310/0x310 [ 798.107822] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 798.112854] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 798.119539] ? __switch_to_asm+0x40/0x70 [ 798.123606] ? __switch_to_asm+0x34/0x70 [ 798.127679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 798.132538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 798.137731] RIP: 0033:0x457569 [ 798.140935] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 798.159836] RSP: 002b:00007f6cb5b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 798.167554] RAX: ffffffffffffffda RBX: 00007f6cb5b07c90 RCX: 0000000000457569 [ 798.174825] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 798.182113] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 798.189385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b086d4 [ 798.196655] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 798.406932] device bridge_slave_1 left promiscuous mode [ 798.412398] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.456913] device bridge_slave_0 left promiscuous mode [ 798.462327] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.513914] team0 (unregistering): Port device team_slave_1 removed [ 798.523191] team0 (unregistering): Port device team_slave_0 removed [ 798.532104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 798.560621] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 798.613376] bond0 (unregistering): Released all slaves [ 798.748386] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.754789] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.761828] device bridge_slave_0 entered promiscuous mode [ 798.786549] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.792993] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.800395] device bridge_slave_1 entered promiscuous mode [ 798.838994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 798.877217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 798.990899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 799.032503] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 799.290145] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 799.298461] team0: Port device team_slave_0 added [ 799.334650] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 799.342047] team0: Port device team_slave_1 added [ 799.380692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 799.388921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 799.403158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 799.434845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 799.442501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 799.457382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 799.489789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 799.498020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 799.512184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 799.544203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 799.551723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 799.566629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 799.875781] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.882180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.888871] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.895217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.902876] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 800.416635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 800.705808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 800.788967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 800.865443] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 800.871742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 800.878983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 800.952769] 8021q: adding VLAN 0 to HW filter on device team0 13:02:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x2081) accept4$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x80800) r3 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000080)) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) 13:02:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000600"}, 0x18) 13:02:24 executing program 3 (fault-call:4 fault-nth:92): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) 13:02:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0x42e) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x2000, &(0x7f0000000240), 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)={0x6}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:02:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000000)="d0", 0x1}], 0x1, &(0x7f0000000040)}, 0x0) io_setup(0x1, &(0x7f00000005c0)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) [ 801.483359] FAULT_INJECTION: forcing a failure. [ 801.483359] name failslab, interval 1, probability 0, space 0, times 0 [ 801.500342] CPU: 1 PID: 31642 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 801.507705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.517040] Call Trace: [ 801.519613] dump_stack+0x244/0x39d [ 801.523223] ? dump_stack_print_info.cold.1+0x20/0x20 [ 801.528401] should_fail.cold.4+0xa/0x17 [ 801.532448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 801.537535] ? do_syscall_64+0x1b9/0x820 [ 801.541575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.547007] ? trace_hardirqs_off+0xb8/0x310 [ 801.551398] ? kasan_check_read+0x11/0x20 [ 801.555532] ? mark_held_locks+0x130/0x130 [ 801.559754] ? trace_hardirqs_off+0xb8/0x310 [ 801.564143] ? find_held_lock+0x36/0x1c0 [ 801.568197] ? rcu_read_lock_sched_held+0x14f/0x180 [ 801.573192] ? perf_trace_sched_process_exec+0x860/0x860 [ 801.578630] __should_failslab+0x124/0x180 [ 801.582853] should_failslab+0x9/0x14 [ 801.586636] kmem_cache_alloc_node+0x26e/0x730 [ 801.591210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.596732] ? refcount_sub_and_test_checked+0x203/0x310 [ 801.602171] __alloc_skb+0x119/0x770 [ 801.605869] ? netdev_alloc_frag+0x1f0/0x1f0 [ 801.610260] ? perf_trace_sched_process_exec+0x860/0x860 [ 801.615693] ? lock_downgrade+0x900/0x900 [ 801.619823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 801.625381] ? aa_label_sk_perm+0x91/0x100 [ 801.629607] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 801.634515] ? aa_sk_perm+0x22b/0x8e0 [ 801.638298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.643817] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 801.649338] netlink_sendmsg+0xb29/0xfc0 [ 801.653383] ? netlink_unicast+0x760/0x760 [ 801.657690] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 801.662606] ? apparmor_socket_sendmsg+0x29/0x30 [ 801.667430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.672950] ? security_socket_sendmsg+0x94/0xc0 [ 801.677686] ? netlink_unicast+0x760/0x760 [ 801.681903] sock_sendmsg+0xd5/0x120 [ 801.685597] ___sys_sendmsg+0x51d/0x930 [ 801.689554] ? zap_class+0x640/0x640 [ 801.693253] ? copy_msghdr_from_user+0x580/0x580 [ 801.697993] ? get_pid_task+0xd6/0x1a0 [ 801.701866] ? find_held_lock+0x36/0x1c0 [ 801.705913] ? __might_fault+0x12b/0x1e0 [ 801.709961] ? lock_downgrade+0x900/0x900 [ 801.714101] ? perf_trace_sched_process_exec+0x860/0x860 [ 801.719543] __sys_sendmmsg+0x246/0x6d0 [ 801.723502] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 801.727833] ? __lock_is_held+0xb5/0x140 [ 801.731876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.737397] ? check_preemption_disabled+0x48/0x280 [ 801.742401] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 801.747915] ? fput+0x130/0x1a0 [ 801.751177] ? do_syscall_64+0x9a/0x820 [ 801.755132] ? do_syscall_64+0x9a/0x820 [ 801.759087] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 801.763658] ? trace_hardirqs_on+0xbd/0x310 [ 801.767964] ? __ia32_sys_read+0xb0/0xb0 [ 801.772018] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.777363] ? trace_hardirqs_off_caller+0x310/0x310 [ 801.782450] __x64_sys_sendmmsg+0x9d/0x100 [ 801.786685] do_syscall_64+0x1b9/0x820 [ 801.790557] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 801.795905] ? syscall_return_slowpath+0x5e0/0x5e0 [ 801.800813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 801.805634] ? trace_hardirqs_on_caller+0x310/0x310 [ 801.810652] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 801.815663] ? prepare_exit_to_usermode+0x291/0x3b0 [ 801.820673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 801.825504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.830675] RIP: 0033:0x457569 [ 801.833854] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 801.852734] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 801.860432] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 801.867688] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 801.874937] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 801.882184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 801.889434] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 801.899500] IPVS: Unknown mcast interface: syzkaller1 13:02:25 executing program 3 (fault-call:4 fault-nth:93): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', &(0x7f0000172000)}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r2, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r3, &(0x7f00000000c0)=@known='user.syz\x00') bind$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) socket$l2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), &(0x7f0000107000)=""/78}, 0x18) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)='ns/pid_for_children\x00'}, 0x30) getpid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000280)='ns/\a\x00\x00\x00\x00') setns(r6, 0x0) [ 802.008382] FAULT_INJECTION: forcing a failure. [ 802.008382] name failslab, interval 1, probability 0, space 0, times 0 [ 802.049823] IPVS: Unknown mcast interface: syzkaller1 [ 802.085668] CPU: 1 PID: 31654 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 802.093053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.093059] Call Trace: [ 802.093082] dump_stack+0x244/0x39d [ 802.093110] ? dump_stack_print_info.cold.1+0x20/0x20 [ 802.105018] should_fail.cold.4+0xa/0x17 [ 802.105035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 802.105067] ? __save_stack_trace+0x8d/0xf0 [ 802.105095] ? save_stack+0xa9/0xd0 [ 802.130945] ? save_stack+0x43/0xd0 [ 802.134589] ? find_held_lock+0x36/0x1c0 [ 802.138669] ? reiserfs_add_ordered_list+0x98/0x6d0 [ 802.143691] ? reiserfs_add_ordered_list+0x98/0x6d0 [ 802.143708] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.154151] ? check_preemption_disabled+0x48/0x280 [ 802.154170] __should_failslab+0x124/0x180 [ 802.154188] should_failslab+0x9/0x14 [ 802.167183] kmem_cache_alloc_node_trace+0x270/0x740 [ 802.172294] __kmalloc_node_track_caller+0x3c/0x70 [ 802.172313] __kmalloc_reserve.isra.40+0x41/0xe0 [ 802.181962] __alloc_skb+0x155/0x770 [ 802.181981] ? netdev_alloc_frag+0x1f0/0x1f0 [ 802.181998] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.195558] ? lock_downgrade+0x900/0x900 [ 802.199734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 802.205275] ? aa_label_sk_perm+0x91/0x100 [ 802.209505] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 802.214424] ? aa_sk_perm+0x22b/0x8e0 [ 802.218217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.223744] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 802.229278] netlink_sendmsg+0xb29/0xfc0 [ 802.233342] ? netlink_unicast+0x760/0x760 [ 802.237570] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 802.242514] ? apparmor_socket_sendmsg+0x29/0x30 [ 802.247255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.252779] ? security_socket_sendmsg+0x94/0xc0 [ 802.257548] ? netlink_unicast+0x760/0x760 [ 802.261783] sock_sendmsg+0xd5/0x120 [ 802.265497] ___sys_sendmsg+0x51d/0x930 [ 802.269459] ? zap_class+0x640/0x640 [ 802.273171] ? copy_msghdr_from_user+0x580/0x580 [ 802.277921] ? get_pid_task+0xd6/0x1a0 [ 802.281806] ? find_held_lock+0x36/0x1c0 [ 802.285871] ? __might_fault+0x12b/0x1e0 [ 802.289931] ? lock_downgrade+0x900/0x900 [ 802.294088] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.299546] __sys_sendmmsg+0x246/0x6d0 [ 802.303523] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 802.307839] ? __lock_is_held+0xb5/0x140 [ 802.311902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.317434] ? check_preemption_disabled+0x48/0x280 [ 802.322454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 802.327985] ? fput+0x130/0x1a0 [ 802.331275] ? do_syscall_64+0x9a/0x820 [ 802.335243] ? do_syscall_64+0x9a/0x820 [ 802.339224] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 802.343807] ? trace_hardirqs_on+0xbd/0x310 [ 802.348127] ? __ia32_sys_read+0xb0/0xb0 [ 802.352188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.357563] ? trace_hardirqs_off_caller+0x310/0x310 [ 802.362664] __x64_sys_sendmmsg+0x9d/0x100 [ 802.366893] do_syscall_64+0x1b9/0x820 [ 802.370768] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 802.376127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 802.381047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 802.385883] ? trace_hardirqs_on_caller+0x310/0x310 [ 802.390893] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 802.395919] ? prepare_exit_to_usermode+0x291/0x3b0 [ 802.400937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 802.405783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.410969] RIP: 0033:0x457569 [ 802.414163] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:25 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x17}, 0xbbc1, 0x3, 0x0, 0x8, 0x7ff, 0x20000000, 0x5}, 0x20) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x0) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0xb732, 0x1, [0xe3e9]}, &(0x7f0000000400)=0xa) ioctl$VT_RELDISP(r3, 0x5605) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={r4, 0xb413}, &(0x7f0000000480)=0x8) clock_getres(0xfffffffffffffff2, &(0x7f0000000040)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xffffffffffffffe3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000640)="1765249c1c387cff921666c73f16b0137a221bb9f350c08ec989b31038ef3f65ca9d446f471c7030ed317763298b890ea02187dc4e39ef222c68c28e4fe9a81c6a1c15d16074b4203e555f51374758bdbc0f1fb5814b6d8f21d040d2920751", &(0x7f00000006c0)="356ebeb56ecd09156022a1b2d2e6297c7786a13ca1b39c37182ebde4d188d3f728ab0c3b0f046e9f87d1236f3f3aad196a4ca3cd586dc9d989e3a04d758ce98dc478ab1196aea0d3cc266704b3aca8f8c1e694ca9656bd933e75d58be09a3d5935816447f73269645382b2c12830db2548d1d2739601adc4aa5416a4fe98abba515e132e494999c2c5a3ee5e1a38b19c0441777eac95", 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) getrlimit(0x0, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x325, 0x0, 0x1d3, 0xe003, 0x33c, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x75, r6}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0x8108551b, 0x80000001) r7 = socket(0xa, 0x5, 0x6) ioctl$sock_ifreq(r7, 0x8994, &(0x7f00000003c0)={'bridge0\x00', @ifru_data=&(0x7f0000000340)="5d835a7778467230b75ebeff03c290723d887dc09645ece86cfc3faa868cfde5"}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r6}) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) bind$packet(r0, &(0x7f0000000380)={0x11, 0x17, r1, 0x1, 0x4, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000a0000001ceb060000009500000000000000000c"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xc) 13:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\a\x00'}, 0x18) [ 802.433057] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 802.440753] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 802.448031] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 802.455291] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 802.462549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 802.469804] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x800af2, 0x20000) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f45378e82a700f5100000000200000003003e"], 0x13) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f00000002c0)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x100) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000100)=0x5) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:25 executing program 3 (fault-call:4 fault-nth:94): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 802.537623] IPVS: Unknown mcast interface: syzkaller1 [ 802.546751] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 13:02:25 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl(r0, 0x20000000008912, &(0x7f0000000240)="0a5c2d0240316285717070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000000440)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="06000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="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"], 0x48}}, 0x0) 13:02:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00?\x00'}, 0x18) 13:02:25 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) r2 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) keyctl$update(0x2, r2, &(0x7f0000000100)="5813f529d00a4c35a7109286d7c051d49767ff93ff6d4d4acea06953a509e2a8c9b67986bf551d2cf834049c59f2009ae900ce5ea29bc680b2382388481e4b0173", 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@local}}, 0x0) setxattr$security_capability(0x0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x2) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) ioctl$UI_DEV_DESTROY(r1, 0x5502) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x7fffffff, 0x2000) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000004c0)='/\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='security.capa%ility\x00', &(0x7f0000000440)='security.capability\x00'], 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000010000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)) r3 = socket$inet6(0xa, 0x3, 0x205d5) close(r3) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x2007fff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], 0x0) [ 802.687125] FAULT_INJECTION: forcing a failure. [ 802.687125] name failslab, interval 1, probability 0, space 0, times 0 [ 802.714204] IPVS: Unknown mcast interface: syzkaller1 [ 802.752330] CPU: 0 PID: 31690 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 802.759707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.769058] Call Trace: [ 802.771653] dump_stack+0x244/0x39d [ 802.775288] ? dump_stack_print_info.cold.1+0x20/0x20 [ 802.780493] should_fail.cold.4+0xa/0x17 [ 802.784556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 802.789663] ? do_syscall_64+0x1b9/0x820 [ 802.791478] IPVS: Unknown mcast interface: syzkaller1 [ 802.793721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.793739] ? trace_hardirqs_off+0xb8/0x310 [ 802.793754] ? kasan_check_read+0x11/0x20 [ 802.793781] ? mark_held_locks+0x130/0x130 [ 802.793798] ? trace_hardirqs_off+0xb8/0x310 [ 802.821550] ? find_held_lock+0x36/0x1c0 [ 802.825734] ? rcu_read_lock_sched_held+0x14f/0x180 [ 802.825750] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.825777] __should_failslab+0x124/0x180 [ 802.836242] should_failslab+0x9/0x14 [ 802.836260] kmem_cache_alloc_node+0x26e/0x730 [ 802.836278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.836295] ? refcount_sub_and_test_checked+0x203/0x310 [ 802.836318] __alloc_skb+0x119/0x770 [ 802.836335] ? netdev_alloc_frag+0x1f0/0x1f0 [ 802.849243] IPVS: Unknown mcast interface: syzkaller1 [ 802.854418] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.854434] ? lock_downgrade+0x900/0x900 [ 802.854457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 802.854473] ? aa_label_sk_perm+0x91/0x100 [ 802.854489] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 802.854522] ? aa_sk_perm+0x22b/0x8e0 [ 802.901182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.906702] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 802.912226] netlink_sendmsg+0xb29/0xfc0 [ 802.916279] ? netlink_unicast+0x760/0x760 [ 802.920497] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 802.925410] ? apparmor_socket_sendmsg+0x29/0x30 [ 802.930148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.935665] ? security_socket_sendmsg+0x94/0xc0 [ 802.940400] ? netlink_unicast+0x760/0x760 [ 802.944621] sock_sendmsg+0xd5/0x120 [ 802.948317] ___sys_sendmsg+0x51d/0x930 [ 802.952282] ? zap_class+0x640/0x640 [ 802.955978] ? copy_msghdr_from_user+0x580/0x580 [ 802.960721] ? get_pid_task+0xd6/0x1a0 [ 802.964600] ? find_held_lock+0x36/0x1c0 [ 802.968651] ? __might_fault+0x12b/0x1e0 [ 802.972692] ? lock_downgrade+0x900/0x900 [ 802.976830] ? perf_trace_sched_process_exec+0x860/0x860 [ 802.982267] __sys_sendmmsg+0x246/0x6d0 [ 802.986229] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 802.990537] ? __lock_is_held+0xb5/0x140 [ 802.994609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 803.000149] ? check_preemption_disabled+0x48/0x280 [ 803.005156] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 803.010671] ? fput+0x130/0x1a0 [ 803.013929] ? do_syscall_64+0x9a/0x820 [ 803.017885] ? do_syscall_64+0x9a/0x820 [ 803.021842] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 803.026407] ? trace_hardirqs_on+0xbd/0x310 [ 803.030707] ? __ia32_sys_read+0xb0/0xb0 [ 803.034764] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.040109] ? trace_hardirqs_off_caller+0x310/0x310 [ 803.045203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.050729] __x64_sys_sendmmsg+0x9d/0x100 [ 803.054946] do_syscall_64+0x1b9/0x820 [ 803.058811] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 803.064157] ? syscall_return_slowpath+0x5e0/0x5e0 [ 803.069062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 803.074302] ? trace_hardirqs_on_caller+0x310/0x310 [ 803.079300] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 803.084313] ? prepare_exit_to_usermode+0x291/0x3b0 [ 803.089313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 803.094140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.099313] RIP: 0033:0x457569 [ 803.102495] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 803.121376] RSP: 002b:00007f6cb5b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 803.129065] RAX: ffffffffffffffda RBX: 00007f6cb5b07c90 RCX: 0000000000457569 [ 803.136318] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000003 [ 803.143581] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', &(0x7f0000172000)}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r2, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r3, &(0x7f00000000c0)=@known='user.syz\x00') bind$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) socket$l2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), &(0x7f0000107000)=""/78}, 0x18) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)='ns/pid_for_children\x00'}, 0x30) getpid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000280)='ns/\a\x00\x00\x00\x00') setns(r6, 0x0) 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) ioctl$TCFLSH(r1, 0x540b, 0x8) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000000007f"}, 0x18) [ 803.150832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b086d4 [ 803.158081] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000004 [ 803.210413] IPVS: Unknown mcast interface: syzkaller1 13:02:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', &(0x7f0000172000)}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r2, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r3, &(0x7f00000000c0)=@known='user.syz\x00') bind$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) socket$l2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), &(0x7f0000107000)=""/78}, 0x18) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)='ns/pid_for_children\x00'}, 0x30) getpid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000280)='ns/\a\x00\x00\x00\x00') setns(r6, 0x0) 13:02:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x10000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00 \x00'}, 0x18) 13:02:26 executing program 3 (fault-call:4 fault-nth:95): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', &(0x7f0000172000)}, 0x20) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000080), 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r2, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x8000fffffffe) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r3, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r3, &(0x7f00000000c0)=@known='user.syz\x00') bind$vsock_stream(r3, &(0x7f00000001c0)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) socket$l2tp(0x18, 0x1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), &(0x7f0000107000)=""/78}, 0x18) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000080)='ns/pid_for_children\x00'}, 0x30) getpid() r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = syz_open_procfs$namespace(r5, &(0x7f0000000280)='ns/\a\x00\x00\x00\x00') setns(r6, 0x0) [ 803.333864] IPVS: Unknown mcast interface: syzkaller1 13:02:26 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000180)={@loopback}, &(0x7f0000000700)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f41000000055fedb74f7e670"], 0x13) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x7ff) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x40, 0x2) read(r2, &(0x7f00000000c0)=""/11, 0xb) [ 803.398698] FAULT_INJECTION: forcing a failure. [ 803.398698] name failslab, interval 1, probability 0, space 0, times 0 [ 803.427462] CPU: 0 PID: 31741 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 803.434844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.444193] Call Trace: [ 803.446787] dump_stack+0x244/0x39d [ 803.450422] ? dump_stack_print_info.cold.1+0x20/0x20 [ 803.455631] should_fail.cold.4+0xa/0x17 [ 803.459707] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 803.464818] ? __save_stack_trace+0x8d/0xf0 [ 803.469161] ? save_stack+0xa9/0xd0 [ 803.472791] ? save_stack+0x43/0xd0 [ 803.476426] ? find_held_lock+0x36/0x1c0 [ 803.480508] ? perf_trace_sched_process_exec+0x860/0x860 [ 803.485980] ? check_preemption_disabled+0x48/0x280 [ 803.491010] __should_failslab+0x124/0x180 [ 803.495248] should_failslab+0x9/0x14 [ 803.499067] kmem_cache_alloc_node_trace+0x270/0x740 [ 803.504194] __kmalloc_node_track_caller+0x3c/0x70 [ 803.509137] __kmalloc_reserve.isra.40+0x41/0xe0 [ 803.513906] __alloc_skb+0x155/0x770 [ 803.517168] IPVS: Unknown mcast interface: syzkaller1 [ 803.517619] ? netdev_alloc_frag+0x1f0/0x1f0 [ 803.517635] ? perf_trace_sched_process_exec+0x860/0x860 [ 803.517647] ? lock_downgrade+0x900/0x900 [ 803.517665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.542435] ? aa_label_sk_perm+0x91/0x100 [ 803.546686] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 803.551710] ? aa_sk_perm+0x22b/0x8e0 [ 803.555518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 803.561073] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 803.566624] netlink_sendmsg+0xb29/0xfc0 [ 803.570703] ? netlink_unicast+0x760/0x760 [ 803.574938] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 803.574956] ? apparmor_socket_sendmsg+0x29/0x30 [ 803.574972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 803.574988] ? security_socket_sendmsg+0x94/0xc0 [ 803.575001] ? netlink_unicast+0x760/0x760 13:02:26 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, 0x0, &(0x7f0000000380)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001900)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000006c0)=0x1) 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\a\x00'}, 0x18) 13:02:26 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000040)={0x2000000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300090c000000000000002f6d0000020013000200000000b000000000000000030006000000000002000000e0000001000000000000000002000100000000000000000200000000030005000000000002080000e00000010000000000000000"], 0x60}}, 0x0) r2 = getpgrp(0x0) kcmp(r2, r2, 0x2, r0, r1) ptrace(0x4208, r2) 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000200"}, 0x18) [ 803.575018] sock_sendmsg+0xd5/0x120 [ 803.584669] ___sys_sendmsg+0x51d/0x930 [ 803.584685] ? zap_class+0x640/0x640 [ 803.584705] ? copy_msghdr_from_user+0x580/0x580 [ 803.584742] ? get_pid_task+0xd6/0x1a0 [ 803.584760] ? find_held_lock+0x36/0x1c0 [ 803.584782] ? __might_fault+0x12b/0x1e0 [ 803.599264] ? lock_downgrade+0x900/0x900 [ 803.599296] ? perf_trace_sched_process_exec+0x860/0x860 [ 803.599323] __sys_sendmmsg+0x246/0x6d0 [ 803.599345] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 803.599361] ? __lock_is_held+0xb5/0x140 13:02:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00`\x00'}, 0x18) 13:02:26 executing program 3 (fault-call:4 fault-nth:96): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 803.607029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 803.607048] ? check_preemption_disabled+0x48/0x280 [ 803.607077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 803.607093] ? fput+0x130/0x1a0 [ 803.607109] ? do_syscall_64+0x9a/0x820 [ 803.607123] ? do_syscall_64+0x9a/0x820 [ 803.607137] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 803.607154] ? trace_hardirqs_on+0xbd/0x310 [ 803.615587] ? __ia32_sys_read+0xb0/0xb0 [ 803.615605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:02:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 803.615624] ? trace_hardirqs_off_caller+0x310/0x310 [ 803.615647] __x64_sys_sendmmsg+0x9d/0x100 [ 803.615666] do_syscall_64+0x1b9/0x820 [ 803.615682] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 803.623716] IPVS: Unknown mcast interface: syzkaller1 [ 803.627664] ? syscall_return_slowpath+0x5e0/0x5e0 [ 803.627680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 803.627698] ? trace_hardirqs_on_caller+0x310/0x310 [ 803.627715] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 803.627732] ? prepare_exit_to_usermode+0x291/0x3b0 [ 803.627752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 803.627773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.627788] RIP: 0033:0x457569 [ 803.637352] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 803.637360] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 803.637375] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 803.637384] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 13:02:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x2}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000000), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') lseek(r3, 0x1c, 0x1) close(r2) preadv(r0, &(0x7f0000000080), 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000040)={0x33, @multicast2, 0x4e24, 0x4, 'ovf\x00', 0x1, 0x40, 0x54}, 0x2c) 13:02:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x68, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000180)=""/104}, &(0x7f0000000080)=0x78) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 803.637393] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 803.637402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 803.637411] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 803.702629] IPVS: Unknown mcast interface: syzkaller1 [ 803.761217] FAULT_INJECTION: forcing a failure. [ 803.761217] name failslab, interval 1, probability 0, space 0, times 0 [ 803.857269] CPU: 1 PID: 31770 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 803.864770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.874141] Call Trace: [ 803.876732] dump_stack+0x244/0x39d [ 803.880349] ? dump_stack_print_info.cold.1+0x20/0x20 [ 803.885552] should_fail.cold.4+0xa/0x17 [ 803.889605] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 803.894700] ? do_syscall_64+0x1b9/0x820 [ 803.898747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.904097] ? trace_hardirqs_off+0xb8/0x310 [ 803.908494] ? kasan_check_read+0x11/0x20 [ 803.912646] ? mark_held_locks+0x130/0x130 [ 803.916863] ? trace_hardirqs_off+0xb8/0x310 [ 803.921288] ? find_held_lock+0x36/0x1c0 [ 803.925359] ? rcu_read_lock_sched_held+0x14f/0x180 [ 803.930363] ? perf_trace_sched_process_exec+0x860/0x860 [ 803.935807] __should_failslab+0x124/0x180 [ 803.940035] should_failslab+0x9/0x14 [ 803.943823] kmem_cache_alloc_node+0x26e/0x730 [ 803.948399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 803.953927] ? refcount_sub_and_test_checked+0x203/0x310 [ 803.959374] __alloc_skb+0x119/0x770 [ 803.963079] ? netdev_alloc_frag+0x1f0/0x1f0 [ 803.967474] ? perf_trace_sched_process_exec+0x860/0x860 [ 803.972909] ? lock_downgrade+0x900/0x900 [ 803.977054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.982581] ? aa_label_sk_perm+0x91/0x100 [ 803.986812] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 803.991741] ? aa_sk_perm+0x22b/0x8e0 [ 803.995537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.001064] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 804.006591] netlink_sendmsg+0xb29/0xfc0 [ 804.010642] ? netlink_unicast+0x760/0x760 [ 804.014872] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 804.019808] ? apparmor_socket_sendmsg+0x29/0x30 [ 804.024552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.030078] ? security_socket_sendmsg+0x94/0xc0 [ 804.034818] ? netlink_unicast+0x760/0x760 [ 804.039048] sock_sendmsg+0xd5/0x120 [ 804.042755] ___sys_sendmsg+0x51d/0x930 [ 804.046716] ? zap_class+0x640/0x640 [ 804.050426] ? copy_msghdr_from_user+0x580/0x580 [ 804.055176] ? get_pid_task+0xd6/0x1a0 [ 804.059064] ? find_held_lock+0x36/0x1c0 [ 804.063137] ? __might_fault+0x12b/0x1e0 [ 804.067187] ? lock_downgrade+0x900/0x900 [ 804.071334] ? perf_trace_sched_process_exec+0x860/0x860 [ 804.076787] __sys_sendmmsg+0x246/0x6d0 [ 804.080766] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 804.085078] ? __lock_is_held+0xb5/0x140 [ 804.089129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.094654] ? check_preemption_disabled+0x48/0x280 [ 804.099664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 804.105192] ? fput+0x130/0x1a0 [ 804.108460] ? do_syscall_64+0x9a/0x820 [ 804.112422] ? do_syscall_64+0x9a/0x820 [ 804.116384] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 804.120959] ? trace_hardirqs_on+0xbd/0x310 [ 804.125268] ? __ia32_sys_read+0xb0/0xb0 [ 804.129315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.134659] ? trace_hardirqs_off_caller+0x310/0x310 [ 804.139754] __x64_sys_sendmmsg+0x9d/0x100 [ 804.143978] do_syscall_64+0x1b9/0x820 [ 804.147850] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 804.153196] ? syscall_return_slowpath+0x5e0/0x5e0 [ 804.158105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 804.162930] ? trace_hardirqs_on_caller+0x310/0x310 [ 804.167933] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 804.172939] ? prepare_exit_to_usermode+0x291/0x3b0 [ 804.177944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 804.182777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.187948] RIP: 0033:0x457569 [ 804.191127] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 804.210097] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 804.217786] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 804.225041] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 804.232297] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 804.239554] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 804.246804] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100)={0x7ff, 0x10000, 0x3, 0x3}, 0x8) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x600002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000040)="fa", 0x0) getsockopt$inet6_udp_int(r4, 0x11, 0x6f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) readlinkat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/216, 0xd8) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000061af83132f7f67670babce821e8a1550b40882a6a5b6aa011250"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) 13:02:27 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, 0x0, &(0x7f0000000380)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001900)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000006c0)=0x1) [ 804.342733] IPVS: Unknown mcast interface: syzkaller1 13:02:27 executing program 3 (fault-call:4 fault-nth:97): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x71d) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000100)={0x9}) r3 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0x3, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@loopback}, &(0x7f0000000700)=0x64) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r5, &(0x7f00000000c0)=""/11, 0xb) getsockopt(r1, 0x4, 0x0, &(0x7f0000000140)=""/52, &(0x7f0000000180)=0x34) ioctl$LOOP_SET_FD(r3, 0x4c00, r1) 13:02:27 executing program 2: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000000c0)={0x1, 0x1, 0x0, &(0x7f0000000380)=""/181, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001900)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000006c0)=0x1) 13:02:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000600"}, 0x18) 13:02:27 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x0) r1 = dup2(0xffffffffffffff9c, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00001a7000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000b89000/0x3000)=nil) r2 = syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0x0, 0x84000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x800c0, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc04000, 0x4000000000000008) r4 = msgget$private(0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) getgroups(0x9, &(0x7f0000000400)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01]) select(0x40, &(0x7f00000006c0)={0x6, 0x6, 0xe4, 0x80000001, 0x1f, 0x2, 0x7, 0x9}, &(0x7f0000000700)={0x3, 0x6, 0x100, 0x3f, 0x0, 0x4, 0x0, 0x2}, &(0x7f0000000740)={0x6ea, 0x84, 0x4, 0x80000000, 0x0, 0x2, 0x80000000, 0x5}, &(0x7f0000000780)) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, r2, 0x0, 0x4, &(0x7f00000005c0)="245ec400"}, 0x30) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000640)={{0x200, r5, r6, r7, r8, 0x18, 0x4}, 0x100, 0x5, 0x1, 0x1f, 0x8, 0x40, r9, r10}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r11 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000180)={{0x2, 0x1, 0x5, 0x10, 'syz0\x00', 0x8}, 0x1, 0x63, 0x2, r11, 0x6, 0x7, 'syz0\x00', &(0x7f0000000100)=['/dev/ppp\x00', 'procwlan1\\%trustedeth1\x00', 'wlan1mime_typebdev\x00', '/dev/audio#\x00', '\x00', 'nodev#selinux$!\'\x00'], 0x51, [], [0x4, 0x3, 0x100000000, 0x8]}) 13:02:27 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8040, 0x161) tee(r0, r0, 0xe61, 0x4) fgetxattr(r0, &(0x7f0000000040)=@random={'btrfs.', 'nodev{@(&nodev)vmnet1*ppp0\x00'}, &(0x7f0000000080)=""/163, 0xa3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0xfffffffffffffffb, @ipv4={[], [], @loopback}, 0x5}, 0x1c) write$P9_RXATTRWALK(r1, &(0x7f00000001c0)={0xf, 0x1f, 0x1, 0x1}, 0xf) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000200)={0x50000004}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6b0, 0x210, 0x210, 0x370, 0x370, 0x488, 0x5e0, 0x5e0, 0x5e0, 0x5e0, 0x5e0, 0x6, &(0x7f0000000240), {[{{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x401, 0x800, 0x4, 0x28}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0xfffffffffffffff7, 0x681}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv4=@multicast1, 0x2e, 0x3e, 0xb0}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x7}}}, {{@uncond, 0x0, 0x118, 0x158, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x2, 0x7fff, @ipv4=@broadcast, 0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x710) r3 = add_key$user(&(0x7f0000000a00)='user\x00', &(0x7f0000000a40)={'syz', 0x3}, &(0x7f0000000a80)="af4381a37e7c772f865416211ae3a8aa92caa96770b8ce88747b8bcdeb02ecd7dc09448e4cd295a27e58e96f8df592de02a60747b4b90235a2f9cb2be1dc0c787fae3f4ade262c00821d5bd9857c63e55bebf3da4a9a3ac3249345c90989660bd53cce9d82de1f40509a2bf0778d03", 0x6f, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000b40)='keyring\x00', &(0x7f0000000b80)={'syz', 0x2}, &(0x7f0000000bc0)='TPROXY\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000b00)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', 'vmnet1selinuxcgroup'}, 0x2c, r4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000c00)={'ah\x00'}, &(0x7f0000000c40)=0x1e) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/null\x00', 0x101000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000cc0)='trusted-selinuxem1\\+^$\x00') lgetxattr(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)=@known='trusted.overlay.opaque\x00', &(0x7f0000000d80)=""/49, 0x31) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x8010, r2, 0x0) getsockname$packet(r5, &(0x7f0000000dc0)={0x11, 0x0, 0x0}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000e40)={'team0\x00', r6}) socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000e80)={0x0, 0x5, [], @bt={0xfffffffffffffffc, 0x3, 0x4, 0x3, 0x4, 0x8, 0x11, 0x8}}) accept4$inet6(r2, &(0x7f0000000f40)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000f80)=0x1c, 0x80000) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000fc0)=0x8) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000001000)) ioctl$int_in(r1, 0x0, &(0x7f0000001040)=0x4) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000001080)={0x8001, 0x1}) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000010c0)={0x2, 0xf9, 0x40, 0x100000001}) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000001100), &(0x7f0000001140)=0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000001180)={'ip6gretap0\x00', {0x2, 0x4e23, @local}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000011c0)={0x0, 0x7892, 0xaa3, 0x5d3b49c2, 0x7ff, 0x9}, &(0x7f0000001200)=0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000001240)={r7, 0x10000, 0x3, 0x7c62c0da}, &(0x7f0000001280)=0x10) [ 804.548583] FAULT_INJECTION: forcing a failure. [ 804.548583] name failslab, interval 1, probability 0, space 0, times 0 [ 804.586337] CPU: 1 PID: 31820 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 13:02:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x2005, 0x400180) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000200)) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000001c0)=0x80000000) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000280)=0x9, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaa04ffffffffffff0800450000700000000000019078ac2314bbac1414110c0490000000000000010000ac2314aaac1414000840000f51e37015593ac77056ee0bc20edb6ebd52000000000000000000e000009d31afcab60ca43a2f006292e7c144f8020c070000e000000100000000000000007f000001ffff00000000e000e5ccd9385454150efd0a71beb373222f480f0e9c5b88dace3b4dc1886126672347c3f252a644e4dfe7166f00d1626045a156db36a10f0447ed4ea51c3119cf07ccedda8c220ad61b0cfe2a4ea849ef8ccca48adbf3a0752b2dd1a43357ff6a4314f799fce39814474b054a3f65f25ee7f705321eef51284d39a53e48f328"], &(0x7f0000000000)={0x0, 0x0, [0x795]}) [ 804.593738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.603088] Call Trace: [ 804.605704] dump_stack+0x244/0x39d [ 804.609350] ? dump_stack_print_info.cold.1+0x20/0x20 [ 804.614569] should_fail.cold.4+0xa/0x17 [ 804.618642] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 804.623749] ? __save_stack_trace+0x8d/0xf0 [ 804.628085] ? save_stack+0xa9/0xd0 [ 804.628435] IPVS: Unknown mcast interface: syzkaller1 [ 804.631712] ? save_stack+0x43/0xd0 [ 804.640509] ? find_held_lock+0x36/0x1c0 13:02:27 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1000082) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) r1 = memfd_create(&(0x7f0000000440)='-^user\')\x00', 0x0) pwritev(r0, &(0x7f0000000300), 0x0, 0x1081806) fcntl$addseals(r1, 0x409, 0x1) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000340)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) tee(r1, r0, 0x40, 0x0) syz_open_dev$loop(&(0x7f0000000d00)='/dev/loop#\x00', 0x417f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000002c0)) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x7, 0x68, 0x1, 0x3, 0x9, "900b21888b6cc77b101984261cafca360e11b6c7a13a0830cd29f419884847da90828288bebec9a65da1ba9bb02d8c9871511b6bee7194cfae74d7d4b41a5ee5", "627783b5afe9993d902ce10af431125ebedc76b0659a9cd7b79108b9097ed60e22e9cf55034bdf1fb1f0a15a01f32f2598064591156404681de46104820d931c", "8c5c4741e6ea115c84fc7f3b969deded47d3d964d140481071e204315cce1f9f", [0x0, 0x4]}) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x1, 0x200003) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000800)=""/111, 0x6f}, {&(0x7f0000000880)=""/213, 0xd5}, {&(0x7f00000001c0)=""/44, 0x2c}, {&(0x7f0000000980)=""/143, 0x8f}, {&(0x7f0000000a40)=""/233, 0xe9}, {&(0x7f0000000b40)=""/91, 0x5b}], 0x6, &(0x7f0000000380), 0x0, 0x7}, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x10880, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) syz_extract_tcp_res(&(0x7f0000000380), 0x6, 0x0) [ 804.644603] ? perf_trace_sched_process_exec+0x860/0x860 [ 804.650068] ? check_preemption_disabled+0x48/0x280 [ 804.655095] __should_failslab+0x124/0x180 [ 804.659446] should_failslab+0x9/0x14 [ 804.663278] kmem_cache_alloc_node_trace+0x270/0x740 [ 804.668401] __kmalloc_node_track_caller+0x3c/0x70 [ 804.673340] __kmalloc_reserve.isra.40+0x41/0xe0 [ 804.678100] __alloc_skb+0x155/0x770 [ 804.681818] ? netdev_alloc_frag+0x1f0/0x1f0 [ 804.686232] ? perf_trace_sched_process_exec+0x860/0x860 [ 804.691685] ? lock_downgrade+0x900/0x900 13:02:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt(r0, 0x2, 0x4, &(0x7f0000000080)="4426fc15eecfec9bc8f06e37e92a644d635986465cee9e6de29a088c13ab64ba264aebb3e5cb9845b1d2cbddb09a5d8940b3679dd07e13f598c5ebcf4733d8c3c9b9f4e09e9aef7bd17ebe505c977b7ca980d785f2b9f4ef3e28621ecbc7599b0759878d4149e77e07d15160dc90ac489c08ae22e0bb457767dce52964299656100a18", 0x83) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x3463a4bce5382311, 0x0) [ 804.695840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 804.701458] ? aa_label_sk_perm+0x91/0x100 [ 804.705696] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 804.710646] ? aa_sk_perm+0x22b/0x8e0 [ 804.714448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.719995] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 804.725537] netlink_sendmsg+0xb29/0xfc0 [ 804.729607] ? netlink_unicast+0x760/0x760 [ 804.733843] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 804.738779] ? apparmor_socket_sendmsg+0x29/0x30 [ 804.743539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:02:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="2e8e6d0d66b80500000066b9000000000f01d9f30f7f7b3dba4100ed0f20c06635000000200f22c066b9800000c00f326635000800000f300f3806e8f2afca09180f01ca", 0x44}], 0x1, 0x0, 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:02:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x3, {0xa, 0x4e24, 0x40, @ipv4={[], [], @multicast1}, 0x5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x5, 0x10000, 0x3, 0x0, 0x0, [{r0, 0x0, 0xfff}, {r0, 0x0, 0x7ff}, {r0, 0x0, 0xbb}]}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@setlink={0x50, 0x13, 0x311, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_IFALIAS={0x14, 0x28, 'veth0_to_team\x00'}, @IFLA_IFNAME={0x14, 0x3, 'team_slave_1\x00'}]}, 0x50}}, 0x0) [ 804.749078] ? security_socket_sendmsg+0x94/0xc0 [ 804.753850] ? netlink_unicast+0x760/0x760 [ 804.758089] sock_sendmsg+0xd5/0x120 [ 804.761806] ___sys_sendmsg+0x51d/0x930 [ 804.765790] ? zap_class+0x640/0x640 [ 804.769516] ? copy_msghdr_from_user+0x580/0x580 [ 804.774280] ? get_pid_task+0xd6/0x1a0 [ 804.778168] ? find_held_lock+0x36/0x1c0 [ 804.782233] ? __might_fault+0x12b/0x1e0 [ 804.786295] ? lock_downgrade+0x900/0x900 [ 804.790456] ? perf_trace_sched_process_exec+0x860/0x860 [ 804.795922] __sys_sendmmsg+0x246/0x6d0 [ 804.799889] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 804.804196] ? __lock_is_held+0xb5/0x140 [ 804.808243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 804.813766] ? check_preemption_disabled+0x48/0x280 [ 804.818774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 804.824297] ? fput+0x130/0x1a0 [ 804.827563] ? do_syscall_64+0x9a/0x820 [ 804.831611] ? do_syscall_64+0x9a/0x820 [ 804.835572] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 804.840139] ? trace_hardirqs_on+0xbd/0x310 [ 804.844443] ? __ia32_sys_read+0xb0/0xb0 [ 804.848492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.853837] ? trace_hardirqs_off_caller+0x310/0x310 [ 804.858926] __x64_sys_sendmmsg+0x9d/0x100 [ 804.863141] do_syscall_64+0x1b9/0x820 [ 804.867017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 804.872364] ? syscall_return_slowpath+0x5e0/0x5e0 [ 804.877280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 804.882128] ? trace_hardirqs_on_caller+0x310/0x310 [ 804.887127] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 804.892234] ? prepare_exit_to_usermode+0x291/0x3b0 [ 804.897237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 804.902066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 804.907249] RIP: 0033:0x457569 [ 804.910427] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 804.929317] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 804.937008] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 13:02:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231007fffffff00"}, 0x18) [ 804.944275] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 804.951530] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 804.958786] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 804.966037] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 [ 804.995595] validate_nla: 14 callbacks suppressed [ 804.995602] netlink: 'syz-executor0': attribute type 40 has an invalid length. [ 805.034193] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. 13:02:28 executing program 3 (fault-call:4 fault-nth:98): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46007400f408000a000200000007007e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 805.075315] IPVS: Unknown mcast interface: syzkaller1 [ 805.106624] netlink: 'syz-executor0': attribute type 40 has an invalid length. [ 805.131590] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. 13:02:28 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x0) r1 = dup2(0xffffffffffffff9c, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00001a7000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000b89000/0x3000)=nil) r2 = syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0x0, 0x84000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x800c0, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc04000, 0x4000000000000008) r4 = msgget$private(0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) getgroups(0x9, &(0x7f0000000400)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01]) select(0x40, &(0x7f00000006c0)={0x6, 0x6, 0xe4, 0x80000001, 0x1f, 0x2, 0x7, 0x9}, &(0x7f0000000700)={0x3, 0x6, 0x100, 0x3f, 0x0, 0x4, 0x0, 0x2}, &(0x7f0000000740)={0x6ea, 0x84, 0x4, 0x80000000, 0x0, 0x2, 0x80000000, 0x5}, &(0x7f0000000780)) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, r2, 0x0, 0x4, &(0x7f00000005c0)="245ec400"}, 0x30) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000640)={{0x200, r5, r6, r7, r8, 0x18, 0x4}, 0x100, 0x5, 0x1, 0x1f, 0x8, 0x40, r9, r10}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r11 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000180)={{0x2, 0x1, 0x5, 0x10, 'syz0\x00', 0x8}, 0x1, 0x63, 0x2, r11, 0x6, 0x7, 'syz0\x00', &(0x7f0000000100)=['/dev/ppp\x00', 'procwlan1\\%trustedeth1\x00', 'wlan1mime_typebdev\x00', '/dev/audio#\x00', '\x00', 'nodev#selinux$!\'\x00'], 0x51, [], [0x4, 0x3, 0x100000000, 0x8]}) 13:02:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000300"}, 0x18) 13:02:28 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x6, 0x0) r1 = dup2(0xffffffffffffff9c, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00001a7000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000b89000/0x3000)=nil) r2 = syz_open_dev$audion(&(0x7f00000007c0)='/dev/audio#\x00', 0x0, 0x84000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x800c0, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc04000, 0x4000000000000008) r4 = msgget$private(0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) getgroups(0x9, &(0x7f0000000400)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01]) select(0x40, &(0x7f00000006c0)={0x6, 0x6, 0xe4, 0x80000001, 0x1f, 0x2, 0x7, 0x9}, &(0x7f0000000700)={0x3, 0x6, 0x100, 0x3f, 0x0, 0x4, 0x0, 0x2}, &(0x7f0000000740)={0x6ea, 0x84, 0x4, 0x80000000, 0x0, 0x2, 0x80000000, 0x5}, &(0x7f0000000780)) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, r2, 0x0, 0x4, &(0x7f00000005c0)="245ec400"}, 0x30) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000640)={{0x200, r5, r6, r7, r8, 0x18, 0x4}, 0x100, 0x5, 0x1, 0x1f, 0x8, 0x40, r9, r10}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r11 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000180)={{0x2, 0x1, 0x5, 0x10, 'syz0\x00', 0x8}, 0x1, 0x63, 0x2, r11, 0x6, 0x7, 'syz0\x00', &(0x7f0000000100)=['/dev/ppp\x00', 'procwlan1\\%trustedeth1\x00', 'wlan1mime_typebdev\x00', '/dev/audio#\x00', '\x00', 'nodev#selinux$!