etlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:22:50 executing program 1: 05:22:50 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:50 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:22:50 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:22:50 executing program 1: 05:22:50 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:22:50 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:22:50 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:22:51 executing program 1: 05:22:53 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:22:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:22:53 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:22:53 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x686987548330b3, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe1, 0x2) 05:22:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 398.043799][ T27] audit: type=1326 audit(1577164974.008:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11704 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 05:22:54 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 05:22:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:22:54 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:22:54 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:54 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) [ 398.741410][ T27] audit: type=1326 audit(1577164974.698:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11704 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 05:22:57 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:22:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:22:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1cI\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c64666c7475690ac8", @ANYRESHEX, @ANYBLOB=',cache=mmap,access=any,dfltgid=', @ANYRESHEX, @ANYBLOB=',fscache,']) fcntl$setstatus(r5, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r5, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r9) add_key(&(0x7f0000000380)='ceph\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000600)="f0dd73f2ca58e9abe5e1cede9d96254f4847b599ecca24515d554ebba6739ae17300dca7cb4d5a57b5d315b5c6a68a35b36887b538692eeba0f0eeea5045f6f8f8a9433f9d4dfc35ab36b3f22bc4", 0x4e, 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000740)={'syz', 0x3}, &(0x7f0000000040)="b3", 0xfffffffffffffdf5, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) [ 404.706382][ T27] audit: type=1804 audit(1577164980.658:72): pid=11830 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir135911329/syzkaller.DX6JY5/53/file0" dev="sda1" ino=17074 res=1 05:23:00 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:00 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 405.047279][T11854] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.0'. [ 405.187129][ T27] audit: type=1804 audit(1577164981.148:73): pid=11857