\'\x00'], 0x51, [], [0x4, 0x3, 0x100000000, 0x8]}) [ 805.206804] FAULT_INJECTION: forcing a failure. [ 805.206804] name failslab, interval 1, probability 0, space 0, times 0 [ 805.268043] IPVS: Unknown mcast interface: syzkaller1 [ 805.279302] CPU: 1 PID: 31864 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 805.286669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.296016] Call Trace: [ 805.298610] dump_stack+0x244/0x39d [ 805.302239] ? dump_stack_print_info.cold.1+0x20/0x20 [ 805.307446] should_fail.cold.4+0xa/0x17 [ 805.311528] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 805.316643] ? do_syscall_64+0x1b9/0x820 [ 805.320699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.326058] ? trace_hardirqs_off+0xb8/0x310 [ 805.330484] ? kasan_check_read+0x11/0x20 [ 805.334644] ? mark_held_locks+0x130/0x130 [ 805.338876] ? trace_hardirqs_off+0xb8/0x310 [ 805.343319] ? find_held_lock+0x36/0x1c0 [ 805.347391] ? context_struct_compute_av+0x1508/0x1600 [ 805.352689] ? rcu_read_lock_sched_held+0x14f/0x180 [ 805.357706] ? perf_trace_sched_process_exec+0x860/0x860 [ 805.363167] __should_failslab+0x124/0x180 [ 805.367406] should_failslab+0x9/0x14 [ 805.371216] kmem_cache_alloc_node+0x26e/0x730 [ 805.375800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.381338] ? refcount_sub_and_test_checked+0x203/0x310 [ 805.386795] __alloc_skb+0x119/0x770 [ 805.390513] ? netdev_alloc_frag+0x1f0/0x1f0 [ 805.394920] ? perf_trace_sched_process_exec+0x860/0x860 [ 805.400379] ? lock_downgrade+0x900/0x900 [ 805.404532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.410062] ? aa_label_sk_perm+0x91/0x100 [ 805.414299] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 805.419224] ? aa_sk_perm+0x22b/0x8e0 [ 805.423017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.428547] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 805.434081] netlink_sendmsg+0xb29/0xfc0 [ 805.438143] ? netlink_unicast+0x760/0x760 [ 805.442375] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 805.447321] ? apparmor_socket_sendmsg+0x29/0x30 [ 805.452078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.457624] ? security_socket_sendmsg+0x94/0xc0 [ 805.462381] ? netlink_unicast+0x760/0x760 [ 805.466619] sock_sendmsg+0xd5/0x120 [ 805.470331] ___sys_sendmsg+0x51d/0x930 [ 805.474304] ? zap_class+0x640/0x640 [ 805.478022] ? copy_msghdr_from_user+0x580/0x580 [ 805.482781] ? get_pid_task+0xd6/0x1a0 [ 805.486669] ? find_held_lock+0x36/0x1c0 [ 805.490733] ? __might_fault+0x12b/0x1e0 [ 805.494791] ? lock_downgrade+0x900/0x900 [ 805.498956] ? perf_trace_sched_process_exec+0x860/0x860 [ 805.504425] __sys_sendmmsg+0x246/0x6d0 [ 805.508411] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 805.512826] ? __lock_is_held+0xb5/0x140 13:02:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x100080000000006) ioctl(r0, 0x0, &(0x7f0000000040)="0a5c2d023c126285718070") r1 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) ioctl$NBD_DO_IT(r1, 0xab03) syz_emit_ethernet(0x32, &(0x7f00000000c0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x33, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) [ 805.516888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 805.522428] ? check_preemption_disabled+0x48/0x280 [ 805.527455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 805.532994] ? fput+0x130/0x1a0 [ 805.533010] ? do_syscall_64+0x9a/0x820 [ 805.533021] ? do_syscall_64+0x9a/0x820 [ 805.533035] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 805.540254] ? trace_hardirqs_on+0xbd/0x310 [ 805.540268] ? __ia32_sys_read+0xb0/0xb0 [ 805.540283] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.540299] ? trace_hardirqs_off_caller+0x310/0x310 13:02:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000300"}, 0x18) [ 805.567609] __x64_sys_sendmmsg+0x9d/0x100 [ 805.571858] do_syscall_64+0x1b9/0x820 [ 805.575737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.581089] ? syscall_return_slowpath+0x5e0/0x5e0 [ 805.581101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 805.581116] ? trace_hardirqs_on_caller+0x310/0x310 [ 805.581131] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 805.581144] ? prepare_exit_to_usermode+0x291/0x3b0 [ 805.581160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 805.602115] IPVS: Unknown mcast interface: syzkaller1 13:02:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0xffffffffff, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x202c2, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x0, @dev}], 0x7) [ 805.605907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.605919] RIP: 0033:0x457569 [ 805.605937] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 805.605960] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 805.642056] IPVS: Unknown mcast interface: syzkaller1 [ 805.643204] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 805.643213] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 805.643221] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 805.643230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 805.643238] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(0xffffffffffffffff, &(0x7f0000000040)=""/1, 0x1) ioctl$KDSETMODE(r0, 0x4b3a, 0x9) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') close(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 13:02:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syzkaller0\x00', 0x10) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x5) ioctl$FS_IOC_FSGETXATTR(r2, 0x8004550f, &(0x7f0000000100)) ioctl$PPPIOCGCHAN(r2, 0x5421, &(0x7f00000000c0)) unshare(0x600) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) [ 805.772574] IPVS: Unknown mcast interface: syzkaller1 13:02:29 executing program 3 (fault-call:4 fault-nth:99): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 805.854110] FAULT_INJECTION: forcing a failure. [ 805.854110] name failslab, interval 1, probability 0, space 0, times 0 [ 805.872632] CPU: 1 PID: 31907 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #362 [ 805.880001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.889343] Call Trace: [ 805.889368] dump_stack+0x244/0x39d [ 805.889389] ? dump_stack_print_info.cold.1+0x20/0x20 [ 805.889424] should_fail.cold.4+0xa/0x17 [ 805.900762] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 805.909882] ? __save_stack_trace+0x8d/0xf0 [ 805.914223] ? save_stack+0xa9/0xd0 [ 805.917858] ? save_stack+0x43/0xd0 [ 805.921493] ? find_held_lock+0x36/0x1c0 [ 805.925574] ? perf_trace_sched_process_exec+0x860/0x860 [ 805.931024] ? check_preemption_disabled+0x48/0x280 [ 805.936025] __should_failslab+0x124/0x180 [ 805.940246] should_failslab+0x9/0x14 [ 805.944028] kmem_cache_alloc_node_trace+0x270/0x740 [ 805.949119] __kmalloc_node_track_caller+0x3c/0x70 [ 805.954049] __kmalloc_reserve.isra.40+0x41/0xe0 [ 805.958807] __alloc_skb+0x155/0x770 [ 805.962521] ? netdev_alloc_frag+0x1f0/0x1f0 [ 805.966915] ? perf_trace_sched_process_exec+0x860/0x860 [ 805.972350] ? lock_downgrade+0x900/0x900 [ 805.976485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.982007] ? aa_label_sk_perm+0x91/0x100 [ 805.986231] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 805.991138] ? aa_sk_perm+0x22b/0x8e0 [ 805.994926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.000447] ? security_socket_getpeersec_dgram+0x97/0xc0 [ 806.005970] netlink_sendmsg+0xb29/0xfc0 [ 806.010018] ? netlink_unicast+0x760/0x760 [ 806.014236] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 806.019150] ? apparmor_socket_sendmsg+0x29/0x30 [ 806.023883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.029409] ? security_socket_sendmsg+0x94/0xc0 [ 806.034146] ? netlink_unicast+0x760/0x760 [ 806.038365] sock_sendmsg+0xd5/0x120 [ 806.042071] ___sys_sendmsg+0x51d/0x930 [ 806.046028] ? zap_class+0x640/0x640 [ 806.049725] ? copy_msghdr_from_user+0x580/0x580 [ 806.054463] ? get_pid_task+0xd6/0x1a0 [ 806.058338] ? find_held_lock+0x36/0x1c0 [ 806.062390] ? __might_fault+0x12b/0x1e0 [ 806.066432] ? lock_downgrade+0x900/0x900 [ 806.070571] ? perf_trace_sched_process_exec+0x860/0x860 [ 806.076251] __sys_sendmmsg+0x246/0x6d0 [ 806.080221] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 806.084526] ? __lock_is_held+0xb5/0x140 [ 806.088578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 806.094099] ? check_preemption_disabled+0x48/0x280 [ 806.099121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 806.104655] ? fput+0x130/0x1a0 [ 806.107919] ? do_syscall_64+0x9a/0x820 [ 806.111881] ? do_syscall_64+0x9a/0x820 [ 806.115844] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 806.120412] ? trace_hardirqs_on+0xbd/0x310 [ 806.124713] ? __ia32_sys_read+0xb0/0xb0 [ 806.128767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.134109] ? trace_hardirqs_off_caller+0x310/0x310 [ 806.139200] __x64_sys_sendmmsg+0x9d/0x100 [ 806.143419] do_syscall_64+0x1b9/0x820 [ 806.147287] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.152632] ? syscall_return_slowpath+0x5e0/0x5e0 [ 806.157545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 806.162373] ? trace_hardirqs_on_caller+0x310/0x310 [ 806.167394] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 806.172405] ? prepare_exit_to_usermode+0x291/0x3b0 [ 806.177406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 806.182244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.187416] RIP: 0033:0x457569 [ 806.190594] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.209478] RSP: 002b:00007f6cb5b28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 806.217169] RAX: ffffffffffffffda RBX: 00007f6cb5b28c90 RCX: 0000000000457569 [ 806.224426] RDX: 0492492492492805 RSI: 0000000020000140 RDI: 0000000000000005 [ 806.231697] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 806.238951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6cb5b296d4 [ 806.246678] R13: 00000000004c3c3c R14: 00000000004d6260 R15: 0000000000000006 13:02:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000240)=""/135, &(0x7f0000000080)=0x87) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000100)="ec4f60f1e0c5d0d6c3c6ec41d438b3a21d883623f9ba3c37bd3d9cec60fe3dc6d246b21b3399cc2aff8c7451785cbbfe277b38e469ababa32539939f5516df3fffda57dd497081cd267a086198e7d565281635dc7183c27586e0bfdfc9bb04781438d639595c1bc40b48a8733cec5d7ab2f0d72197c27947240327cb6d306c2963fb") 13:02:29 executing program 1: r0 = memfd_create(&(0x7f00000000c0)="29d900", 0x2) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$addseals(r0, 0x409, 0xd) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) pkey_alloc(0x0, 0x0) pipe2(&(0x7f0000000200), 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)="d168c82bb244fc22af9c84a29f216b5abe5dad82ad5a7d7ce13c5131193f0fea2c4ec6850d35391fd58618dbbf29f67ef79a4faccaff6a1abf7495492cd671051149629ec09fa9cb7840672b4bb6c0c50629fcb6763ce42120f34a0b8ec352fcbdb2d329818ee4") mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x1e, 0x11011, r0, 0xfffffffffffffffc) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000240), 0x0) clone(0x0, &(0x7f0000b6b000), &(0x7f0000000000), &(0x7f0000fef000), &(0x7f00000001c0)) clone(0x0, &(0x7f0000000000), &(0x7f0000008000), &(0x7f0000000ffc), &(0x7f0000000000)) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000300)=0x4) 13:02:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x7fff, &(0x7f0000000000)="0a5c2d024021ae817170f0db5aaf1cb299b6c13607e456fb469b943fa08687580b87c57a458aaae527b88badb288eb2476ad4e28aad40872abc51424505166e358a338c9427a77081c32d67f21716031a73aac88d3290600a5eb06faf4d7836c96fe3561b9ebf697") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c18000029000100000000000000000001000000180000001408000002000017000000000000ffffac1414bb720fecef2dfd6c336f1ccd573fe0aa32844c24ef45885d53e6a7fac9a0d22393efbf102936f874a1d57a4aa7077b6ddf98195f8f9db2465fd275fe07857d352550b40807078a0a637e20fefdda62a34e816b57c7fea9e918db795b1bf5b6e26b9d123e323e8a983ebebdaf8fe06973d535697b697638061e912fdc6b0cec63404072c49fe2598103ad16b00d538510fc88ea2d816a653a87ee4ee45d3955a51bd3c66e8b370cae6040f2d7"], 0x2c}}, 0x0) 13:02:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syzkaller0\x00', 0x10) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x5) ioctl$FS_IOC_FSGETXATTR(r2, 0x8004550f, &(0x7f0000000100)) ioctl$PPPIOCGCHAN(r2, 0x5421, &(0x7f00000000c0)) unshare(0x600) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) [ 806.302220] IPVS: Unknown mcast interface: syzkaller1 13:02:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c27000000f41000000002000000da64a6427c8d639de64bc2beda786738e5eb69ee4a518cbc1f1289488d"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) r4 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000140)={r1, r0, 0x1}) 13:02:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x182, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xb8, 0x3, 0xffffffff84f0b5ac, 0x9f, 0x8001, 0x1000, "1842cce185d187148910f65d2ae0ace69158c4252f9ef4a4d82b876be88ba097cbd4bd43492da327bade6c6c52b54917d799e1854b105bf0c530987bb2698134103dae429c9765b33358a764c274b1bac7f166708aee8d01085b255c3fc921c476b6e6c711ff67e7a2d7e99a4dea538e8c63941553e2a7ce41a61e35c8375cc8521b12366ab4ebbd6e19435205e2d1b2797d1399589ec13e09bff7b35bb5b37b5e23dbdf37c5b12c4e842bfbe387dd1152d9e1fc33b19f35"}, 0x1d0) setsockopt$inet6_group_source_req(r0, 0x29, 0x31, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:02:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000400"}, 0x18) 13:02:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x96, 0x3, 0x3, 0x1, 0x729, 0x7, 0x7}, &(0x7f00000000c0)=0x20) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r2, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000014003865bc9ee3870700000000000000165d41ecc1d0fe9b279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f4236050000001573"], 0x48}}, 0x0) 13:02:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000180)={@loopback}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c460080000000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000080)) read(r3, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) ptrace$setopts(0x4200, r4, 0x8, 0x1) [ 806.489176] IPVS: Unknown mcast interface: syzkaller1 13:02:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@rc={0x1f, {0x0, 0x3, 0x3f, 0xa69b2c1, 0x100000000}, 0xe27}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="58206021f6bde993e138de455057008a9015b2f0885f455fd89357e4edafeaf4029aaae007186cf92f876dfa19ce81d4f370802932b6675699d420ae515e873069a84ab095e1045fe93ea08de3707ea11958eec3b2ed5eeea20db475101a", 0x5e}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1d0}, 0x80) r1 = socket$inet(0x10, 0x3, 0xc) getsockopt(r1, 0x200, 0xfffffffffffffff7, &(0x7f0000000400)=""/98, &(0x7f0000000480)=0x62) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000004061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 13:02:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000200"}, 0x18) [ 806.628531] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 806.675633] IPVS: Unknown mcast interface: syzkaller1 [ 806.688773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 13:02:30 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000700)='F', 0x1, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/182, 0xb6) keyctl$setperm(0x5, r0, 0x1010021) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='}.\x00'}, 0x30) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x10) socketpair(0x1, 0x0, 0x9, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000001c0)) ioprio_set$pid(0x1, r1, 0x2b) keyctl$describe(0x6, r0, 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f00000002c0)=""/115) 13:02:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:30 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={&(0x7f000002a000/0x1000)=nil, 0x5, 0x5, 0x40, &(0x7f0000042000/0x1000)=nil, 0xffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000002b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000026000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000001c0)="64650f01d10f21c13e0fc71ee4e564260533092e0f083e3636650f1811650f01cf0f20d86635200000000f22d80f0138baf80c66b8d0ffdb8566efbafc0c66b80900000066ef", 0x46}], 0x1, 0x0, &(0x7f0000000300)=[@cr4={0x1, 0x40220}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:02:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xfffffffffffff000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000100"}, 0x18) [ 806.721274] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 806.773540] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 806.799722] IPVS: Unknown mcast interface: syzkaller1 13:02:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@rc={0x1f, {0x0, 0x3, 0x3f, 0xa69b2c1, 0x100000000}, 0xe27}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="58206021f6bde993e138de455057008a9015b2f0885f455fd89357e4edafeaf4029aaae007186cf92f876dfa19ce81d4f370802932b6675699d420ae515e873069a84ab095e1045fe93ea08de3707ea11958eec3b2ed5eeea20db475101a", 0x5e}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1d0}, 0x80) r1 = socket$inet(0x10, 0x3, 0xc) getsockopt(r1, 0x200, 0xfffffffffffffff7, &(0x7f0000000400)=""/98, &(0x7f0000000480)=0x62) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000004061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 13:02:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000500"}, 0x18) 13:02:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600001af410966eda11530000000200"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x80, 0x80000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00001ec000)='\n', 0x1) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r3, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000079a000)="16", 0x1}]) r4 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x40, 0x10000) ioctl$VIDIOC_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f0000000180)) [ 806.922364] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 806.947053] IPVS: Unknown mcast interface: syzkaller1 [ 806.961463] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 13:02:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000200"}, 0x18) 13:02:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1_to_bond\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) lseek(r0, 0x0, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = dup2(r0, r0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f00000000c0)=0x6) listen(r1, 0x0) listen(r0, 0x0) 13:02:30 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@rand_addr=0xff, @in=@multicast1, 0x4e23, 0x6, 0x4e22, 0x8, 0xa, 0x80, 0x80, 0x2b, 0x0, r1}, {0x7fffffff, 0x4, 0x7, 0xffffffffffffface, 0x2, 0x8, 0xfffffffffffffff9, 0x2}, {0x100, 0x7, 0x2, 0x381}, 0x1000, 0x6e6bbd, 0x1, 0x1, 0x0, 0x3}, {{@in6=@remote, 0x4d2, 0x3c}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x0, 0x35857e5c, 0x2, 0x7853, 0x9}}, 0xe8) 13:02:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200080c4, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_DUMPABLE(0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 13:02:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xec0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 807.078912] IPVS: Unknown mcast interface: syzkaller1 13:02:30 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x4e22, 0x0, 0x4e21, 0x66d, 0xa, 0x80, 0x80, 0x29, r1, r2}, {0x1, 0x10001, 0x9, 0xb3, 0x7, 0xfffffffffffffff9, 0x2, 0x3ff}, {0x6, 0x4, 0x10001, 0x6}, 0x1, 0x6e6bb3, 0x3, 0x0, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x15}, 0x4d3, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x3502, 0x3, 0x3, 0x0, 0x7ff, 0xffffffff, 0x9}}, 0xe8) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) r7 = fcntl$getown(r3, 0x9) timer_create(0x7, &(0x7f00000000c0)={0x0, 0xc, 0x6, @tid=r7}, &(0x7f0000000140)) io_submit(r6, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r5, &(0x7f0000000140), 0x2000072e}]) 13:02:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgid(0xffffffffffffffff) r3 = dup(r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0x40004000, 0x81, 0x96, 0x0, 0x1, 0x9600, 0x2, 0x80000001, 0x3f96, 0xffffffffffffcb7d, 0x2, 0x8, 0x0, 0x8, 0x5, 0xe4f, 0x800, 0x7fff, 0x6, 0x6, 0xfffffffffffffa1b, 0x9, 0xffffffffffffff80, 0x0, 0x14, 0x101, 0x2, 0x0, 0x8, 0x4, 0x8, 0x2, 0x3ff, 0x6, 0x4, 0x0, 0x4, 0x4, @perf_config_ext={0xf29}, 0x1000, 0x600000, 0x2f054ba, 0xe, 0x9, 0x100000001, 0xffff}, r2, 0xb, r3, 0x8) r4 = socket(0x400000000010, 0x3, 0x0) ioctl$void(r0, 0x5451) write(r4, &(0x7f0000001dc0)="2400000019002551071c0165ff0ffc0202bc000013100f000ee1000c08000a0000001800bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) [ 807.183190] IPVS: Unknown mcast interface: syzkaller1 13:02:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000007c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0x0, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, &(0x7f0000000080)=0x100) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={r3, 0xfffffffffffffff7}, 0x8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r6, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x1, 0x0, 0x0, [], [], [], 0xb48, 0x100}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={r3, 0x10001}, 0x8) pipe(&(0x7f0000000140)) 13:02:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\x00`'}, 0x18) [ 807.292093] IPVS: Unknown mcast interface: syzkaller1 [ 807.431611] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x4, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x1ff, 0x53, 0x8, 0x4, 0x1, 0x0, 0x7, 0x6, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={r1, 0x1, 0x2, 0xff}, &(0x7f0000000280)=0x10) r3 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x10000, 0x7) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000340)={0x1, 0x7, 0xffffffffffff0001, 0x671}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0xfffffffffffffff9, 0x4, 0x9, 0x20, 0x0, 0x1, 0x2, 0x1, 0x81, 0x100000001, 0x6f42, 0x8, 0x1000, 0x7ff, 0x100000001, 0x100, 0x7f, 0x3ff, 0x4, 0x7f, 0x4, 0x1ff, 0x9, 0x1000, 0x1, 0x3, 0x6138, 0x7, 0xae98, 0x7fff, 0x20, 0x100000001, 0x10000, 0xe2c, 0x6, 0x22300db1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x40, 0xec46, 0x100000000, 0x7, 0x5, 0x4, 0x81}, r4, 0xa, 0xffffffffffffff9c, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={r2, 0x7ff}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x1000000000000000}) ioctl$int_in(r0, 0x5473, &(0x7f00000002c0)) 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:31 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000007c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0x0, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, &(0x7f0000000080)=0x100) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={r3, 0xfffffffffffffff7}, 0x8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r6, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x1, 0x0, 0x0, [], [], [], 0xb48, 0x100}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={r3, 0x10001}, 0x8) pipe(&(0x7f0000000140)) 13:02:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102005fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 807.796363] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000007c0)=""/255) r2 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0x0, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r2, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, &(0x7f0000000080)=0x100) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000740)={r3, 0xfffffffffffffff7}, 0x8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$EVIOCGMTSLOTS(r6, 0x8040450a, &(0x7f00000001c0)=""/170) dup(r4) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r6, 0xc10c5541, &(0x7f0000000b00)={0x7fff, 0xd83e, 0x1, 0x0, 0x0, [], [], [], 0xb48, 0x100}) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000600), &(0x7f0000000640)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440)={r3, 0x10001}, 0x8) pipe(&(0x7f0000000140)) 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 808.121917] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x101200, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@hci={0x1f, 0x0}, &(0x7f0000000d40)=0x80) recvfrom$packet(r0, &(0x7f0000000400)=""/135, 0x87, 0x10100, &(0x7f0000000d80)={0x11, 0x0, r1, 0x1, 0x9c, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) r5 = fcntl$dupfd(r3, 0x0, r2) recvmmsg(r5, &(0x7f00000014c0)=[{{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000700)=[{&(0x7f00000011c0)=""/140, 0x8c}], 0x1, 0x0, 0x0, 0x7fffffff}, 0x7054d8f3}, {{&(0x7f0000001280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001300)=""/177, 0xb1}, {0xffffffffffffffff}, {&(0x7f0000000d00)=""/58, 0x3a}, {&(0x7f00000013c0)=""/7, 0x7}], 0x4, &(0x7f0000001440)=""/124, 0x7c, 0x1}, 0x9}], 0x2, 0x1, &(0x7f0000001540)) recvfrom$packet(r5, &(0x7f0000000c00)=""/206, 0xce, 0x2, &(0x7f0000001580)={0x11, 0x1e, r6, 0x1, 0x0, 0x6, @remote}, 0x14) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200200) getpeername$inet(r5, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000340)={0x6c07, 0x3, 0x3ff, 0x5, 0x4}) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000001640)=""/168, 0xa8) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}, {}], 0x2, 0x0) unshare(0x40000000) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffe, 0x0) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x1ffffff, 0x0, @remote}, 0xfff7) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000dc0)={0x0, 0x1ec5, 0x0, &(0x7f0000000040)}) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f00000000c0)="7f1528e730ad2b3cb9484de5e5e6bbf124cdb83c7ce6b7", 0x17) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f0000000540)=0x369) ioctl$KVM_GET_DEVICE_ATTR(r7, 0x4018aee2, &(0x7f0000001600)={0x0, 0x41, 0x7, &(0x7f00000015c0)=0x7}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/177) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000800)={"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"}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x32f}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000640)={0x2, 0x4e24, @remote}, 0x10) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000500)={0xf, 0x8}, 0x10) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0xfffffffffffffff5, 0x7, {{0x0, 0x0, 0x3}}}, 0x28) 13:02:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf0ffffff00000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:31 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001880)='/dev/vsock\x00', 0x1807c, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000018c0)={0x0}, &(0x7f0000001900)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001940)={r1, 0x1d, "d7fed9b95d32bef599642c66849c209d3bcb2d1a05dbee9ed2675a0f96"}, &(0x7f0000001980)=0x25) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) getsockname(0xffffffffffffff9c, &(0x7f0000000640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001b00)=[@in6={0xa, 0x4e24, 0x2, @empty, 0x6}, @in={0x2, 0x4e21, @local}], 0x2c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000540)={{0xa, 0x4e24, 0x9, @loopback, 0x5}, {0xa, 0x4e22, 0x66, @mcast2, 0x9}, 0x521a, [0x3, 0x0, 0x3, 0x1, 0xfffffffffffffffe, 0x11b, 0xe5b, 0x351]}, 0x5c) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], 0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000001cc0)={0xc, 0x8, 0xfa00, {&(0x7f0000001b40)}}, 0x10) bind$can_raw(r4, &(0x7f0000001840)={0x1d, r3}, 0x10) ioctl$TCSETS(r4, 0x5402, &(0x7f0000001800)={0x5, 0x1, 0x80, 0x7db, 0xfffffffffffffff9, 0x80000000, 0x1ff, 0x7, 0x4, 0x0, 0x800, 0xfff}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000001700)={r5, 0xf5, "a9adc98d782f9629badab67f6ad291e1b96b8e4f4758b9c8dede39fb5a6ceff5b4d046ded98c3bde975430e9741888a3e248748eb02a78ab92260958764a256888a3dc4e2d9dd0828e66ebf62378cd66e5e92b4842af3a3794b7a3740c0535ad2a0479b4e3e08b8afdb4fb196afe8b8bbcac854364460fb39a91ecbe3496bb84fb5bf52851d3e7048ee209151aabb3fb82d8f116e1802b63de24b7d45c8f6f8aecbee35d76e043487caca99033bc52441b102149f0c6b0ee34c4b97bba3241178087d9f1d37139ecf4991b635ab52648a87b1cd81820309a6f4a645d42025abc2dbf99966b9b11d8ef671fc02d41b55711962ac2da"}, &(0x7f0000000400)=0xfd) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000019c0)={{{@in6=@mcast2, @in=@broadcast}}, {{}, 0x0, @in=@remote}}, &(0x7f0000001ac0)=0xe8) sendmmsg(r2, &(0x7f0000000500)=[{{&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @dev={[], 0xb}, 'nr0\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000000c0)="836516a35fbe9274faf25380e0746ac1441414280cf18d9d56f09fbfa5a148a883081cfec6eb69483986390f028d7cd9", 0x30}, {&(0x7f0000000100)}, {&(0x7f0000000180)="d7cd424274c8156ad62e9f5801c9623c91ffd22dc71d266c706f1e24c003bd0b18dde307acd761a0c60458fc7944786bd61f7b82d7835dc32fdf30c9f041999bc1302273c3609cfeb2e406d69d582ef5801a6ad42d5ad7a0cdd39ef7295c8354db909a67f732365899665f7a773c9cbd516c5e5f2963d8b458707a7b6536378f15f5481d5d74e8a26ab7a541a4", 0x8d}, {&(0x7f0000000240)="3576586d54e999991bbf4dbbad288b1ca8a9a9d54ed10fdebdca", 0x1a}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="563a2ef5efe4fda6057803a3826c2939472fd5a204d3665b0637ca803ef17c6d8319b73f6a86c9ad41df5110ec9e137b56eaea6f", 0x34}, {&(0x7f0000000300)="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", 0xfe}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000400)}], 0x9, 0x0, 0x0, 0x4090}, 0x80}], 0x1, 0x0) 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\x00?'}, 0x18) 13:02:31 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x8) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000280)=ANY=[@ANYBLOB='O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00j\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x9, 0xfffffffffffffff9, 0xfff, 0x6, 0x0, 0x8, 0xa0000, 0xc, 0x1, 0x3dd2, 0x24000000000000, 0x10001, 0x116, 0x400, 0x1, 0x7, 0x0, 0x10000, 0x3, 0x4, 0x8, 0x7, 0xce3c, 0x0, 0x4, 0xfff, 0x3ff, 0x3ff, 0x1000, 0x3, 0x6, 0x2, 0x4, 0x400, 0x9e, 0x7, 0x0, 0xffff, 0x0, @perf_config_ext={0x4f6bdc3b, 0x3}, 0x10000, 0x8, 0x2, 0x9, 0xfffffffffffffffc, 0x7fff, 0x4}, r0, 0xffffffffffffffff, r0, 0xa) r1 = socket$inet(0x2, 0x0, 0x0) flock(r1, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x8, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$P9_RREADDIR(r0, 0x0, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='vmnet0md5sumeth1selinux*\x00') ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000480)={0x4, 0x0, [{0x40000001, 0xd990, 0x3, 0x3, 0x3f, 0x80000000, 0x9}, {0x6, 0x407, 0x4, 0x8, 0xd2, 0xfffffffffffffffe, 0xbef}, {0xc000000f, 0x8, 0x4, 0x4, 0x7, 0x1f, 0x7fff}, {0x2, 0x6d9, 0x4, 0x7fff, 0x100000001, 0xb0, 0x3}]}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'rose0\x00', 0x52}) [ 808.252181] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00`\x00'}, 0x18) 13:02:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_smc(0x2b, 0x1, 0x0) r3 = socket(0x20000000000000a, 0x5, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x4e25, 0x0, @remote, 0x6}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000e530e9)=""/16, &(0x7f0000000280)=0x10) uselib(&(0x7f0000000040)='./file0\x00') r4 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000180)="fe2de5a540921e606cefc5eb0ced4ec4a4716c61be4f646c4e3af57ac753a29c0886aec24fa65ec087ae06fa33938c15667d55d80089035fdda4f833fc841e8d69d91f7c6e471a4bf535191be1976942d74afe26c4bd31175e0f7428f96df9c9a3cff8fa4e2fe1bd30ad98edcadb44cdfde964029f10416abfb4cfa36034b46db50fdd23", 0x84, 0xfffffffffffffff8) r5 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r4, 0x100000001, r5) ioctl$RTC_UIE_ON(r2, 0x7003) [ 808.337850] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 808.466853] IPVS: ftp: loaded support on port[0] = 21 [ 808.515227] IPVS: Unknown mcast interface: syzkaller1 13:02:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f918ea67f2f3b25d1"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) 13:02:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x3000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:31 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x8) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000280)=ANY=[@ANYBLOB='O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00j\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x9, 0xfffffffffffffff9, 0xfff, 0x6, 0x0, 0x8, 0xa0000, 0xc, 0x1, 0x3dd2, 0x24000000000000, 0x10001, 0x116, 0x400, 0x1, 0x7, 0x0, 0x10000, 0x3, 0x4, 0x8, 0x7, 0xce3c, 0x0, 0x4, 0xfff, 0x3ff, 0x3ff, 0x1000, 0x3, 0x6, 0x2, 0x4, 0x400, 0x9e, 0x7, 0x0, 0xffff, 0x0, @perf_config_ext={0x4f6bdc3b, 0x3}, 0x10000, 0x8, 0x2, 0x9, 0xfffffffffffffffc, 0x7fff, 0x4}, r0, 0xffffffffffffffff, r0, 0xa) r1 = socket$inet(0x2, 0x0, 0x0) flock(r1, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x8, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$P9_RREADDIR(r0, 0x0, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='vmnet0md5sumeth1selinux*\x00') ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000480)={0x4, 0x0, [{0x40000001, 0xd990, 0x3, 0x3, 0x3f, 0x80000000, 0x9}, {0x6, 0x407, 0x4, 0x8, 0xd2, 0xfffffffffffffffe, 0xbef}, {0xc000000f, 0x8, 0x4, 0x4, 0x7, 0x1f, 0x7fff}, {0x2, 0x6d9, 0x4, 0x7fff, 0x100000001, 0xb0, 0x3}]}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'rose0\x00', 0x52}) [ 808.868821] IPVS: Unknown mcast interface: syzkaller1 [ 809.054901] IPVS: ftp: loaded support on port[0] = 21 13:02:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\x00 '}, 0x18) 13:02:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={r3, 0x75, "bb9ae608a71e89582543538aa830e2f53703f3c026e48caff0292bb577289fd293ff1c8f636c3585f2cd15f7901f6f11594c589de854859c0cb4b684e4fccb3cc30dfa31eab57cb876f2f673158a3c55876366e4610fc7df2b2598245b804c332073adc2360de33fdcd08c24521df15a7b341c0d96"}, &(0x7f00000001c0)=0x7d) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r4, &(0x7f00000000c0)=""/11, 0xb) 13:02:32 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000040)=[@dead_binder_done={0x40086310, 0x2}], 0x56, 0x0, &(0x7f00000000c0)="e9fa9adfe4505f066249c721d58092a3fc349c47a8433f026fd19b94a24ad91db8a3658796f039b71d3857da6f6069b0fa2f86e0519227cf8be94c8c0d02a767608b30a351fcdeb6c4ad6a328963cf8583fefd9438fd"}) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000006, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 13:02:32 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x101200, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@hci={0x1f, 0x0}, &(0x7f0000000d40)=0x80) recvfrom$packet(r0, &(0x7f0000000400)=""/135, 0x87, 0x10100, &(0x7f0000000d80)={0x11, 0x0, r1, 0x1, 0x9c, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) r5 = fcntl$dupfd(r3, 0x0, r2) recvmmsg(r5, &(0x7f00000014c0)=[{{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000700)=[{&(0x7f00000011c0)=""/140, 0x8c}], 0x1, 0x0, 0x0, 0x7fffffff}, 0x7054d8f3}, {{&(0x7f0000001280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001300)=""/177, 0xb1}, {0xffffffffffffffff}, {&(0x7f0000000d00)=""/58, 0x3a}, {&(0x7f00000013c0)=""/7, 0x7}], 0x4, &(0x7f0000001440)=""/124, 0x7c, 0x1}, 0x9}], 0x2, 0x1, &(0x7f0000001540)) recvfrom$packet(r5, &(0x7f0000000c00)=""/206, 0xce, 0x2, &(0x7f0000001580)={0x11, 0x1e, r6, 0x1, 0x0, 0x6, @remote}, 0x14) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200200) getpeername$inet(r5, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000340)={0x6c07, 0x3, 0x3ff, 0x5, 0x4}) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000001640)=""/168, 0xa8) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}, {}], 0x2, 0x0) unshare(0x40000000) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffe, 0x0) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x1ffffff, 0x0, @remote}, 0xfff7) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000dc0)={0x0, 0x1ec5, 0x0, &(0x7f0000000040)}) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f00000000c0)="7f1528e730ad2b3cb9484de5e5e6bbf124cdb83c7ce6b7", 0x17) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f0000000540)=0x369) ioctl$KVM_GET_DEVICE_ATTR(r7, 0x4018aee2, &(0x7f0000001600)={0x0, 0x41, 0x7, &(0x7f00000015c0)=0x7}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/177) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000800)={"d0b36e8407e0f54b578ef945b6737d18eb9d348065ed290e4cea61f62b481bf1885da8e7d20757085e8aecce61c26dbe63babff55ac46a3050bf323a8b25673ce559cbbc1ed24f8b8d38493233f3bf9edc402185bccf93c1eddc5d29e5e1e3f2f6367dcc1b75447ce8f6af3445aaa5ecb5643cc1a4d22f23d6f58fd786ef3a7d479592067a634e47c55e479352abc11f874ebfaca7c369dcb01e27d0885c976f767761d54a363cf61ec716895b516a9f6e42831af11e57a9dc3fe4d08d9ac3210ec33eedfb5d8468af883f0da4b255618441b5177302ce06eb09d4939d4993f52c6c3af84c6f5c7014e306a82a215d6f286e9a1edc5e49e9565599076dc6d1291e2c88bdea9b8d69f9702ceafdf21e1ede6c943b9b20ff84e1e6be3cd193ac2cce1e0517d93c5cffc69cd0f8d9086ccbf2c58435190e8fbda6c6f224eadc43807b0f6aff4e47d2dec47837a9ba05d76ddf8acb576649c8e1684a38d5f22f6c0254a35d42a025ca45a4c4c6c45d73e3c44532c94e87f01265ca01f1d31af2cabdf7de455a9696639272fef2603d05ac66c5f10482078c9d76495516bc06edffbc7ca44fe0c435125b84baca539fb8ac6572f7c42daa77836f6b8da583bdd5317980219b1c794efce2f59bd48f363c6fd248f85007da3d0b80415edf601b5af49c286a262d2830b6d6f30db1be92efff5e8f3cbb3bf99ebbf400cafafdabca0a2c6caec92bd9765d5310940a05cb14d38ffb9b5761b882d6635f0d54adfb810c79ec33c84b8ddfadfa73d6aa99c26e404417dd900e1f0b7c481dfc1dd7b0f380ebb767300c553bbf3f55f393020589d2bfc5fc6b2ee1548e0a26c93719f84ff5a7204d0fd2375c94206f618fee486f4858a08824c32fc933173005baf10c78646c21ed1a9c55dff970f0b6d0539687b02e78b7d39f1e00c7b451a4397d85a44291c090ad235457172bae93874ab0c58bdbfc9d2a0cb058f6ff38e1e3af3582aaa39cefc3dfa3eff36c661bc1ea2e63c1e6debce33feea872d2d785735b7e71b9b667dbffcb6a2884d1df89f1310bdd7a7beae716cdf0920c66f51bde3a1b2a5e76d5f11105713595d9bc1753554f166a796eefc8ba4930203a92f564979f8f36e152398853be3ceb86eb9e1af95f50e291bba14b3c4e5ce59903486948e356646db051d5dc7e7c7c912c24a447f80d62a85a51850d6b9f251694effb00c9d6b3f1eb4eb956ca6fbe887a53b4340c166dd413b589aaf336e075062e9e6182f59b1776a6a0fd008cc8fab301fe94fa78445731a62233aae59d9f37e3dbbb30da082c3de2b621e6f1de8c2c894ef3825c11211c8be8136c1c388075e76879791dc7e07f5ae0ca317a9e9ac3fea540221946efd6653e4bd0b555bd6d57efdbdcf821b9c4231679d6513ae4d0c9e5b0602ad77fa76b5d0657089ece26f546f71e0b9af7"}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x32f}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000640)={0x2, 0x4e24, @remote}, 0x10) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000500)={0xf, 0x8}, 0x10) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0xfffffffffffffff5, 0x7, {{0x0, 0x0, 0x3}}}, 0x28) 13:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="f2", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f00000000c0)=""/11, 0xb) [ 809.115741] IPVS: Unknown mcast interface: syzkaller1 13:02:32 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffb, 0x8201) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x20120, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7400000000000000}) 13:02:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000001"}, 0x18) 13:02:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0xffe9) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) [ 809.264080] IPVS: Unknown mcast interface: syzkaller1 13:02:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000004"}, 0x18) 13:02:32 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x19d, 0x0) 13:02:32 executing program 2: r0 = inotify_init() r1 = dup(0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) r2 = getuid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000001800)={&(0x7f0000000000), 0xc, &(0x7f00000002c0), 0x0, &(0x7f00000017c0)=[@cred={0x20, 0x1, 0x2, 0x0, r2, r3}], 0x20, 0x40}, 0x0) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4800) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000380)) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x1f, r5, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) preadv(r6, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x700) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f00000002c0)) 13:02:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000005"}, 0x18) [ 809.390121] IPVS: ftp: loaded support on port[0] = 21 [ 809.399580] IPVS: Unknown mcast interface: syzkaller1 13:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x200000000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 809.537182] IPVS: Unknown mcast interface: syzkaller1 13:02:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000300"}, 0x18) [ 809.711162] IPVS: Unknown mcast interface: syzkaller1 [ 809.733999] IPVS: Unknown mcast interface: syzkaller1 13:02:33 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x101200, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000680)=@hci={0x1f, 0x0}, &(0x7f0000000d40)=0x80) recvfrom$packet(r0, &(0x7f0000000400)=""/135, 0x87, 0x10100, &(0x7f0000000d80)={0x11, 0x0, r1, 0x1, 0x9c, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x805, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000100)=0xffffffff80000001) r5 = fcntl$dupfd(r3, 0x0, r2) recvmmsg(r5, &(0x7f00000014c0)=[{{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000700)=[{&(0x7f00000011c0)=""/140, 0x8c}], 0x1, 0x0, 0x0, 0x7fffffff}, 0x7054d8f3}, {{&(0x7f0000001280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001300)=""/177, 0xb1}, {0xffffffffffffffff}, {&(0x7f0000000d00)=""/58, 0x3a}, {&(0x7f00000013c0)=""/7, 0x7}], 0x4, &(0x7f0000001440)=""/124, 0x7c, 0x1}, 0x9}], 0x2, 0x1, &(0x7f0000001540)) recvfrom$packet(r5, &(0x7f0000000c00)=""/206, 0xce, 0x2, &(0x7f0000001580)={0x11, 0x1e, r6, 0x1, 0x0, 0x6, @remote}, 0x14) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200200) getpeername$inet(r5, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000340)={0x6c07, 0x3, 0x3ff, 0x5, 0x4}) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000001640)=""/168, 0xa8) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}, {}], 0x2, 0x0) unshare(0x40000000) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffe, 0x0) connect$inet6(r5, &(0x7f0000000300)={0xa, 0x1ffffff, 0x0, @remote}, 0xfff7) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000dc0)={0x0, 0x1ec5, 0x0, &(0x7f0000000040)}) setsockopt$inet6_dccp_buf(r7, 0x21, 0xf, &(0x7f00000000c0)="7f1528e730ad2b3cb9484de5e5e6bbf124cdb83c7ce6b7", 0x17) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f0000000540)=0x369) ioctl$KVM_GET_DEVICE_ATTR(r7, 0x4018aee2, &(0x7f0000001600)={0x0, 0x41, 0x7, &(0x7f00000015c0)=0x7}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000580)=""/177) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000800)={"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"}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x32f}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000640)={0x2, 0x4e24, @remote}, 0x10) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000500)={0xf, 0x8}, 0x10) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0xfffffffffffffff5, 0x7, {{0x0, 0x0, 0x3}}}, 0x28) 13:02:33 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x19d, 0x0) [ 809.911962] IPVS: ftp: loaded support on port[0] = 21 13:02:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0xaef, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000006c0)={@loopback}, &(0x7f0000000700)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)="fa", 0x0) write$binfmt_elf64(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46000000f4100000000200000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getuid() execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f0000000080)=""/11, 0xb) 13:02:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"76657400000000000000000400", 0x43732e5398416f1a}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000140)=0xa63d) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x189000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000280)={r3}) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0xa00, 0x0) setsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000001c0)=0x2, 0x4) set_tid_address(&(0x7f00000000c0)) 13:02:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000600"}, 0x18) 13:02:33 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x19d, 0x0) 13:02:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x400300, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:33 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDSKBLED(r0, 0x4b65, 0xfffffffffffffffd) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x100000009, 0x101000) tee(r0, r1, 0x401, 0x4) ioctl$FS_IOC_FSGETXATTR(r1, 0x8004550f, &(0x7f0000000180)) socket$inet6_dccp(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) [ 810.181645] IPVS: Unknown mcast interface: syzkaller1 13:02:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:33 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x19d, 0x0) 13:02:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0xe1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000003c0)=@req={0x80, 0x0, 0x3}, 0x10) socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x80, 0x0, 0x3}, 0x10) sendto$inet6(r0, &(0x7f0000000480), 0x37, 0x0, 0x0, 0x2a6) writev(r0, &(0x7f0000000740), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000040)={0x7ff, 0x7}) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000240)=""/108) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000162, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000100)=0xc862) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x7ff, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000000c0)) [ 810.307533] IPVS: Unknown mcast interface: syzkaller1 13:02:33 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9, 0xa2001) io_setup(0x8, &(0x7f0000000180)) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00V\x00', 0xc3, 0x40000007fffe}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/85, 0x55) clock_gettime(0x0, &(0x7f0000000200)) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000300)=ANY=[]) ioctl$FICLONE(r1, 0x40049409, r0) timerfd_settime(r1, 0x0, &(0x7f0000000680)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f00000006c0)) mknod$loop(&(0x7f0000000640)='./file0\x00', 0x0, 0xffffffffffffffff) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x200000) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000000c0)={0x8000, 0x6, 0x4, 0x40, {}, {0x1, 0x1, 0x2400000, 0xea, 0x5, 0x3, "c8350d9d"}, 0x2, 0x3, @offset, 0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) tkill(0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x7f, 0x7}, 0x8) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) 13:02:33 executing program 0: syz_emit_ethernet(0xff27, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xf}}}}}, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) 13:02:33 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x88000, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000080)=0x101) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000100)={0x34000, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="020d0000100000000000000000e4e857f82f0000007aea98ef0b3523e695c5080000000300060000000000020001000000000000000008001200020002000000000000297c7ab5925c000003030000000000000000000000000000000000000000724a99ea117e424500000000000000000002000000e00000010000000000000073691656c3d5d448b5d487b900f967c7198374bdc5fab0730b7be1a3f02a84adba6a5d14c523b965d798778d41c183ec34dead020000000000000000000000000000000000000000000000000000"], 0x80}}, 0x0) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000300)) 13:02:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xffffff9e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:33 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000040), 0x4) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0xc000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) [ 810.549286] IPVS: Unknown mcast interface: syzkaller1 13:02:33 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x20011, r0, 0x0) syncfs(r0) 13:02:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="14008a36f0d1c1a22cc0d2c7e8c5e100003a00058e326cfd825c7380413828ccb3cd66205ed0d0b4c0310aa2be7d1394b7bda31cd5eee922142d40538e51d32c8d615b8526d466ccc80a336edc7e320784e40a2da3b785d100c99d9cba7a8780fab4641a44527b4e27b52ac6bf4ee6f74e78b3f161ebbb9b544906777f356f17568b89ff0b5e27a210f08ffeb0396f11b4c5bc1416b90294b98577e441aa72157a6f0fb076788284f134f7132b1c4ee70ff4decb"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000040)=""/9) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/241, &(0x7f00000002c0)=0xf1) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492805, 0x0) 13:02:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\a\x00'}, 0x18) 13:02:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000040)=ANY=[@ANYBLOB]) getsockopt(r0, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x1}) 13:02:34 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, 0x1cd) unshare(0x80000100) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffff9c, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, 0x22c}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r0) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000140)="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") [ 810.681763] IPVS: Unknown mcast interface: syzkaller1 13:02:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x610401, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x101, 0x3, 0xa58d}, 0x100000001, 0x0, 'id1\x00', 'timer0\x00', 0x0, 0x7fffffff, 0xe37, 0x7e3, 0x4845}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000180)={0x10000, 0xfffffffffffffffd, 0x7fff, 0x3, 0x56}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0, 0xc0010141]}) 13:02:34 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x7f, 0x1000, 0x1, "b7f29722be63cffb850c8a61a6a03860cd01a0cc359039e59eaf62a3061e3e9628aa23209aba9ced04f4e54ae572a7be3b763016d4a8b41a81767d893f1249d43f98562cdab9f2db7cc63f82bd2a885c4c33745aae4a072d7288e85c83359b06c21e7f1f8db0ac0ecd2c658e7bfbade86ec0e480ad894b291d3476c900e239"}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 13:02:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000300"}, 0x18) 13:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000040)=ANY=[@ANYBLOB]) getsockopt(r0, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xf0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@my=0x1}) [ 810.901730] IPVS: Unknown mcast interface: syzkaller1 13:02:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:34 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) get_mempolicy(&(0x7f0000000180), &(0x7f0000000280), 0xa1d, &(0x7f0000ffd000/0x3000)=nil, 0x3) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x48000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000340)={0x1, &(0x7f0000000040)=""/223, &(0x7f00000001c0)=[{0x64dd, 0x6c, 0xd38, &(0x7f00000002c0)=""/108}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x4000, 0x0) 13:02:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000900)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) r3 = fcntl$getown(r0, 0x9) tkill(r3, 0x2e) fcntl$lock(r1, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x2, r3}) 13:02:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000400"}, 0x18) 13:02:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r1) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) 13:02:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='schedstat\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f00000000c0)={0x4, [0x8, 0x4, 0x8, 0x9, 0xff, 0x9, 0x1ff, 0xac, 0x6, 0x10001, 0x100, 0x1, 0xfffffffffffff691, 0x6, 0x7, 0x4c1, 0x5, 0x3, 0xfffffffffffffffb, 0x1f, 0x1, 0x4, 0x28, 0x7, 0x5, 0x6, 0x3, 0xfffffffffffffffc, 0x7, 0x2, 0x1, 0x9c4, 0x10000, 0x4, 0x101, 0x1ff, 0xffffffff, 0x80, 0x3ff, 0x6, 0x3, 0x2, 0x4, 0x1c000000, 0xca80, 0x4, 0x9, 0x5], 0xc}) fsetxattr(r2, &(0x7f0000000000)=@random={'os2.', '/dev/ptmx\x00'}, &(0x7f0000000080)='schedstat\x00', 0xa, 0x3) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) [ 811.076791] IPVS: Unknown mcast interface: syzkaller1 13:02:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000500"}, 0x18) [ 811.198467] IPVS: Unknown mcast interface: syzkaller1 [ 811.249822] IPVS: Unknown mcast interface: syzkaller1 13:02:34 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x0) 13:02:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = geteuid() getpeername$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000880)={&(0x7f0000000440)=@flushsa={0x410, 0x1c, 0x0, 0x70bd27, 0x25dfdbfe, {0x2b}, [@algo_auth={0x13c, 0x1, {{'poly1305-generic\x00'}, 0x7a0, "61e59938a825b8231b2005188cd2701475031b96e2c416fea1a1b7bd9b2dde4c4c5cf55ace8fe7daef832ff925564f7de1056bbb824f89c24c2dbfa284ea09aa50ea970a82ee24d33bda1e55ab95d24e27b79fd7be42251cf851f4c59250d28bb8b94ce8bb0339fd1b1ea2d545f6c74f8927abfdef5056d8c37ebe8bc54ebf0475442275ea027d245f8410087b6ff2b4d0944597bed9173e4cc6bb22203c3d44f0fb08a6b3d007eb9b25d75b73b51dbd3835d93d1a6e8e9f2666051292d52ac92e321386576ec0c988584165610ab15b22686d82b1fb4ebe7b8d03d18b37081ae4fdc0f4b93e8fe29db352069f51b67a68d748fb"}}, @sa={0xe4, 0x6, {{@in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@ipv4={[], [], @loopback}, 0x4e22, 0x9c, 0x4e21, 0x4, 0xa, 0xa0, 0xa0, 0x8, 0x0, r2}, {@in6=@remote, 0x4d2, 0x3c}, @in6=@ipv4={[], [], @multicast1}, {0x6, 0x1, 0x800, 0xfffffffffffffffb, 0x1, 0x2, 0x8, 0x4}, {0x9, 0x4, 0xfffffffffffffff9, 0x7ff}, {0x100, 0xa90a, 0x9}, 0x70bd2d, 0x3505, 0xa, 0x7, 0x8, 0x84}}, @algo_crypt={0xf0, 0x2, {{'ctr(twofish)\x00'}, 0x528, "ea833009c8ccfe044e0f6a797d25ce17cee77917155609f097da0a8cf97a52bb124a1ff5f70b85c1980947e3ac9914ac1373d122008292d4e86d5b830faf8b60a7d336bd83b1a44c869b203d8ec000be3b4558975cf54bcc1a5139375733362742816128b292f27540502273bb86362ffaad3709da8bd75ce4bcc6e0e98a11f2d181acef157f8838d2239ea9249fb7ebc33260eb47ce33f3bcdeee8c6ee86743494ae7b491"}}, @sa={0xe4, 0x6, {{@in=@multicast2, @in=@empty, 0x4e21, 0xff, 0x4e20, 0x6, 0x2, 0x20, 0x80, 0x6, r3, r4}, {@in=@empty, 0x4d6, 0xff}, @in6=@dev={0xfe, 0x80, [], 0x13}, {0x2f66, 0xe000000000000000, 0x8000, 0x3, 0x7, 0x57, 0x7f, 0x10001}, {0x7, 0x8001, 0x3c, 0x1d}, {0x5, 0x1, 0x40}, 0x70bd27, 0x3501, 0x2, 0x3, 0x1, 0x23}}, @etimer_thresh={0x8, 0xc, 0x19f}]}, 0x410}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl(r1, 0x5b4, &(0x7f0000000080)='\x00\\A\x00\x00\x00\x00\x00\x00\x00\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2=0xff010000, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0xc0}, 0x8}, 0x0) 13:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x208000) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000080)="7594b4720866a5fa648167e8e9ed0e52729d832e6af11160307d785b17c910417da69b4fcaeb7d164e1ac0bab1286088276abd49c60a613a0080e03513507c42f6af3b91154b889cedf1638fbaec51f90b599b5e1c315d874e", 0x59) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x7fffdffff000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000), 0x2) 13:02:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x321000, 0x0) write$P9_RCREATE(r0, &(0x7f0000000300)={0x18, 0x73, 0x1, {{0x4, 0x3, 0x8}, 0x2}}, 0x18) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0xb01, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000003c0)=[{{&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)=""/6, 0x6}], 0x1, &(0x7f0000000240)=""/28, 0x1c, 0x4}, 0x7fffffff}, {{&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000380)=[{&(0x7f0000000440)=""/75, 0x4b}], 0x1, 0x0, 0x0, 0x101}, 0x5e}], 0x2, 0x0, 0x0) 13:02:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x1c020000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 811.582442] IPVS: Unknown mcast interface: syzkaller1 [ 811.597815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 13:02:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\x00\a'}, 0x18) 13:02:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) getpeername$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)=0x9) [ 811.633672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 13:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x208000) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000080)="7594b4720866a5fa648167e8e9ed0e52729d832e6af11160307d785b17c910417da69b4fcaeb7d164e1ac0bab1286088276abd49c60a613a0080e03513507c42f6af3b91154b889cedf1638fbaec51f90b599b5e1c315d874e", 0x59) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x7fffdffff000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000), 0x2) 13:02:35 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x10001, 0x6, 0xfffffffffffffffe}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800008013000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00fffffff200000008000a0010cc9748a3b242b6000000"], 0x28}}, 0x0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) 13:02:35 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x3, 0x4) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 811.732409] IPVS: Unknown mcast interface: syzkaller1 13:02:35 executing program 5: clock_gettime(0x0, &(0x7f0000000d00)) r0 = inotify_init() r1 = dup(0xffffffffffffffff) ioctl$VT_WAITACTIVE(r1, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r2, 0x400000000000003) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000004c0)='./file1\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000600)=[0xee00]) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr(r1, &(0x7f0000000080)=@random={'system.', "74086e750000000000000000008c00"}, &(0x7f0000000140)='user\x00', 0x5, 0x1) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x1}, [{0x2, 0x3}, {0x2, 0x2, r4}, {0x2, 0x2, r5}], {0x4, 0x3}, [{0x8, 0x0, r6}, {0x8, 0x4}, {0x8, 0x4, r7}, {0x8, 0x0, r8}, {0x8, 0x4, r9}], {0x10, 0x6}, {0x20, 0x3}}, 0x64, 0x2) socket$nl_route(0x10, 0x3, 0x0) syncfs(r3) lstat(&(0x7f0000000280)='./file1\x00', &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000640)=0xc) r10 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r11 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, r11) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000f80)="98570349f495b683798c5c0f5a19ec28a317fb4eb8cc99bdd827945027401d0cc0efc89f57850e697f3976ed71a59ce3a39423a8cf6ab658824709315711bc60680412ba4ab3647c04c566b93cdd664a728146aa5a9e433c6b94989ce18905e4e6", 0x61}], 0x1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0xfe) sendfile(r10, r10, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r10, 0x4c01) 13:02:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000003"}, 0x18) 13:02:35 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f0000c29ffc)=0x7, 0xffffffc9) 13:02:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bond0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0xffffffffffffff7f, 0x2, 0x400, 0x8, 0xffffffffffff7fff, 0x8, 0x1587, 0x3ff, 0x3, 0x2, 0x3f}, 0xb) [ 811.922598] IPVS: Unknown mcast interface: syzkaller1 13:02:35 executing program 1: socket$inet(0x2, 0x6, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x103040, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x6}) connect(r0, &(0x7f0000000180)=@l2={0x1f, 0x81, {0x100000000, 0xb5, 0x1, 0x80000000, 0x9, 0x9}, 0x7bb, 0x40}, 0xfffffffffffffdc2) 13:02:35 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)) msgctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f00000000c0)=0x80, 0x800) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) fcntl$addseals(r0, 0x409, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000240)=0xe8) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@ll={0x11, 0xf7, r4, 0x1, 0x6, 0x6, @remote}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) [ 811.947010] device bond_slave_0 entered promiscuous mode [ 811.952875] device bond_slave_1 entered promiscuous mode 13:02:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xfffffdef, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x10001, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') unshare(0x8000400) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000080)={0x0, 0x0, 0x0}) 13:02:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100007fffffff"}, 0x18) 13:02:35 executing program 1: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) chroot(&(0x7f000009a000)='./file0\x00') ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f000002cffa)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@rand_addr, @multicast1}, &(0x7f0000000140)=0xc) umount2(&(0x7f0000e28000)='..', 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)) [ 812.056958] device bond_slave_0 left promiscuous mode [ 812.062545] device bond_slave_1 left promiscuous mode [ 812.139407] IPVS: Unknown mcast interface: syzkaller1 13:02:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x87, 0x3f, 0x8, 0x6, 0xce, 0x800, 0x6446, 0x3, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x2}, &(0x7f0000000180)=0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002bc0)=ANY=[@ANYBLOB], &(0x7f0000002c80)=0x1) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000080)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000027c0)=[{&(0x7f0000002640)}], 0x1, &(0x7f00000029c0)}, 0x800) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup2(r3, r4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000100)) ioctl$KDSETLED(r5, 0x8940, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000003, 0x10507e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r7, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r9 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f000031aff8)={r7, r8}) r10 = gettid() perf_event_open(&(0x7f0000001580)={0x7, 0x70, 0xfffffffffffffffb, 0x5, 0xc301, 0x3, 0x0, 0x6, 0x40, 0x8, 0x1ff, 0xfffffffffffffff9, 0x0, 0xa2d8, 0x97b, 0x6, 0xbc, 0x8, 0x1, 0x1, 0x3, 0x0, 0x0, 0x100000000, 0x5, 0x1, 0x7f, 0x81, 0x6f8, 0x98, 0x1, 0x1000, 0x6, 0x0, 0x60000000, 0x2, 0x9, 0x7e, 0x0, 0x9be, 0x0, @perf_bp={&(0x7f0000001540), 0x4}, 0x2162, 0xd1c2, 0x1, 0x7, 0x8, 0x9, 0x200}, r10, 0x3, r7, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000400), &(0x7f0000001500)=0x4) 13:02:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x8000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x4, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="5187a1bda26689c0d5910bfb42e59fddff37653d0e69a9aa094b6b46adadb3072a24f7fc6599c7badea557071dc9118fe132338052e4e7000ecc6f185dca3a31d0cfdde9dad9609259b458d92980030f02e9870947df7c"]) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="38a661936a7e430c7a60876d5844ed3b63013fee49af358cf01c0b1cc28f1dd2c21c0ec6f142a37d58c1613dd5ecf08c0b2534a97cb4add0ff507fffffffffffffff1bde63f848892ca38ad1e6b37bea732108e7dc1cbddc37bb798528d1cfcd38142b9f365e4c5d987282db06aec518c241ac31333de3acd032b3ee87a282a5123fdb7cfd2fcf2d93279f33b0c9fc2ff23aa9b7ff1ecc14b4210c68ce8c69f00afddbb6e45e2456279e62a59225e9dced769543c1e2de79f1f2972789bff82940175236c717731636d4f53f3beb4a06"], 0x1200e) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) 13:02:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000080)=ANY=[@ANYBLOB="01b48a46e4ae7ccde386ec573a6b6593df1d4f6347c4bf9a6511ad7872016acdac4cb67d2eb55aac28d55f640607a9dd7616"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x40) ioctl$KVM_RUN(r0, 0xae80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$peekuser(0x3, r3, 0x4) 13:02:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000500"}, 0x18) 13:02:35 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)=0xb) ioctl(0xffffffffffffffff, 0x8000000000009381, &(0x7f0000000900)) 13:02:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x87, 0x3f, 0x8, 0x6, 0xce, 0x800, 0x6446, 0x3, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x2}, &(0x7f0000000180)=0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002bc0)=ANY=[@ANYBLOB], &(0x7f0000002c80)=0x1) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000080)=@in={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000027c0)=[{&(0x7f0000002640)}], 0x1, &(0x7f00000029c0)}, 0x800) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup2(r3, r4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000100)) ioctl$KDSETLED(r5, 0x8940, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x40000003, 0x10507e) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(r7, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r9 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f000031aff8)={r7, r8}) r10 = gettid() perf_event_open(&(0x7f0000001580)={0x7, 0x70, 0xfffffffffffffffb, 0x5, 0xc301, 0x3, 0x0, 0x6, 0x40, 0x8, 0x1ff, 0xfffffffffffffff9, 0x0, 0xa2d8, 0x97b, 0x6, 0xbc, 0x8, 0x1, 0x1, 0x3, 0x0, 0x0, 0x100000000, 0x5, 0x1, 0x7f, 0x81, 0x6f8, 0x98, 0x1, 0x1000, 0x6, 0x0, 0x60000000, 0x2, 0x9, 0x7e, 0x0, 0x9be, 0x0, @perf_bp={&(0x7f0000001540), 0x4}, 0x2162, 0xd1c2, 0x1, 0x7, 0x8, 0x9, 0x200}, r10, 0x3, r7, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000400), &(0x7f0000001500)=0x4) [ 812.361201] IPVS: Unknown mcast interface: syzkaller1 13:02:35 executing program 1: r0 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="582d01c4fd3bedab1e9f5fff05a2d69eb9ae07377eec400344342a00e10abc5516cd5f5831cb4e2cb1fcf1ad5e5b22dc2c920615c66fb7c5bfa3185a03e17109a86f00a088424192f45a39e7781adf035dba0178c3da06d5c8045409cd7cfddf47a99dd38d6ef4782cd9ba74511ac9d554b35bc499f5fe6005407cc2e1a8b32dc9f219de80aea517568627d4b2e2493c6d8dee40757df20011c5e805864cd924b172966e5c", 0xa5, 0xffffffffffffffff) r1 = request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='*\x00', 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="aebf882bd3db2cc0d656983a34ff27b96fc7c8497833f58e805fd43cf1061f09a258c7ef98393ca75faa0c59a245562fec7613dfa1bb1b46c751257d4944fc7a881b3bc585f91fed503ca1d1b307b45a7979ed88222d4bfcaf19dc58fde14cd8f0f653b1f269163741ee8b295d8723969ca04dfe9a87554cbfe0a1982685ee659ab0a5baee2233e9d3319ca69b4b51842a465049d5fa5e3a167e4021273772de284e6d539d193bcb6858615b340ad9b04485906f937915bbb38ba9fa0da9ef6592d341bd9c322a30377ec5d8524e8a524cedcfdc31af3ae9ff5756a518b84cbfebf46a7b7724edafacfd45cf0c4ef89e7d41c1", 0xf3, 0x0) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1, r2}, &(0x7f0000000400)=""/210, 0xd2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x100000001, 0x82, 0x8, 0x7}, 0xf) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r3, &(0x7f0000000140), 0x0}, 0x18) 13:02:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00 \x00'}, 0x18) [ 812.556657] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xc0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x54, &(0x7f0000000040)=[{&(0x7f0000001540)="2e00e405d10200000e00fa078b0004000000000000510befccd77f3e9cf075081c5eda00b0eba06a", 0x28}], 0x1}, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 13:02:36 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000000000)=""/19, 0x13) r1 = gettid() process_vm_writev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/90, 0x5a}, {&(0x7f0000000140)=""/200, 0xc8}], 0x2, &(0x7f0000000440)=[{&(0x7f0000000280)=""/87, 0x57}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000480)=""/223, 0xdf}], 0x3, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) close(r0) 13:02:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00?\x00'}, 0x18) 13:02:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0xcb5) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x41) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000002c0)={{0xffffffffffffffff, 0x1, 0x8, 0x3, 0x5}, 0x5, 0x7ff}) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'cpu'}, {0x2f, 'cpu'}]}, 0xa) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="26b7554c8e3d46b959ce69f2bf2188af487348f422cdf6559b195d7b43700ceac42dd0370957a0dcbb9c1bc66fe6faf5914533cad9122f162d7aa843f313b2d48dc4e132a14bfa5e2da56d96d919a2ba00000000000000000000000000"], 0x5) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYRESDEC=r2], 0xffffffffffffffe2) fcntl$addseals(r1, 0x409, 0x2) [ 812.665366] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 812.735493] IPVS: Unknown mcast interface: syzkaller1 [ 812.779197] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 0: r0 = open(&(0x7f00000000c0)='./file1\x00', 0x40140, 0x81) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) unshare(0x2060400) execveat(r1, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 13:02:36 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0xfffffffffffffffd, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000040)="c461f850ec3e660ffba3fcffff7f660f06c4617b118739f80000e8030000008f697881de420f2254c4227d5a91e0713649dda3231c0000c4e109e9a98dc06e1d", 0x40}], 0x1, 0x0, &(0x7f0000000100), 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000180), 0x4) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000080)="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") setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000200)={0x1, 0x5, 0x7ff, 0x0, [], [], [], 0x9, 0x1ffe0000, 0xffffffff, 0x3ff, "c8b4a1795741a0ccc1d32b2df71db887"}) finit_module(r0, &(0x7f0000000080)='\'\x00', 0x2) 13:02:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\a\x00'}, 0x18) 13:02:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x0, 0xfffffffffffffffd}, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x303002, 0x0) getdents(r4, &(0x7f00000002c0)=""/169, 0xa9) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x22000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r6, 0x1}}, 0x10) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000080)={0x20003, 0x0, [0x2, 0x5, 0x100000000000, 0x4, 0x7, 0x7, 0x1, 0x9]}) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendto$inet6(r3, &(0x7f0000000300), 0x53e4, 0x8004, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x40000000000020f, 0x0) [ 812.919727] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000100)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r2, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000000c0)) r3 = add_key(&(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="15046362fca3c78b06872137f6f2985dbd7b35d91d7e839a3637bf013c0495b979063b373f240b2fee75ec999909ce0b0afd6adec00d39b423a039fcc949245832a61fca4863deecc9b03cb5476f3959dfce1743df6e7480887186710799989374c31c22fe87759422d7b75b9e7d8a611b762ca22c698b9fc1b00e8f07eb5f7b86840297f861685dc15743abab2920fdd5726069c8e3aaaa06e5fad66de5531e630b4bdf7fad36c50d9255f99012780e74f234b4341ed0e12a172dc00860689befe20fd8c5559183e45eb32491516027cbe9aef462e328e8da8805b0e763d8d73c7098", 0xe3, 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)='\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x98) 13:02:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c65723100000600"}, 0x18) 13:02:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xe3) sendto$inet(r0, &(0x7f0000000000), 0xfec4, 0x4008000, &(0x7f0000001000)={0x2, 0x4e22, @broadcast}, 0x10) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) r1 = dup(r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00dd00"], 0x14}}, 0x0) [ 813.139662] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x4000000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:36 executing program 5: r0 = socket$kcm(0x2, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000540), 0x2) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f00000019c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004480)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/177, 0xb1}}, {{0x0, 0xfffffffffffffe89, &(0x7f0000000b80), 0x295, &(0x7f0000000c00)=""/12, 0xc}}], 0x2, 0x0, &(0x7f0000001d00)={0x0, r1+30000000}) 13:02:36 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0xe3) sendto$inet(r0, &(0x7f0000000000), 0xfec4, 0x4008000, &(0x7f0000001000)={0x2, 0x4e22, @broadcast}, 0x10) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) r1 = dup(r0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="00dd00"], 0x14}}, 0x0) 13:02:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 813.287194] IPVS: Unknown mcast interface: syzkaller1 [ 813.324031] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 1: r0 = accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x80) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x12) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x40046109, &(0x7f0000000300)) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0xc05c6104, &(0x7f00000003c0)) 13:02:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:36 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0xf, 0x2, 0xfffffffffffffff7, 0x80000, r1}) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0285629, &(0x7f0000000100)={0xb90000, 0x0, 0x0, [], 0x0}) 13:02:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x5ac) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000400)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000480)="e3904283d7715e41482f70ce2f70063857a95ca7931d47acaa262a5d56dbc7762774bc88767f1bb4541d8274aa635763bfbdd58be1e80710da69c19a5a72061e", 0x40) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8001, 0x7, 0x7, 0x55c0, 0x0, 0x74, 0x50002, 0x2, 0x5, 0xffffffffffff4aa2, 0x1, 0x4, 0x9, 0x2, 0x1, 0x1f, 0x3, 0x5, 0x7, 0x4160, 0x9, 0x2, 0xb4e, 0x1, 0x7, 0x39f9657b, 0x10001, 0x3, 0x200, 0x8001, 0x3, 0x8, 0x2, 0x3, 0x8, 0x101, 0x0, 0x6, 0x1, @perf_bp={0xfffffffffffffffd, 0x2}, 0x10, 0xb51, 0x0, 0x7, 0x1}, r3, 0x9, 0xffffffffffffff9c, 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) [ 813.442307] IPVS: Unknown mcast interface: syzkaller1 13:02:36 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) ioctl(r0, 0x9, &(0x7f0000000040)="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") r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x80000, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x2, [0x7, 0xffff]}, &(0x7f00000001c0)=0xc) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000240)=""/4096) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x4}, 0x8) mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) mlock(&(0x7f0000001000/0x10000)=nil, 0x10000) 13:02:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) r3 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) getgroups(0x2, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee01]) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)=0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000280)={{0x3, r3, r4, r5, r6, 0x100, 0x7fffffff}, 0x2, 0x1, 0x5, 0x2, r7, r8, 0xbe2}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r1) socket$vsock_stream(0x28, 0x1, 0x0) io_submit(r9, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) 13:02:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:37 executing program 0: delete_module(&(0x7f00000000c0)='\x00', 0x200) rt_sigprocmask(0x1, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x9, &(0x7f0000000000)) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000040)={0x4, 0x1, @start={0x3ff}}) ftruncate(r0, 0x4) write$binfmt_elf32(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x4, 0x3, 0x2, 0x3, 0x3e, 0x1, 0x295, 0x38, 0x305, 0x200, 0x2, 0x20, 0x2, 0x7, 0x7fff, 0x8f05}, [{0x60000007, 0x9, 0x2, 0x2, 0x8001, 0x3}, {0x7, 0x1af, 0x89, 0xe00000, 0x754f, 0x7fffffff, 0x8000, 0xfffffffffffffffd}], "75a9b8eaa618205431440f5d6703c285a390208aceabc221a95f0326c52c52d17581efac0a3c58429b95191083de4ad96ab2d70fc962e8d13ed80bea77b352e37ef8acd603a14aafbad4e3d31807f460ab1275a970d75addc41594bd46208a0ae5a101ba1506e5c082c58271d157e8cfe10ebd2b5ab02594e1f67a96907ccedf5dfdb3d2ad9440867084026f7c644b34cd048ad01d33afa0736716ef1298162a5c2ed369d1358b2e4a14bf84550feaf9053e2280bb37c1b71d445419fb0ad920", [[], [], [], [], [], [], []]}, 0x838) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/123) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 13:02:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xc00e0000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:37 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x807, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x90) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r5, @in={{0x2, 0x4e23, @rand_addr=0x10001}}}, &(0x7f0000000280)=0x84) close(r2) inotify_init() r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 13:02:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x5ac) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000400)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000480)="e3904283d7715e41482f70ce2f70063857a95ca7931d47acaa262a5d56dbc7762774bc88767f1bb4541d8274aa635763bfbdd58be1e80710da69c19a5a72061e", 0x40) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8001, 0x7, 0x7, 0x55c0, 0x0, 0x74, 0x50002, 0x2, 0x5, 0xffffffffffff4aa2, 0x1, 0x4, 0x9, 0x2, 0x1, 0x1f, 0x3, 0x5, 0x7, 0x4160, 0x9, 0x2, 0xb4e, 0x1, 0x7, 0x39f9657b, 0x10001, 0x3, 0x200, 0x8001, 0x3, 0x8, 0x2, 0x3, 0x8, 0x101, 0x0, 0x6, 0x1, @perf_bp={0xfffffffffffffffd, 0x2}, 0x10, 0xb51, 0x0, 0x7, 0x1}, r3, 0x9, 0xffffffffffffff9c, 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) [ 813.987948] IPVS: Unknown mcast interface: syzkaller1 13:02:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, r1) io_setup(0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 13:02:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000006"}, 0x18) 13:02:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8020000) semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') semop(0x0, &(0x7f0000000100)=[{0x0, 0x8, 0x1800}, {0x0, 0x7fffffff}], 0x2) setns(r2, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xb6) [ 814.155375] IPVS: Unknown mcast interface: syzkaller1 13:02:37 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'_1\x00', 0x0}) r3 = gettid() fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x2, 0x7, 0x370, 0x3, r3}) socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a5c2d023c126285718070") sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000180), 0xc, &(0x7f0000000040)={&(0x7f0000004340)=@setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x4}]}, 0x2c}}, 0x0) 13:02:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000002"}, 0x18) 13:02:37 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) open_by_handle_at(r0, 0x0, 0x200000000010000) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x68, "4f0996bff56d07504c33fa7c73f7138ecd36828f16c9d60e9b021e927d02b26455321f66e5e749d24869cf7048a2ae0826e1cde3aff4d9317935ac5530b839edda502d94de01c2176b2d63b458514e9a7d9e0860e865ed0feb7c0f3758e6f15ad3588cc49e7ddaa8"}, &(0x7f0000000180)=0x70) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0xa7df, 0x30}, 0xc) 13:02:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000004c0)='./file0\x00', 0x14104a, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000140)={0x29a}, 0x14) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x40204000000b) sendfile(r0, r0, &(0x7f0000000080), 0x5ac) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(0xffffffffffffff9c, &(0x7f0000000400)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000480)="e3904283d7715e41482f70ce2f70063857a95ca7931d47acaa262a5d56dbc7762774bc88767f1bb4541d8274aa635763bfbdd58be1e80710da69c19a5a72061e", 0x40) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) bind$alg(0xffffffffffffffff, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8001, 0x7, 0x7, 0x55c0, 0x0, 0x74, 0x50002, 0x2, 0x5, 0xffffffffffff4aa2, 0x1, 0x4, 0x9, 0x2, 0x1, 0x1f, 0x3, 0x5, 0x7, 0x4160, 0x9, 0x2, 0xb4e, 0x1, 0x7, 0x39f9657b, 0x10001, 0x3, 0x200, 0x8001, 0x3, 0x8, 0x2, 0x3, 0x8, 0x101, 0x0, 0x6, 0x1, @perf_bp={0xfffffffffffffffd, 0x2}, 0x10, 0xb51, 0x0, 0x7, 0x1}, r3, 0x9, 0xffffffffffffff9c, 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) [ 814.323970] IPVS: Unknown mcast interface: syzkaller1 13:02:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, r1) io_setup(0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 13:02:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x7c0007f7, &(0x7f0000ffc000/0x1000)=nil) 13:02:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00`\x00'}, 0x18) 13:02:37 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) open_by_handle_at(r0, 0x0, 0x200000000010000) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000000)) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x68, "4f0996bff56d07504c33fa7c73f7138ecd36828f16c9d60e9b021e927d02b26455321f66e5e749d24869cf7048a2ae0826e1cde3aff4d9317935ac5530b839edda502d94de01c2176b2d63b458514e9a7d9e0860e865ed0feb7c0f3758e6f15ad3588cc49e7ddaa8"}, &(0x7f0000000180)=0x70) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0xa7df, 0x30}, 0xc) [ 814.555628] IPVS: Unknown mcast interface: syzkaller1 13:02:37 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x8000, 0x8000, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x5, 0x7fffffff, 0x0, 0x0, 0x7, 0x4, 0x6, 0x1, 0x101, 0x1}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x800, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) pwrite64(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000100)={0x0, 0x8000, 0xffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000300)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 13:02:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x801, 0x1) geteuid() ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0xffffffffffffffff}, 0xff28) sendmmsg(r1, &(0x7f00000002c0), 0x1b0, 0xfef6) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) 13:02:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000200"}, 0x18) 13:02:38 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000ff8)={0x0, 0x989680}, &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x8}) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000080)={0x0, 0xffffffffffffff17}) 13:02:38 executing program 1: r0 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)="2f70726f632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e009b2834938d4bda35378f9b9d1de182cd81dcba7bdd0d208f40506aa720180466aa2c928f1d5e2899382f73e2025d3c5cb2", 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000200)={0x1, &(0x7f0000000440)=[{}]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x8001, 0x800000}, &(0x7f0000000400)=0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80807, 0xfffffffffffffffd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x2, 0x5, 0x0) getsockname$packet(r5, &(0x7f0000003580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000035c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000003600)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0x2f, &(0x7f0000000080)=""/251, 0x0, 0xffffffffffffffff, [], r7}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x890b, &(0x7f0000000000)) r8 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ff9000/0x4000)=nil) r9 = geteuid() getresgid(&(0x7f0000000340), &(0x7f0000000540)=0x0, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpid() r14 = getpid() shmctl$IPC_SET(r8, 0x1, &(0x7f00000008c0)={{0x6, r9, r10, r11, r12, 0x21, 0xffffffffffff7fff}, 0x400, 0x81f4, 0x3, 0x101, r13, r14, 0x6}) write$P9_RSTAT(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="d30000007d01000000cc000000000000000003000001000000000000040000000000000000006ffd7d2a9700cdb071ce90857321576b3b2e7a64e17ce8fe3a04c7b700f408dc6737fbd8d67e66bfdd4d1fe5089fab22cbf019e1abcdb284a8c48083290d7535dfad5f60fe1a1caf14105cc97483bfbdfcaeb4902da0730bea9d99f8cc3c47c84fbc15c580fb7ffaf5285c14281a4ccfcd9ccb912cc2e20e4ca8810f655760c56195afeeea5251e1135347f438d5fbce9fad34abb517c9fc4edc000000000045d60c326c0982f6505b66e5efa2cf8ebb5540b213379a4b25418e5c80a5ddf49406faac861138ab1d"], 0xee) r15 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x1) r16 = dup2(r15, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r13, r16, 0x0, 0x8, &(0x7f0000000500)="b42c75a1c0a56ee1", 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x1ff) kcmp(r17, r18, 0x5, r15, r16) write$FUSE_DIRENTPLUS(r16, &(0x7f0000000ac0)=ANY=[@ANYBLOB="48406e3cfc000000000031fbe48227109b4143afd343859f3851cda2a9d40a60f4620b926b7c8fd384f7cd83902e460cf327bff02f989273421f0bc3be9149f516ce5121c63aca13bd3c298dcbb35643bb46d7e239be833331a9709ee5c3f83354da1a31beb32fce0fbea1f1ce342ad0906f571d6a4a7ddd9f89019e3801fedb3eb9d6e6dca64f18d1f804820c348fb76f054feb"], 0x45) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x1, 0x4, 0x3, @tick=0x21, {0x3}, {}, @time=@tick=0x7}], 0x30) [ 814.745172] IPVS: Unknown mcast interface: syzkaller1 13:02:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f0000000400)) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x42, 0x0) setsockopt$inet_int(r3, 0x0, 0x13, &(0x7f0000000180)=0x8, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x200000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f00000003c0)) syz_kvm_setup_cpu$x86(r3, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000280)="b805000000b9070000000f01c1c401696508420f01bce009000000460f3048b8c26a0000000000000f23c80f21f835080020000f23f864470f1863d3c402292fb6fdffffffc4c1e17cd166baf80cb8081ee882ef66bafc0cb81c173c11efc463750c0bd1", 0x64}], 0x1, 0x44, &(0x7f0000000300)=[@cstype0], 0x1) mq_timedsend(r3, &(0x7f0000000080)="c65fe3adbdfd8697e04a89a0b9c62f457c8948d0a560e2c3cc69faa20261e4275269f1011897a374111b7eb6eca99cffc27f643c3a0a000d772705f14b6f52fc8e5e17aebd3c6ac00a3042e9cd92f76ab04e06003a6e3a1f2c404a9260f82724f2c737242b3f82273bf2e8bf4dfcdb43ecf30d01f60110359c971c9f2cb2888bd9274a3b0d229023c6baa0d185103429935e78252d4daf6f3264dcfded16fa8c52dc2c61", 0xa4, 0x9, &(0x7f0000000140)={0x77359400}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000240)={0x0, 0x2000000001, 0x2, 0x0}) setsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000000)=0x8, 0x4) 13:02:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x3, 0x0) [ 814.934683] IPVS: Unknown mcast interface: syzkaller1 13:02:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x3, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:38 executing program 1: r0 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)="2f70726f632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e009b2834938d4bda35378f9b9d1de182cd81dcba7bdd0d208f40506aa720180466aa2c928f1d5e2899382f73e2025d3c5cb2", 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000200)={0x1, &(0x7f0000000440)=[{}]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x8001, 0x800000}, &(0x7f0000000400)=0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80807, 0xfffffffffffffffd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x2, 0x5, 0x0) getsockname$packet(r5, &(0x7f0000003580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000035c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000003600)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0x2f, &(0x7f0000000080)=""/251, 0x0, 0xffffffffffffffff, [], r7}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x890b, &(0x7f0000000000)) r8 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ff9000/0x4000)=nil) r9 = geteuid() getresgid(&(0x7f0000000340), &(0x7f0000000540)=0x0, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpid() r14 = getpid() shmctl$IPC_SET(r8, 0x1, &(0x7f00000008c0)={{0x6, r9, r10, r11, r12, 0x21, 0xffffffffffff7fff}, 0x400, 0x81f4, 0x3, 0x101, r13, r14, 0x6}) write$P9_RSTAT(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="d30000007d01000000cc000000000000000003000001000000000000040000000000000000006ffd7d2a9700cdb071ce90857321576b3b2e7a64e17ce8fe3a04c7b700f408dc6737fbd8d67e66bfdd4d1fe5089fab22cbf019e1abcdb284a8c48083290d7535dfad5f60fe1a1caf14105cc97483bfbdfcaeb4902da0730bea9d99f8cc3c47c84fbc15c580fb7ffaf5285c14281a4ccfcd9ccb912cc2e20e4ca8810f655760c56195afeeea5251e1135347f438d5fbce9fad34abb517c9fc4edc000000000045d60c326c0982f6505b66e5efa2cf8ebb5540b213379a4b25418e5c80a5ddf49406faac861138ab1d"], 0xee) r15 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x1) r16 = dup2(r15, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r13, r16, 0x0, 0x8, &(0x7f0000000500)="b42c75a1c0a56ee1", 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x1ff) kcmp(r17, r18, 0x5, r15, r16) write$FUSE_DIRENTPLUS(r16, &(0x7f0000000ac0)=ANY=[@ANYBLOB="48406e3cfc000000000031fbe48227109b4143afd343859f3851cda2a9d40a60f4620b926b7c8fd384f7cd83902e460cf327bff02f989273421f0bc3be9149f516ce5121c63aca13bd3c298dcbb35643bb46d7e239be833331a9709ee5c3f83354da1a31beb32fce0fbea1f1ce342ad0906f571d6a4a7ddd9f89019e3801fedb3eb9d6e6dca64f18d1f804820c348fb76f054feb"], 0x45) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x1, 0x4, 0x3, @tick=0x21, {0x3}, {}, @time=@tick=0x7}], 0x30) 13:02:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00 \x00'}, 0x18) 13:02:38 executing program 5: r0 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)="2f70726f632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e009b2834938d4bda35378f9b9d1de182cd81dcba7bdd0d208f40506aa720180466aa2c928f1d5e2899382f73e2025d3c5cb2", 0x2, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000200)={0x1, &(0x7f0000000440)=[{}]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x8001, 0x800000}, &(0x7f0000000400)=0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80807, 0xfffffffffffffffd, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x2, 0x5, 0x0) getsockname$packet(r5, &(0x7f0000003580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000035c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000003600)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0x2f, &(0x7f0000000080)=""/251, 0x0, 0xffffffffffffffff, [], r7}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x890b, &(0x7f0000000000)) r8 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ff9000/0x4000)=nil) r9 = geteuid() getresgid(&(0x7f0000000340), &(0x7f0000000540)=0x0, &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(r2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpid() r14 = getpid() shmctl$IPC_SET(r8, 0x1, &(0x7f00000008c0)={{0x6, r9, r10, r11, r12, 0x21, 0xffffffffffff7fff}, 0x400, 0x81f4, 0x3, 0x101, r13, r14, 0x6}) write$P9_RSTAT(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="d30000007d01000000cc000000000000000003000001000000000000040000000000000000006ffd7d2a9700cdb071ce90857321576b3b2e7a64e17ce8fe3a04c7b700f408dc6737fbd8d67e66bfdd4d1fe5089fab22cbf019e1abcdb284a8c48083290d7535dfad5f60fe1a1caf14105cc97483bfbdfcaeb4902da0730bea9d99f8cc3c47c84fbc15c580fb7ffaf5285c14281a4ccfcd9ccb912cc2e20e4ca8810f655760c56195afeeea5251e1135347f438d5fbce9fad34abb517c9fc4edc000000000045d60c326c0982f6505b66e5efa2cf8ebb5540b213379a4b25418e5c80a5ddf49406faac861138ab1d"], 0xee) r15 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x1) r16 = dup2(r15, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r13, r16, 0x0, 0x8, &(0x7f0000000500)="b42c75a1c0a56ee1", 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x1ff) kcmp(r17, r18, 0x5, r15, r16) write$FUSE_DIRENTPLUS(r16, &(0x7f0000000ac0)=ANY=[@ANYBLOB="48406e3cfc000000000031fbe48227109b4143afd343859f3851cda2a9d40a60f4620b926b7c8fd384f7cd83902e460cf327bff02f989273421f0bc3be9149f516ce5121c63aca13bd3c298dcbb35643bb46d7e239be833331a9709ee5c3f83354da1a31beb32fce0fbea1f1ce342ad0906f571d6a4a7ddd9f89019e3801fedb3eb9d6e6dca64f18d1f804820c348fb76f054feb"], 0x45) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x1, 0x4, 0x3, @tick=0x21, {0x3}, {}, @time=@tick=0x7}], 0x30) [ 815.152416] IPVS: Unknown mcast interface: syzkaller1 [ 815.188304] IPVS: Unknown mcast interface: syzkaller1 13:02:38 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x8000, 0x8000, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x5, 0x7fffffff, 0x0, 0x0, 0x7, 0x4, 0x6, 0x1, 0x101, 0x1}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x800, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) pwrite64(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000100)={0x0, 0x8000, 0xffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000300)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 13:02:38 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f00000011c0)) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000027, 0xfeffffff00000000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000001c0)={r1}) 13:02:38 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f00000002c0), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xffffffc0, {0xffffffff00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000a00)=ANY=[@ANYBLOB="fa00000020e1deeb7acc00c5bdc8575eed878a8e75e292d546a1a7d47efd18cd5e15c79c484c6c154fc75c4c5cc976e396aedaf3624af1cb4019fe198624033c9e4f442eb74f75973e2c9447c8f2309f386988d90dcc6755757150e1a2bff740e375c37470fec1f1ee79bb1ae14aec26614e543f1bd1731773675c98014065dfaaaba04d92843112036c21687a9ebf02a8d54a06e290f1bd739ca942cda86e54a958a665b1152b993eb64640ca95601fdba920e317f048b6"], &(0x7f0000000940)=0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x100000000}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={r4, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000980)={0x0, 0x6}, &(0x7f00000009c0)=0x8) 13:02:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00`\x00'}, 0x18) 13:02:38 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xa00, 0x0) fanotify_init(0x4, 0x80000) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x6, {0x0, 0x7}}, 0x20) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r1, 0xffffffffffffffb2, &(0x7f0000000040)) close(r1) fcntl$getflags(0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002c00)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002b80)=[{{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/170, 0xaa}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/228, 0xe4}], 0x3, &(0x7f0000000500)=""/97, 0x61, 0x101}, 0xf0b}, {{&(0x7f0000000580)=@generic, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000600)=""/43, 0x2b}, {&(0x7f0000000640)=""/226, 0xe2}, {&(0x7f0000000740)=""/30, 0x1e}, {&(0x7f0000000780)=""/149, 0x95}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000001840)=""/181, 0xb5}, {&(0x7f0000001900)}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)=""/121, 0x79}], 0x9, &(0x7f0000001b80)=""/4096, 0x1000, 0x5}, 0x6d41}], 0x2, 0x2, &(0x7f0000002c40)={r3, r4+30000000}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000002c80)={r5, 0x1, 0x6, @dev={[], 0xa}}, 0x10) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x3, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x101080, 0x0) [ 815.443330] IPVS: Unknown mcast interface: syzkaller1 13:02:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x1000000000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000400"}, 0x18) 13:02:38 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x2100, 0x0) accept(0xffffffffffffffff, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x80) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={@ipv4={[], [], @local}, @loopback, @mcast1, 0x0, 0x3, 0x8, 0x500, 0x3fffffff80000, 0x0, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000000)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000040)=""/195}, 0x48) [ 815.674780] IPVS: Unknown mcast interface: syzkaller1 13:02:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x24, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:02:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 815.963391] IPVS: Unknown mcast interface: syzkaller1 13:02:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x2000000000011) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000000)={0x0, 0x7f, {0x3, 0x7, 0x3ff, 0x1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000000000) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000580), &(0x7f00000005c0)=0x4) vmsplice(r2, &(0x7f0000e79000), 0x1, 0xffffffffffffffff) mbind(&(0x7f0000405000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000180), 0x1, 0x3) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xf8, r3, 0x401, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1e36}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x79}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}]}]}, 0xf8}}, 0x4040041) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xd) io_setup(0x3a56, &(0x7f0000000040)=0x0) io_pgetevents(r4, 0x9d7c8cf6000000, 0x6, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x77359400}, &(0x7f0000000300)={&(0x7f00000002c0)={0x7f6}, 0x8}) mq_timedreceive(r1, &(0x7f00000000c0)=""/192, 0xc0, 0x8, 0x0) [ 816.182888] IPVS: Unknown mcast interface: syzkaller1 13:02:39 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x8000, 0x8000, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x5, 0x7fffffff, 0x0, 0x0, 0x7, 0x4, 0x6, 0x1, 0x101, 0x1}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x800, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) pwrite64(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000100)={0x0, 0x8000, 0xffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000300)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 13:02:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x40030000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02403162857170702d2ee9c188c61e5d1d0353abc20ab7bbbe7d61411f2c21") r1 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000006c80)={0x0, 0x0, &(0x7f0000006c40)={0x0}}, 0x0) preadv(r1, 0xfffffffffffffffe, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x18, 0x2d, 0x119, 0x0, 0x0, {0x4}, [@nested={0x4}]}, 0x18}}, 0x0) 13:02:39 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f00000002c0), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xffffffc0, {0xffffffff00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000a00)=ANY=[@ANYBLOB="fa00000020e1deeb7acc00c5bdc8575eed878a8e75e292d546a1a7d47efd18cd5e15c79c484c6c154fc75c4c5cc976e396aedaf3624af1cb4019fe198624033c9e4f442eb74f75973e2c9447c8f2309f386988d90dcc6755757150e1a2bff740e375c37470fec1f1ee79bb1ae14aec26614e543f1bd1731773675c98014065dfaaaba04d92843112036c21687a9ebf02a8d54a06e290f1bd739ca942cda86e54a958a665b1152b993eb64640ca95601fdba920e317f048b6"], &(0x7f0000000940)=0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x100000000}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={r4, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000980)={0x0, 0x6}, &(0x7f00000009c0)=0x8) [ 816.571095] IPVS: Unknown mcast interface: syzkaller1 13:02:39 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f00000002c0), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xffffffc0, {0xffffffff00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000a00)=ANY=[@ANYBLOB="fa00000020e1deeb7acc00c5bdc8575eed878a8e75e292d546a1a7d47efd18cd5e15c79c484c6c154fc75c4c5cc976e396aedaf3624af1cb4019fe198624033c9e4f442eb74f75973e2c9447c8f2309f386988d90dcc6755757150e1a2bff740e375c37470fec1f1ee79bb1ae14aec26614e543f1bd1731773675c98014065dfaaaba04d92843112036c21687a9ebf02a8d54a06e290f1bd739ca942cda86e54a958a665b1152b993eb64640ca95601fdba920e317f048b6"], &(0x7f0000000940)=0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x100000000}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={r4, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000980)={0x0, 0x6}, &(0x7f00000009c0)=0x8) 13:02:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:39 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f00000002c0), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xffffffc0, {0xffffffff00000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) setns(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000a00)=ANY=[@ANYBLOB="fa00000020e1deeb7acc00c5bdc8575eed878a8e75e292d546a1a7d47efd18cd5e15c79c484c6c154fc75c4c5cc976e396aedaf3624af1cb4019fe198624033c9e4f442eb74f75973e2c9447c8f2309f386988d90dcc6755757150e1a2bff740e375c37470fec1f1ee79bb1ae14aec26614e543f1bd1731773675c98014065dfaaaba04d92843112036c21687a9ebf02a8d54a06e290f1bd739ca942cda86e54a958a665b1152b993eb64640ca95601fdba920e317f048b6"], &(0x7f0000000940)=0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x7fff, @dev={0xfe, 0x80, [], 0x11}, 0x100000000}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={r4, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000980)={0x0, 0x6}, &(0x7f00000009c0)=0x8) [ 816.725910] IPVS: Unknown mcast interface: syzkaller1 13:02:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 817.063590] IPVS: Unknown mcast interface: syzkaller1 13:02:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x1000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 817.336087] IPVS: Unknown mcast interface: syzkaller1 13:02:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00?\x00'}, 0x18) [ 817.589631] IPVS: Unknown mcast interface: syzkaller1 13:02:40 executing program 2: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x8000, 0x8000, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x10f, 0x0, &(0x7f00000004c0), 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x7, 0x5, 0xb3c, 0x4c, 0x5, 0x7fffffff, 0x0, 0x0, 0x7, 0x4, 0x6, 0x1, 0x101, 0x1}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x800, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) pwrite64(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000100)={0x0, 0x8000, 0xffff}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000300)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) 13:02:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @remote, 0x6}}}, 0x80) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x40000000000001, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="025cc80700") mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000480)={0x0, 0x0, 0x1, 0x8}, &(0x7f00000004c0)=0x10) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="29000000040000000000000000000000010000000000000000000000000000190000000000000000"], 0x29) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4c000000, 0x10a000d04) 13:02:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f7570002a9a7febcd9969e64de045c1113407f7deca89cf52ac59de23bcdeccd0d96d89e0f7ef80b66bd2ac7586ad86c097724911b5e6293f64c8679f", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1000000000009) 13:02:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x200000020, 0xffffffffffffff29) 13:02:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000300"}, 0x18) [ 817.730397] IPVS: Unknown mcast interface: syzkaller1 13:02:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:41 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xc53a, 0x101000) recvmsg(r1, &(0x7f0000000580)={&(0x7f0000000100), 0x58, &(0x7f0000000980)=[{&(0x7f00000005c0)=""/236}, {&(0x7f00000006c0)=""/7}, {&(0x7f0000000700)=""/218}, {&(0x7f0000000800)=""/242}, {&(0x7f0000000900)=""/115}], 0x0, &(0x7f00000004c0)=""/185, 0xb9, 0x3}, 0x9fda7d0c504ddc4c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) socketpair(0x3, 0x807, 0x3, &(0x7f00000002c0)) waitid(0x1, r2, 0x0, 0x4, &(0x7f0000000200)) r3 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) [ 817.799883] IPVS: Unknown mcast interface: syzkaller1 13:02:41 executing program 1: r0 = memfd_create(&(0x7f0000000480)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x4) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000300)={0x1, &(0x7f0000000200)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f00000003c0)={r1, 0x20}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) mmap$binder(&(0x7f0000e0c000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000640)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={r0, 0x0, 0x6, 0x1, 0x7}) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000100)=0x7) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x13, r0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000240)=""/154) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="660f3828bf0080dce12664670f013e66b9f609000066b8d41a4d4366ba000000000f300f019800007fbe0f013b66b9c70b000066b80060000066ba000000000f30b200f086b8ee00", 0x48}], 0xaaaaaaaaaaaad1b, 0x0, &(0x7f00000000c0)=[@cr0={0x0, 0x40000000}, @dstype3={0x7, 0xd}], 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') 13:02:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @remote, 0x6}}}, 0x80) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x40000000000001, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="025cc80700") mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000480)={0x0, 0x0, 0x1, 0x8}, &(0x7f00000004c0)=0x10) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="29000000040000000000000000000000010000000000000000000000000000190000000000000000"], 0x29) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4c000000, 0x10a000d04) [ 817.906370] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 817.926703] netlink: 'syz-executor0': attribute type 29 has an invalid length. 13:02:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xc0000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 817.961450] netlink: 'syz-executor0': attribute type 29 has an invalid length. 13:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @remote, 0x6}}}, 0x80) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x40000000000001, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="025cc80700") mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000480)={0x0, 0x0, 0x1, 0x8}, &(0x7f00000004c0)=0x10) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="29000000040000000000000000000000010000000000000000000000000000190000000000000000"], 0x29) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4c000000, 0x10a000d04) [ 818.028383] IPVS: Unknown mcast interface: syzkaller1 13:02:41 executing program 2: accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x400000) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xfdef, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaa0000700000000000019045ac1414bbac1414110304907800000000450000000000000000890000ac1414aaac1414fd444000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000000002c712363ad5d1418f682a21739bfa1e33a42e1d2f8b4e72bd9541cc1e9982af642bb4e7d0d305e7992340953bbb2a58b8382b2fe3362c976f79ea7463507ffc8829aa520aba34ec6084887fb2fa50d0983d8725ed252d59556ea11c332c43948f6a65aeaf15f3269b0d502a5e4445500000000000000000000"], &(0x7f0000000100)) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000040)=0x101) 13:02:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) getpeername(r1, &(0x7f0000000240)=@hci={0x1f, 0x0}, &(0x7f0000000300)=0x80) sendmsg$nl_route(r2, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x1, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, 0x46000, 0x900}, [@IFLA_OPERSTATE={0x8, 0x10, 0x100}, @IFLA_PROMISCUITY={0x8, 0x1e, 0x3}, @IFLA_PROMISCUITY={0x8}, @IFLA_GROUP={0x8, 0x1b, 0xf7d}, @IFLA_AF_SPEC={0x14, 0x1a, [{0x4, 0x7}, {0x4}, {0x4, 0x7}, {0x4, 0x1e}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4004) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, &(0x7f00000002c0)) r4 = accept$alg(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x7a9, &(0x7f0000000080)=0x0) io_submit(r5, 0x5, &(0x7f0000000780)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000440)="b392b2cf7b3906c09e91c7f10e718d9d3868385e88ea371b816c3a4d437fcc085176f8fbdbe5050f50be25a1495ee36307bfb1f43d8134a56d1957f5c074bd99fea331d22abf41b80f29c0f9c7cffcdadbbb9e3e298b210730e0985ded465db94a67672e872d58e8fab6ac002d84fa17ae33ac88297ed743b4bef42f00f9eb74ef5f667fdb05dc3537879dede461a52adff16b9fae3080aa3fd0284f9c0e0b2159c056554e44bc545cfc7e1ec138b683ca085efe5204edfbce2894e067c4813b781e3bc414de66b65b65003acfdcbccc8c3ff6ef2b364e3972fe9e55e347d959484aad5b38109b9106ba", 0xea, 0x5, 0x0, 0x3, r2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x9, 0x0, r1, &(0x7f0000000540)="d24928b67961b68b070b5ef476f18697de00ddd93136e0005d78ccc234406c17b29032617c7991fb61fcc95aa8aff1d7521f9dc60c3360934b619dc865dc3803ace01fba222a0517d0433d28fe50f41a1b2c48f0679dbdbf51080e2b3b111b4ac1db67014fce678cb1f8f083b428", 0x6e, 0x800, 0x0, 0x2}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x7f, r2, &(0x7f00000005c0)="d349781405da89ca51a34a0829b7", 0xe, 0xe481, 0x0, 0x2, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0xc8d, r1, &(0x7f0000000640)="37fb6e9245", 0x5, 0x7fff, 0x0, 0x2, r2}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f00000006c0)="ab04730be2fec2031b7545cc9cfd5d8889b79c65a31d466d446262a82c034dc1bb1e5530e4fdc2aab6833a3dd413c5f741149a388d617e86ec00a05196685808628bb61ded95269dac2a", 0x4a, 0x1bf863b5}]) recvmmsg(r4, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x0, 0x0, 0xffefffffffffffff}}) 13:02:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="66696c74657200000000000000020000000000000000000000000000000000000e00000004000000d800b0010000b001000000009802000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x338) r1 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x80000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x59, "920c04909c85fa6ec0ccdf03f021bdf8865739b536ff807b82307d14223867208dccace70406e82399d46ef1655a2175b66cacd20f048f930b9129debe8121daab06cdf8d64c04ae3de62da6be23ffd19ca475bc658290ce12"}, &(0x7f0000000280)=0x61) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x5, 0x8981, 0xcce, 0x7, 0x5aa0000000000, 0x0, 0x100000000, {r3, @in={{0x2, 0x4e20, @broadcast}}, 0x800, 0x40, 0x44, 0x97, 0x3}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 13:02:41 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000140)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003ec0)="f89c378bf75ce692b177", 0xa}], 0x1}, 0x8000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000280)={0x33, @multicast2, 0x4e23, 0x3, 'sed\x00', 0x0, 0xbb, 0x1c}, 0x2c) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)='.\x00', 0x2}], 0x1}, 0x0) 13:02:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf00, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 818.624864] IPVS: set_ctl: invalid protocol: 51 224.0.0.2:20003 [ 818.652282] IPVS: Unknown mcast interface: syzkaller1 13:02:41 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x3, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000001c0)=0x400000000003) 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c657231000000000600"}, 0x18) [ 818.670057] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! [ 818.686481] IPVS: set_ctl: invalid protocol: 51 224.0.0.2:20003 13:02:42 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x8, 0x4, @tid=r1}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000480)={0xfffff7fffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000400)=""/128, 0xfffffcee) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setresuid(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x400000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc00}], 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) [ 818.729276] IPVS: Unknown mcast interface: syzkaller1 13:02:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x81, "51d704dcb9c641028ba9c980589ffb45aa89238f98755f5fca8de3b97847c94272b7074142daca2ef4a51852d826bf74816991f6a75668fcc92eb925b0c34df88b32c7e373380eccaa85a52c5fe94752423c94832690b1594c0f78c5645ec9340034f7230e4c02f9035bbc800c7bce8372811119058f642ccb9739f59661ed6d4a"}, &(0x7f00000000c0)=0x89) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1}, 0x8) unshare(0x8000400) r2 = socket$inet6_udp(0xa, 0x2, 0x0) pwritev(r2, 0x0, 0x0, 0x0) 13:02:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@text64={0x40, &(0x7f0000000500)="670f01c92e0fc71ed140060f01cfdbe2f2dbc4b9d70a00000f32f0fe0c38c482e9a8720042de490f", 0x28}], 0x1, 0x70, 0x0, 0x0) add_key(&(0x7f0000000000)="99", 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket(0x5, 0x80000, 0x88f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r4 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000140), &(0x7f00000002c0), &(0x7f0000000300)=0x0) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000340)={0xa0, 0xfffffffffffffffe, 0x1, {{0x3, 0x2, 0xffffffff, 0x3f, 0x4, 0xa000000000, {0x3, 0x0, 0x7, 0x3, 0x8, 0x7f, 0x2, 0x5ab5ed57, 0x6, 0x4, 0x0, r5, r6, 0x6, 0xb84}}, {0x0, 0x1}}}, 0xa0) 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\x00\a\x00'}, 0x18) 13:02:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) r1 = getpid() tkill(r1, 0x22) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x40, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)) keyctl$session_to_parent(0x12) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21}, 0x10) timer_create(0x3, &(0x7f00000000c0)={0x0, 0x10, 0x3, @tid=r1}, &(0x7f0000000100)=0x0) timer_getoverrun(r4) [ 818.862726] IPVS: Unknown mcast interface: syzkaller1 13:02:42 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x8, 0x4, @tid=r1}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000480)={0xfffff7fffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000400)=""/128, 0xfffffcee) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) setresuid(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x400000, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x1ffc00}], 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) 13:02:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in6=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000003, 0x1000000000000001) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x2, "68c862a021d5b096"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x101ff, 0x3, 0xf000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) renameat(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) ioctl$FS_IOC_FSGETXATTR(r1, 0xc00c5512, 0x0) 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00\a\x00'}, 0x18) 13:02:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x7ff, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0x0, 0x100, 0x4, [], &(0x7f0000000200)={0x0, 0x0, [], @value=0x6}}) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000640), r1}}, 0x18) r2 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x2d, "b2d4163eee93b3dfc1412581cb65e8328b650a9f406fed9811419c95cabac0912f8f577026fe971730859d46d0"}, &(0x7f0000000480)=0x35) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000004c0)={r4, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}}, 0x84) write$cgroup_pid(r3, &(0x7f0000000380), 0x12) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x2, 0x9) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x14b}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000300)={r6, 0x92}, 0x8) read(r5, &(0x7f0000000400)=""/100, 0x64) pipe(&(0x7f00000000c0)) [ 819.046504] IPVS: Unknown mcast interface: syzkaller1 13:02:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xfffffff0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x100000004e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000003a00), 0x3a1, 0x0, 0x0) 13:02:42 executing program 0: r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x9, &(0x7f0000000380)) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000100)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x100000000, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x9, 0x8) ioctl(r4, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r5 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x1e, 0x805, 0x0) capset(&(0x7f0000000580)={0x20071026}, &(0x7f00000005c0)={0x0, 0x0, 0x100000000000}) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r8, 0x0, 0x61, 0x0, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) close(r7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @empty}}, 0x20) getresuid(&(0x7f0000000140), &(0x7f0000000600), &(0x7f0000000640)) 13:02:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x81}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") socket$inet_sctp(0x2, 0x5, 0x84) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000140)={0x400, 0xf13, 0x6}) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e20, 0x7, @mcast1, 0x401}, @in6={0xa, 0x4e20, 0xfffffffffffffffc, @mcast1, 0x10000}, @in6={0xa, 0x4e20, 0x3ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x100000001}, @in6={0xa, 0x4e23, 0x7ff, @loopback, 0x4}], 0x70) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x5a, 0x8000042001) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000140)=0x6) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) capset(&(0x7f00000001c0), &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f00000007c0)={0x5, 0x3, @stop_pts=0x3ff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00'}, 0x10) 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:42 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000bc80128000000000000000000000000000000000000070000000000000000000000000000000000000000009848101f790625d9cf3957362c970bb20ab9a704b0a5c71fff31c3c8fe614af1d06c6271432ed47d003ec83f36ff5bb86595e1a813b05f03ce63287d6c7db1a9b0"]) r1 = getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setparam(r1, &(0x7f0000000380)=0xc470) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000580)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x105202, 0x0) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f00000005c0)=""/207) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000480)={0x1ff, 0x4, 0x1, 0x9, 0x1, [{0x0, 0x3, 0x0, 0x0, 0x0, 0x800}]}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000000)=r1) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) sendfile(r6, r6, &(0x7f0000000340)=0xf00, 0x5) creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000240)=r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), 0xfed3) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x50102, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) [ 819.237946] IPVS: Unknown mcast interface: syzkaller1 [ 819.241893] Unknown ioctl -1069001119 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 819.284896] Unknown ioctl -1069001119 13:02:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0x3, @remote, 0x9}}, [0x5, 0x3, 0x1, 0x6, 0xff, 0x401, 0x5, 0x9, 0x6, 0xffffffffffffff81, 0x1f, 0x10001, 0x8, 0x3, 0x4]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={r2, 0xbf, "43525721b18e4e8e777acba75ab16b391580c9f324590d686c0b2a98aa6cab02fc96a37844be425059d076d90266cb5083252c2d619b275609f74a2032bfb563ae52063b8eda73b4dc052e9f3315cbb3c5e10f8aeb720b4b333e28e2daf81e328c0c2216ca6b635451de0d4f0a70e39ac19779aaefde1ddcbc54ca3e11af91d79f1f2e110a33a8ded274ef9302615e1633f2a78d347f00dd26bc68ece9819689b75d03dda1673edb039542f822eda53207d309eda0f79cc4a904b3041f619e"}, &(0x7f0000000140)=0xc7) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"7465616d3000fdffffffc000", 0xc201}) socket$inet6_udp(0xa, 0x2, 0x0) 13:02:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x8fc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x871, 0x0, 0x0, 0x6, 0x101, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0xddb, 0x0, 0x0, 0x0, 0x0, 0x20, 0x100000001, 0x4, 0x100000001, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) gettid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f00000000c0)={@multicast2, @loopback, @multicast1}, &(0x7f0000000100)=0xc) ioctl$RTC_AIE_OFF(r1, 0x7002) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 819.372864] IPVS: Unknown mcast interface: syzkaller1 13:02:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:42 executing program 0: r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x9, &(0x7f0000000380)) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000100)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x100000000, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x9, 0x8) ioctl(r4, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r5 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x1e, 0x805, 0x0) capset(&(0x7f0000000580)={0x20071026}, &(0x7f00000005c0)={0x0, 0x0, 0x100000000000}) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r8, 0x0, 0x61, 0x0, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) close(r7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @empty}}, 0x20) getresuid(&(0x7f0000000140), &(0x7f0000000600), &(0x7f0000000640)) 13:02:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x8fc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x871, 0x0, 0x0, 0x6, 0x101, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0xddb, 0x0, 0x0, 0x0, 0x0, 0x20, 0x100000001, 0x4, 0x100000001, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) gettid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x2d, &(0x7f00000000c0)={@multicast2, @loopback, @multicast1}, &(0x7f0000000100)=0xc) ioctl$RTC_AIE_OFF(r1, 0x7002) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 820.047211] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 820.054028] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 820.069450] 8021q: adding VLAN 0 to HW filter on device team0 [ 820.075960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 820.083647] IPVS: Unknown mcast interface: syzkaller1 13:02:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 820.126712] IPVS: Unknown mcast interface: syzkaller1 [ 820.144557] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:02:43 executing program 0: r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)={0x0, 0x7fc}) io_setup(0x9, &(0x7f0000000380)) io_destroy(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000100)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x20, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x100000000, 0x0, 0x8, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x9, 0x8) ioctl(r4, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r5 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x1e, 0x805, 0x0) capset(&(0x7f0000000580)={0x20071026}, &(0x7f00000005c0)={0x0, 0x0, 0x100000000000}) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r8, 0x0, 0x61, 0x0, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0x94) close(r7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @empty}}, 0x20) getresuid(&(0x7f0000000140), &(0x7f0000000600), &(0x7f0000000640)) 13:02:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfff, 0x2000) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000002400)={0x0, 0x0, 0x18cb, {0xd000, 0x0, 0x3}, [], "cbfc8372ba3d8774c05e5deb7b657d373c120e726c33a34f9fc26bf3b5bd18b7d9db28ec4b92944404bd037d783784d23a56945c8bb17490f2da20859a6ff57ab182361a7b4c1c2ece9de572ec90e2e6ef61b3fc55ea58aebe96d2f4bd4346cf334b4aa062cb1e12631781005a6911fcd3b48f118e52bf908ab9cc819218bc7714ad61da608c138f22cf163f4a51fb3731bf33a389913fa06ba0155d4861b2a2717ccaf3ced9e1bdef67dbb792c399e1f969dac39467ddb96c5caa583fac00b63ca80b69595e377718422f4790d7b3aec377184a81a9a5f9cab009af975f3f4f156b50d1136b7dd5fed96213471bf231d01b15a87e5946166a7a86bb8ca53ea9385a4c72c490db1098ab49d91c9224026aa5a46be3fbf0951dc8590e77a75ad4509424d16f7c154c83d87f23a482661b737128fb4eb776184fe751349c1d971ec0a0012f354718eeee4d519e08400f80d9c08e168cd716f7e9a2de8a4e4093b2138fd533b879b0c5fdf162f7e17eda66a9a389acd62d3da60b8cd406dfa020e5de310bdebba84dfb08c91f35774447a4080e7d0aa7c85268ed988c011527bd8478cf42cb25a2f9ea619b2b9469cf9f569227ee36df768c223c4bdd01731407c41e31588b3edda83e5a9f6345337e2247d472b556c2dddae7c5cada65b56b32019109a71d42b889ce567d6d9d6da3eea5b17a79cdbbd2c13ecbea027667772d04753b758f8b2a856a2694da3e5be5b4f672443a991620cbbe1fc4845c8b2b3ed82c16c161566bb163db990a4af094315561f5e90bea11fffea169d629f74a5497f3f79c50e6b5cd900db334353c4b2804bc9bb32dedbf3b2e26fbd8504a5b08db7c5c324954144bd655468e59efcb78cfc4210141665bc9508768e518b5f935b442d28fd53e6a7142630e094d3d64725a3b738e978f2f393fd5284eb9a56dbef9263f28f956c3f62005d20b7892f70eade62ccb97b67d50b880338fe9d8af9ed3a1dcc75002fd89ef39bd4c386b8511da79ad42e7defd6d33f82721f65deff637f4354c15e3d66dfcb6db0a24b6b0a363c0c4ac30af8258f46e6bdbb6ff1f4560227c6e47a79c8fb0a6a7a1953a0059276d50ff09f769e3f2c7d0ec1aeb5b9cf09e7dae94f84e97e4004e0c14333fd901504561430afc657c13e548a1aa2fe447c0b1c6fd7667e6fdd7037c1d44e97c25b208a01aa92ccb370b946ec1db7bf5615f090e77bdc9cfd3da6fd5f5e26f5d738020c8164444a9699fae55060149a0c864e8f271be7ca74c29078c8a9a1c15a8256bcdde8cb482c129b543a66bd58332fb3da3c4dea81e278d27c756f9b5ed98b9b556b5d06cbbe0c3e35d59b925aa213cbc5f831167434da9e32b7167b31648762b889d7e40a4947c0ec42cd88b6aef0c858cfd902bf876fc175d993aa593fe46713ff4de353e5a9543dd204c74351b320390d1d2a86cb98f9a0044859e75d88810b24dbe33bfcbfc84a815aa41c57758c6db3de79fa73e922b161f990ea2706354d47071d2355cafdab3c18065406b0af762a4fb93cabbfa8082b54599d596c2397f81cf37a6b2e8da7ae39472eef16028972b452f97f1cce6d2c9a6907168a599a224988987ee985ecb602121488a8a42811f82f6a88502a9f9469b339f01bd4ef3dc82bd7b49b5ff3084d4eeb309a0c1bbb49359458f745eeb7ff293da40ceae6a90831ad64423657712b102906af5ecfeaac91c431027523d4d2531f56e433efec6dfdab7cbb68efbe16b9c67591a0600c708f08208a3865b02904ae6a5629b1c1c2dc96ace9f4bd10206f99eba3d6e6a96b7d556432da0bc6f175a211b48fe9a464f2260eded1f84d9f4247117b44f61b44b4723f88948bc139abb1c3e259aadb93b55d3a065b321730f8f4696a6af69b747dfcfec38b9fe6a7223c80130b727122654883927d53781d48bf9f7123081261d5fe84c598a6fb5e4ed995c415f328e9429225fc2b901be25438110e5532e9b732f6d873da573fea0fa2298cfeb868c1be872bb6a4a4ba4767f7a5fb3834b6a4469bb534d321c746e5013661140dc65e05e915124e320c7fae8f53949dc26275952eeb1b4f85b5a810f76118abd0343ef7386e2bf7c593f97c5f9595735afbc438727e0d2431895fd80458cc4e8e48d7c8bb1acbee62cc6d7147de2e2055ffbc44bf1f8f566a2cbb8f491586f93243b0273b51a278bfa7595c27c5ed8a781abae936f0ad01890ec8c0b6ce7423dede0f4efdc9f074d75949f04aa28c3b1983de434cbcfb8c34d5c19a38e8c08e6a447ec853a643015d94bdfa73ffb04c089faba920d17d4281abc1f4a638108c57d3f5adc2ae5d0019f19f7a965f1221d9d192e3c67b48ad8d99bccc7b4e464bac4a06ea88c1c61f166f364e0662d9032908120e6a46d3ced00913d4b153c9933051ba2ea1ba32dc816b1e75c42748ea96b219578505e37f6adc6576c509ad2ec01bfb1e14187107f597c7bc99a00530bdd863997f9888bb9c3f47236c6b7a84b123179bed1dde002c7ed84b089e64e809c77e7c11b260aa9661e5ab1544c914d96e3159b90145e6d7853ce485e86456e3eee584683dc6d65d91fa78a31bf9cd66e6086655f2699cbf9fb89f36486ed4304f6d077f87f25624f05df86aa0dc3e0cdc5064f036a1a8ac65355b75dccfa737c5b1c43c96804ec84f1a501c387f99e07d81c1b7ffa3758010ee1916118d16a79c8867dd5b42e8c153ad413e88a8ccfd6d96e02dccd68ab4ce82a125e5a94ce710b7f3d94c4d6605bd8172de196e5b844b6d5a81fcb42736ed41c3643286c1b5a237a8a37742e9d7efa9f80b884d4c038004ab7d7121739b4d20ad87d36ee018774ee1e687f2c837ef9779e6269ecd998f96eac5363d3d75d3973ec967a3bf3b6569a34111e10fc77363e98169b262ae57dd679133f092a7061064fea9d29b875f036034c440cb9c8f9634459e84448b22e61de284359c6a570e4a0e489f44b92b2e7ae463169b261f67cce80286fd2d081818223b6665229271a5d688d1323db9211f747f8d1bc567e48e710cd601eae7fcfd25df1f3ff6219b3225f9b2f7b4ab66c8c265012c7448d194d78a356bf4a6eb8621cdc02a321b53e7f3cac3b240dba0e3ad19590b508668bb99e664038165e91b9a1c4d9afab3b805628e6576eb2ff49e3c0f3f35d308e1e7fb74cedea5ab400a46f0776cdb675a40472dba171d9673cb16b62ebf0d4819abebde1f0b2a1f51d7a3bc9709276e2d9ddccf29c7d5bb8df121a8f50d3689a85892830ad400e5841b5d83fe726ae5e93800ca544924b7bf526d74b36b6f1c8ce57eabd8a2b7726d1778a5dc3653544c2fd45adf422ceecc65a67b4fc1cbb17a7ab588cd4077c0c70b88c2634319fe5a706b5cea90b49b8439ca82e60cc7183d96eaaf9daa906f02da10ca566491024c6a66d553c9e0c07c552aeca57cd1e09a4e5e1fb729ddcd11bcbb2bf1b0cc3cd817dd466e65ab51be6b1e2423f51a9003be98c008c09ea140a11a5ec1f56095d1ee98599d9bc9433a15a22a6b15da1513c44dd22855e47cf1bc9ddf74cf56b111f809889b667b3e131d5599e948c088b898d8efeaa774b4869197fd40d38d8ff94f81951b061bd2033b23e112acc6b8d10bb74b1abe0333160fedd5d03bfa885d0c9b1954b086389e3782a06dc65214edf4b05e0657d939632cd39ee84eb89fca14b8dd8be119f664439f6b6e0425fade2256732868c1b3c9919be3a8b59562f033e2693808a5d174182d79c23ac67dd7ebea1dbf98f881f3256dbb259d12e78d3c40cd3b1509a3cf47ae6185f2e437469208fb29eeecd6ee5ed960891fc3e02aa886ed647044fc48062fd1c717c03409c01a64338b7dc369d096848956879c35ea4779f23679cfc0c520a76a975d451442eb7e5b8883c6305fe4c15a5147755739cdf0c9dd015b35b4119f0bf9082855e9823ee4800d66c444eb25b41b542470ac539ca23b83259823bae1089169e64b8335f5a8ac6bf4fdad47718c0d507ebe438a2cb205ee07d1421f2d1ba334ec70588159e7fa6bc632e537fa1d492dbc6525126a6523fe4cf489e2f24df586c23ba5e2d7d8a5f07bde07f0367495725398aaf1803afe145fb4fb3a90f0ef4f3dcb82c6ed4d48fe39fcd19c2bfc3d20bfa5e8a63e66e440a7e4609a111694b99fccfbd8296fe28766bb47ed8aa7e95720672afce84d46ddb93c94ca192244d13e5ae021543ddc311c07c0c89324d1162aa4652d0504e82701fd34537c81506ec5231089d52492958ca9e18f870bfba9a9bf8b283f484c58f01b6b4c9a3e3c31d1b3a549752a979a2307f0e0135fd825e040333fe0a49fd1bbc1d2790f2adeab67e3097c5c6d30ecc3c6b2728ce669274bc4e3ecc38171ef961aafc7b28766226442fc15b272a672dfb47f2183ec625446d479d11cb063288ed3987f1142edc1e6453e150d11e9d884ee9c7723d5db757001bd4b0dddf48803b6f1f902d33b4e535f5ff61c3e4e312a6fa2d10accfb779c4a56ac2badc3818c617f8209e25e420ea46636bc96301db3c4b7ff825fcf2473a475c9541a89e8ebba5ab35b8ecde42552bd9e15411f0aa74ac87872deb7b7c1724d49695ce3bdb524354a9acdeb5eee068e82ec9dfd7a2a275aff89099437ebf173edc4fa2e3664c458431579e032e03bc886522e3513375ee4cbc5ba021c6c8a4a82bde56f93d22937c2b73b200c3fb05aa7637c22534b8c5856f255b26ad1422a737e92d700ad88f759ed1433be4b8eb052485c15382fe60f612203dedb79ae00fcdf9f73f1a893d60e3d7cf49aaa3066b8b5accdc9fcc3cece232c97023282a8cab738951f70a8998d7fb53fc1c0f347a2e3aa49f975a0fe63751033ba0c96e97ca8122c46127c7ecfecadf1d7e7e4cbb094261989c46199799f43100ab733b6d0abe0948d123da7ba4d77e6915019975da20a0b05c6f3ba8127e0f1117cd0543dc913656ebf92755979621df57354493a86a24b1daa86c05146d7feab04d6bcbcf9c0ee956e8ac17c061db33404d7c99d5da78184f1acb1d2eb0ec1109a0b38a0d3a8fbee5fdc290dfe0a8b40775cbb9eb08a268baba2f1caf788414aa094dd5fac5b9334407fefd4d842c4779df1dc0f98013863aa8f187e55e8cded7dc6b6efaa84a505438b22a9af5e45b09f2ef78617773997099983f96e05a2e4daed70476d557e798bcf3ccde8f1c80ef54c0ef537f81568e6232b1663e8ec7b96a4e00b345599d0041578a0faeb42a80d08ac9bef4e850c0a819e02ac5f0248bc51b5e870f75e986d5cd0aabc8d14f65fe548c3f285c9196bbea4db8028fd56a31d54952b96921ebcb8fccd64633f4470ccc6606c17549fde5263702664d9ba3fda0064e84a23d77f2a08ca339519fd4f7b0d795339ee926a267a43cbd53226e87aa12da7e7907d3f4c500d51a8e2f66347a95df1e2a3932918449bdcb5c25cb2b49624fb9447dbafd0fd9c98e2e72f513f27b9ed99d5bd6bab6f68ee7c8aa07901ef90f9b6479d27f2c23de8461bae19465d090ddfa7ec543856f853a17ab23ae9a1a56b871b1bc0316c3b248e01d2953584d3c39fa8ca05e4163f23ab6ca9511fbf7d881ef8c2f1dd7d083aa7a7280a47072867498db9c603869ab4c9b6bc460e058c3b63403dafe09fcb7f90f9bc89131a7b953ec14b6c2c2b03d7538f4788f8b0000c979539c2053c2490cfeabe59eac0384f658017cfbb2c71dda82d4beb5a397e82985d770c4d22502e183cc19f0b9a948af1d3e8391893a81d439fd121065ba959e", "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"}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000140)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000280)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf23618dfdd331fcacfeccdb938974f48d420c49e5b37f94bdb651b9c102659034f4192f67abc0308b7f0c863da4efb5716ceba8b2417f5b7525bc82432b3c37efb07b494060a132069bda3e76471d360c4b58847baf4db198356ddb5b4ee3452f01f836df285cb3bd93bd0c8f6662650d7deabf55c1f50128145330111243") sendfile(r4, r6, 0x0, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 820.621327] 8021q: adding VLAN 0 to HW filter on device team0 [ 820.629407] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:02:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x8000000000) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x98) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x85, 0x40) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x3, 0x20000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000002c0)=0x1, 0x4) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x6) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000180)={0xfff}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000000c0)={'vlan0\x00', @dev={[], 0x18}}) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000100)=0x7) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0), 0x1, &(0x7f0000000340)=""/20, 0xffffffffffffff8a}, 0xff) [ 820.888527] IPVS: Unknown mcast interface: syzkaller1 [ 820.897337] IPVS: Unknown mcast interface: syzkaller1 13:02:44 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000bc80128000000000000000000000000000000000000070000000000000000000000000000000000000000009848101f790625d9cf3957362c970bb20ab9a704b0a5c71fff31c3c8fe614af1d06c6271432ed47d003ec83f36ff5bb86595e1a813b05f03ce63287d6c7db1a9b0"]) r1 = getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setparam(r1, &(0x7f0000000380)=0xc470) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000580)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x105202, 0x0) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f00000005c0)=""/207) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000480)={0x1ff, 0x4, 0x1, 0x9, 0x1, [{0x0, 0x3, 0x0, 0x0, 0x0, 0x800}]}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000000)=r1) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x7, 0x21, 0x2}, 0x7) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) sendfile(r6, r6, &(0x7f0000000340)=0xf00, 0x5) creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000240)=r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), 0xfed3) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x50102, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 13:02:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(r0, 0x20000000008912, &(0x7f0000000140)="f1ff2d02402b6285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=ANY=[], 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xe03f0300, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:44 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x6, "2a37515db3637373198f28619cbe3e3663c59ebf11065de76d566a4215646aea", 0x0, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0x8008551c, 0x80ab00) [ 821.031775] IPVS: Unknown mcast interface: syzkaller1 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000600"}, 0x18) [ 821.054084] tls_set_device_offload: netdev not found 13:02:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0x40045542, &(0x7f00000002c0)={0x202, 0x7, 0x10000000000000, 0x0, 0x0, [], [], [], 0xfffffffffffffffe, 0xfffffffffffffff8}) syz_open_dev$dmmidi(0x0, 0x200, 0x0) r2 = semget(0xffffffffffffffff, 0x65d2b6a9bb02487e, 0x100) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f0000000180)=""/229) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x20, 0x0) timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(0x0, 0x1000000000016) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100000001, 0x1) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) r5 = socket$inet(0x2, 0x0, 0x0) write$evdev(r4, &(0x7f0000000580)=[{{0x0, 0x7530}, 0x1f, 0x8}, {{}, 0x5, 0x7ff, 0xa}], 0x30) ppoll(&(0x7f00000000c0)=[{r5, 0x4400}], 0x1, &(0x7f0000000480), 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000004c0)={0x7, 0x70, 0x4, 0x81, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x14d4b86f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1ff, 0x0, 0x200, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x6}) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, &(0x7f0000000040)) sysfs$3(0x3) close(r4) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000009c0)=""/119, 0x77, 0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 13:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000001c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x10102, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000003080)=ANY=[@ANYBLOB="14000000e9c910e9a962919d7778e0926233c4a0"], 0x14}}, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7000000000000000, 0x10000) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0xa, 0xfa00, {&(0x7f0000000040)}}, 0x18) 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000500"}, 0x18) [ 821.166070] IPVS: Unknown mcast interface: syzkaller1 [ 821.176261] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 821.254241] IPVS: Unknown mcast interface: syzkaller1 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x8000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1f, 0x400) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000100)={0x2a, 0x4, 0x0, {0x6, 0x9, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_eee={0x2}}) close(r3) close(r1) [ 821.526635] IPVS: Unknown mcast interface: syzkaller1 13:02:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000380)='./file0\x00', 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f00000001c0)=""/140, 0xffffffffffffffc7) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0), 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000300)={0x48ef}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="0607000902000093cb00000000000000324b652ede7b1dd0f4ba176515790cbcc61fe33e95254ade0fb1e4b1981e67983e7f194e7f80b7bff9d0d4df7e290eabc7562feea5"], 0x10}}, 0x0) 13:02:44 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) r0 = getpid() prctl$PR_SET_TSC(0x1a, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0x876f3ed5) ptrace(0x4206, r0) ptrace$getsig(0x4207, r0, 0x0, 0x0) ptrace$getsig(0x4208, r0, 0x0, 0x0) 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000200)=""/143) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x1a8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000000), &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x220) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000100)={{0x0, @multicast1, 0x4e22, 0x4, 'lblcr\x00', 0x4, 0x8, 0x31}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x4e21, 0x0, 0x3, 0xc7d, 0x1}}, 0x44) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_dccp_int(r1, 0x21, 0x1f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 821.610708] IPVS: Unknown mcast interface: syzkaller1 [ 821.611821] kernel msg: ebtables bug: please report to author: bad policy 13:02:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 821.658123] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:20002 [ 821.676697] kernel msg: ebtables bug: please report to author: bad policy [ 821.695074] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:20002 13:02:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4c1, 0x8001) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000080)='syz1\x00') r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000340)='./file0\x00', r4, r5) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x85, 0x0, [0x6, 0x1, 0x7f, 0x800000004]}) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000fc0)={"99306cc6514e1ece57127e4ee0175e4d913680790c40ef3804375efccd8aaed04f27ab3f29cc2ced16b111597693301f40c46806fcf08a2e316ef8d5b0bf4e47bad3648eb8588b0f80db55c9e83dc30fc68b13ad0847ad43385e73882ae61f477f7fcb44d31399633c3642a3b8554e8b85acceca44d8a68c2aeb3f6de7b5cb9bbf0df92b7b7b6233b3d55a171e331816e63907784aebbbcc9b4909b966ba835f6f24619b2fa9b5626e4a736bcc8ebd71b82d633781b15244f1685d0720bebe368a24681d97172a812420421048b421c018cdf982e5f7156d241859bfc571b63ce56a28e16199e99f40917afc8701cf252243ce1980a31ac840d4ef9e6a1727dc558880c9eed86d6ba866bac77c5bbc8ce52870a4c5a939d3c29367354529a61a1f86b45a5c97b9b0133110617c9c4db34e52ae457862d3f704e0cbc79f0fb9d4827b3149eacb13bf58a31e1028b5a83bfd1abcef52739b0a6b4006b658c531bfd0c34f31c04ef9a84241dfcbfc40d98c5b204fba212d9da3ac03925051b64aa6634ef5f395d8a12b45e6a5c658c3e9f7fd98f11f4a87fcd507232a5d1e78c28e22c36c4e8b8ae9845f5c98ca8ac0f8a6e94c1e286c399da87965129dc36187eae5dad8ccb6baffb0c5a35297f95ec49d7550730d78d1fbb7bd79ee4f1c67e4bff8dc409bf35a4a747216227997674148928beb3cfc2527b15f770ca6aa226c7a4bff65c28be679f8385d92f0c3821fa82423f5ac79dc3f11011a9c89ca99958453b1bdde02ae9b9164f9d7afe5a8305aae737ed2a43d52fcfdd41207b8004e064046ed6958d31a055d046805e0788c404b16d14d5efd3430b1561c1da958216e8d4c388b4664f1ff07000000000000aacc11b38836f7acf696cdf0af1a23eb18b5274c3dd0d23ff61a4033b191151f51a254d9232404d076db0434ec812b2877af560201a025dcc6bd44e73924aa8c6f966a70af87e9fd72ae457be0490a8b3d79fce58265a37c4061ceb39d226f00512ebe8164f6a1fa6d987b6e6e570757ef19f0b2a6c04d2c12d5f1910536556e5c0ae3980d373c3a04da2d9982e9bcc8dc773c404dab4698937eee357d5fd786a3fcfc51aab4f3438018f61cc87ae7eb3d403b4e76d19a1e505ab63c5ca29793186a4ac62a021b075a56d5af13954fd111bb475d1d1236b84e83fea43729fbcf6786e460b5a92dc3b86f752b445a68f9562e24843df5c5b8fbac0c13a803d1c9c63436860c4ddacc272e1429b973cf42a00664cb639b67086771173f663e4c80e778646dc59fa4ca43d7e507d3c14aeaa1cdd39dc4ef37c3281af9145ca22a6626926b4655743b304806c3fb40ff556a5d33e69c31fe81913fb38e1078202297e75dc9b606af02472843f31e05546d1694a024b1173c97cd3f533d42c63240fe55660a10fc2ebd223336004fb07d00"}) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={r6, @dev={0xac, 0x14, 0x14, 0x17}, @rand_addr=0x8}, 0xc) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x5d5b, 0x10000) ioctl$KVM_SET_IRQCHIP(r3, 0x4020aea5, &(0x7f00000001c0)={0xfffffffffffffffc, 0x0, @ioapic}) 13:02:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0xf000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 821.704931] IPVS: Unknown mcast interface: syzkaller1 13:02:45 executing program 0: r0 = userfaultfd(0x8) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x2cf, 0x5, 0x33e, 0x3, 0x0, 0x0, 0x40000, 0x9, 0xa2, 0xfffffffffffffe00, 0x3, 0x41c91df9, 0x8d1d, 0x3, 0x1, 0x0, 0x7, 0x10000, 0x7, 0x6, 0x10000, 0x4, 0x5, 0x1000, 0x73dd, 0x9, 0x2, 0x81, 0x3ff, 0xffffffffffff7a59, 0x0, 0x7ff, 0xa4, 0xff, 0x1f, 0xfffffffffffffffe, 0x0, 0xfffffffffffffff9, 0x2, @perf_bp={&(0x7f00000000c0), 0x7}, 0x10000, 0x1, 0x0, 0x7, 0xffffffffffff828a, 0x80000000, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x2) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x2800, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000240)=0x8001, 0x4) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) truncate(&(0x7f0000000000)='./bus\x00', 0xc450) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) 13:02:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) 13:02:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = creat(&(0x7f0000000380)='./file0\x00', 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f00000001c0)=""/140, 0xffffffffffffffc7) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x100) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0), 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000300)={0x48ef}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="0607000902000093cb00000000000000324b652ede7b1dd0f4ba176515790cbcc61fe33e95254ade0fb1e4b1981e67983e7f194e7f80b7bff9d0d4df7e290eabc7562feea5"], 0x10}}, 0x0) 13:02:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='}-!-\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000006000)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000540)={"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"}) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000005c0)=""/246) 13:02:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x10000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}, 0x18) [ 822.080511] IPVS: Unknown mcast interface: syzkaller1 [ 822.184182] IPVS: Unknown mcast interface: syzkaller1 13:02:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x40000, @local, 0xfffffffffffffffe}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xc, 0x6, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000080)) timer_getoverrun(r2) getsockopt$inet_int(r1, 0x0, 0xe, 0x0, &(0x7f0000000100)) 13:02:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x81, 0x0, [0x8]}) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x80000) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x991) 13:02:45 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x80000000000045, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgid(0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000004c0), &(0x7f0000000500)=0xb) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000580)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000540)=0x10) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000340), &(0x7f0000000380)=0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) getrandom(&(0x7f00000001c0)=""/129, 0x81, 0x2) fgetxattr(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="73797374656d0c2f65786500000000000409204bddd9ea11befc0381af4adee901d2da75af1f0200f5ab26d7f1bd500b331ce39c5a"], &(0x7f0000000640)=""/134, 0x86) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) futex(&(0x7f00000003c0), 0x1, 0x0, &(0x7f0000000440)={r5, r6+30000000}, &(0x7f0000000480)=0x1, 0x11) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000280)=""/100, &(0x7f0000000300)=0x64) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={0x0, 0xffffffffffff9579, 0x0, 0x1, &(0x7f0000ffc000/0x4000)=nil, 0x8000}) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000005c0)) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000700)={0x9, 0x101, 0xd70, 0x5}) fcntl$setlease(r0, 0x400, 0x2) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x3) sendfile(r0, r1, &(0x7f0000000180), 0x8402) ptrace$poke(0xffffffffffffffff, r3, &(0x7f0000000000), 0x200) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x2000}) fcntl$setsig(r2, 0xa, 0x1) connect$netlink(r1, &(0x7f0000000740)=@unspec, 0xc) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 13:02:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, "73797a6b616c6c6572310000000300"}, 0x18) 13:02:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x402082) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000002c0)=""/102) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1b, &(0x7f0000000180)=""/246, &(0x7f0000000100)=0xf6) getsockopt$inet_buf(r0, 0x0, 0x28, &(0x7f0000000080)=""/25, &(0x7f00000000c0)=0x19) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001580)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001540)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000015c0)={0xb, 0x10, 0xfa00, {&(0x7f0000001480), r1, 0x40}}, 0x18) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x202) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000340)=""/4096) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[@ANYRES16=r2, @ANYRESOCT=r0, @ANYRES16=0x0, @ANYRES16=r0, @ANYRESDEC=r0, @ANYRES16=r0], 0x25b) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000280)=""/54) write$binfmt_misc(r2, &(0x7f0000001440)={'syz0', "de9aad318458b76cd3ca4ddbaba2aac30a3db349d6a7a27fc764fa3812ecc850"}, 0x24) write$P9_RLINK(r0, &(0x7f0000001400)={0x7, 0x47, 0x1}, 0x7) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001340)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000001380)=0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f00000013c0)={r0, r0, 0x3}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x13, r2, 0x0) 13:02:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x10, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 822.432265] IPVS: Unknown mcast interface: syzkaller1 13:02:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) r0 = add_key$user(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) [ 822.461488] ================================================================== [ 822.469127] BUG: KASAN: use-after-free in vb2_mmap+0x662/0x6f0 [ 822.475097] Read of size 8 at addr ffff8881b482e480 by task syz-executor1/654 [ 822.482361] [ 822.483988] CPU: 1 PID: 654 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #362 [ 822.491174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.500519] Call Trace: [ 822.503109] dump_stack+0x244/0x39d [ 822.506740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 822.511929] ? printk+0xa7/0xcf [ 822.515208] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 822.519970] print_address_description.cold.7+0x9/0x1ff [ 822.525331] kasan_report.cold.8+0x242/0x309 [ 822.529735] ? vb2_mmap+0x662/0x6f0 [ 822.533361] __asan_report_load8_noabort+0x14/0x20 [ 822.538410] vb2_mmap+0x662/0x6f0 [ 822.541865] ? vb2_poll+0x1d0/0x1d0 [ 822.545484] vb2_fop_mmap+0x4b/0x70 [ 822.549109] v4l2_mmap+0x153/0x200 [ 822.552662] mmap_region+0xe85/0x1cd0 [ 822.556472] ? __x64_sys_brk+0x8b0/0x8b0 [ 822.560529] ? zap_class+0x640/0x640 [ 822.564245] ? exit_robust_list+0x280/0x280 [ 822.568574] ? mpx_unmapped_area_check+0xd8/0x108 [ 822.573432] ? arch_get_unmapped_area+0x750/0x750 [ 822.578270] ? lock_acquire+0x1ed/0x520 [ 822.578323] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 822.578343] ? cap_mmap_addr+0x52/0x130 [ 822.587295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.587309] ? security_mmap_addr+0x80/0xa0 [ 822.587324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 822.587339] ? get_unmapped_area+0x292/0x3b0 [ 822.587355] do_mmap+0xa22/0x1230 [ 822.587373] ? mmap_region+0x1cd0/0x1cd0 [ 822.587386] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 822.587411] ? down_read_killable+0x150/0x150 [ 822.601195] ? security_mmap_file+0x174/0x1b0 [ 822.601215] vm_mmap_pgoff+0x213/0x2c0 [ 822.601238] ? vma_is_stack_for_current+0xd0/0xd0 [ 822.601257] ? _copy_to_user+0xc8/0x110 [ 822.601281] ksys_mmap_pgoff+0x4da/0x660 [ 822.601293] ? do_syscall_64+0x9a/0x820 [ 822.601309] ? find_mergeable_anon_vma+0xd0/0xd0 [ 822.657068] ? trace_hardirqs_on+0xbd/0x310 [ 822.661386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.666929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.672289] ? trace_hardirqs_off_caller+0x310/0x310 [ 822.677384] __x64_sys_mmap+0xe9/0x1b0 [ 822.681276] do_syscall_64+0x1b9/0x820 [ 822.685169] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 822.690530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 822.695453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.700301] ? trace_hardirqs_on_caller+0x310/0x310 [ 822.705315] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 822.710329] ? prepare_exit_to_usermode+0x291/0x3b0 [ 822.715344] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.720185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.725364] RIP: 0033:0x457569 [ 822.728562] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.747453] RSP: 002b:00007f8f9e73fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 822.755151] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 822.762413] RDX: 0000000000000002 RSI: 0000000000004000 RDI: 0000000020ffb000 [ 822.769679] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 822.776944] R10: 0000000000000013 R11: 0000000000000246 R12: 00007f8f9e7406d4 [ 822.784209] R13: 00000000004c2b5d R14: 00000000004d4688 R15: 00000000ffffffff [ 822.791494] [ 822.793115] Allocated by task 654: [ 822.796653] save_stack+0x43/0xd0 [ 822.800111] kasan_kmalloc+0xc7/0xe0 [ 822.803819] __kmalloc+0x15b/0x760 [ 822.807354] __vb2_queue_alloc+0xf7/0xf90 [ 822.811501] vb2_core_reqbufs+0x971/0x1040 [ 822.815731] __vb2_init_fileio+0x344/0xc90 [ 822.819965] __vb2_perform_fileio+0xcfd/0x1210 [ 822.824556] vb2_write+0x38/0x50 [ 822.827920] vb2_fop_write+0x20a/0x400 [ 822.831807] v4l2_write+0x168/0x220 [ 822.835435] __vfs_write+0x119/0x9f0 [ 822.839156] vfs_write+0x1fc/0x560 [ 822.842690] ksys_write+0x101/0x260 [ 822.846317] __x64_sys_write+0x73/0xb0 [ 822.850218] do_syscall_64+0x1b9/0x820 [ 822.854106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.859285] [ 822.860917] Freed by task 652: [ 822.864113] save_stack+0x43/0xd0 [ 822.867576] __kasan_slab_free+0x102/0x150 [ 822.871810] kasan_slab_free+0xe/0x10 [ 822.875603] kfree+0xcf/0x230 [ 822.878701] __vb2_queue_free+0x5e2/0xa30 [ 822.882838] vb2_core_reqbufs+0x2da/0x1040 [ 822.887067] __vb2_cleanup_fileio+0xf0/0x160 [ 822.891471] vb2_core_queue_release+0x1e/0x80 [ 822.895958] _vb2_fop_release+0x1d2/0x2b0 [ 822.900096] vb2_fop_release+0x77/0xc0 [ 822.903990] vivid_fop_release+0x18e/0x440 [ 822.908221] v4l2_release+0x224/0x3a0 [ 822.912013] __fput+0x385/0xa30 [ 822.915286] ____fput+0x15/0x20 [ 822.918572] task_work_run+0x1e8/0x2a0 [ 822.922458] exit_to_usermode_loop+0x318/0x380 [ 822.927034] do_syscall_64+0x6be/0x820 [ 822.930921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.936098] [ 822.937723] The buggy address belongs to the object at ffff8881b482e480 [ 822.937723] which belongs to the cache kmalloc-1k of size 1024 [ 822.950370] The buggy address is located 0 bytes inside of [ 822.950370] 1024-byte region [ffff8881b482e480, ffff8881b482e880) [ 822.962147] The buggy address belongs to the page: [ 822.962171] page:ffffea0006d20b80 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0x0 compound_mapcount: 0 [ 822.962185] flags: 0x2fffc0000010200(slab|head) [ 822.962201] raw: 02fffc0000010200 ffffea00070f8988 ffffea0007652108 ffff8881da800ac0 [ 822.962215] raw: 0000000000000000 ffff8881b482e000 0000000100000007 0000000000000000 [ 822.962221] page dumped because: kasan: bad access detected [ 822.962224] [ 822.962229] Memory state around the buggy address: [ 822.962239] ffff8881b482e380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 822.962248] ffff8881b482e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 822.962258] >ffff8881b482e480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 822.962263] ^ [ 822.962272] ffff8881b482e500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 822.962282] ffff8881b482e580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 822.962286] ================================================================== [ 822.962291] Disabling lock debugging due to kernel taint [ 823.089132] IPVS: Unknown mcast interface: syzkaller1 [ 823.112931] Kernel panic - not syncing: panic_on_warn set ... [ 823.118832] CPU: 1 PID: 654 Comm: syz-executor1 Tainted: G B 4.20.0-rc5+ #362 [ 823.127391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.136737] Call Trace: [ 823.139327] dump_stack+0x244/0x39d [ 823.142959] ? dump_stack_print_info.cold.1+0x20/0x20 [ 823.148155] panic+0x2ad/0x55c [ 823.151343] ? add_taint.cold.5+0x16/0x16 [ 823.155491] ? preempt_schedule+0x4d/0x60 13:02:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@dellink={0x28, 0x11, 0xc03, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x8100000000000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:02:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'syzkaller1\x00\x00\x00`\x00'}, 0x18) [ 823.159636] ? ___preempt_schedule+0x16/0x18 [ 823.164041] ? trace_hardirqs_on+0xb4/0x310 [ 823.168370] kasan_end_report+0x47/0x4f [ 823.172336] kasan_report.cold.8+0x76/0x309 [ 823.176675] ? vb2_mmap+0x662/0x6f0 [ 823.180301] __asan_report_load8_noabort+0x14/0x20 [ 823.185234] vb2_mmap+0x662/0x6f0 [ 823.188691] ? vb2_poll+0x1d0/0x1d0 [ 823.192315] vb2_fop_mmap+0x4b/0x70 [ 823.195938] v4l2_mmap+0x153/0x200 [ 823.199476] mmap_region+0xe85/0x1cd0 [ 823.203274] ? __x64_sys_brk+0x8b0/0x8b0 [ 823.207318] ? zap_class+0x640/0x640 [ 823.211014] ? exit_robust_list+0x280/0x280 [ 823.215454] ? mpx_unmapped_area_check+0xd8/0x108 [ 823.220283] ? arch_get_unmapped_area+0x750/0x750 [ 823.225230] ? lock_acquire+0x1ed/0x520 [ 823.229183] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 823.234196] ? cap_mmap_addr+0x52/0x130 [ 823.238149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.244187] ? security_mmap_addr+0x80/0xa0 [ 823.248492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.254013] ? get_unmapped_area+0x292/0x3b0 [ 823.258414] do_mmap+0xa22/0x1230 [ 823.261849] ? mmap_region+0x1cd0/0x1cd0 [ 823.265897] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 823.269939] ? down_read_killable+0x150/0x150 [ 823.274417] ? security_mmap_file+0x174/0x1b0 [ 823.278891] vm_mmap_pgoff+0x213/0x2c0 [ 823.282765] ? vma_is_stack_for_current+0xd0/0xd0 [ 823.287588] ? _copy_to_user+0xc8/0x110 [ 823.291546] ksys_mmap_pgoff+0x4da/0x660 [ 823.295589] ? do_syscall_64+0x9a/0x820 [ 823.299542] ? find_mergeable_anon_vma+0xd0/0xd0 [ 823.304276] ? trace_hardirqs_on+0xbd/0x310 [ 823.308581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.314098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.319439] ? trace_hardirqs_off_caller+0x310/0x310 [ 823.324521] __x64_sys_mmap+0xe9/0x1b0 [ 823.328390] do_syscall_64+0x1b9/0x820 [ 823.332259] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 823.337606] ? syscall_return_slowpath+0x5e0/0x5e0 [ 823.342513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.347348] ? trace_hardirqs_on_caller+0x310/0x310 [ 823.352348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 823.357356] ? prepare_exit_to_usermode+0x291/0x3b0 [ 823.362360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.367185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.372364] RIP: 0033:0x457569 [ 823.375540] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.394525] RSP: 002b:00007f8f9e73fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 823.402214] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457569 [ 823.409460] RDX: 0000000000000002 RSI: 0000000000004000 RDI: 0000000020ffb000 [ 823.416706] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 823.423963] R10: 0000000000000013 R11: 0000000000000246 R12: 00007f8f9e7406d4 [ 823.431209] R13: 00000000004c2b5d R14: 00000000004d4688 R15: 00000000ffffffff [ 823.439609] Kernel Offset: disabled [ 823.443228] Rebooting in 86400 seconds..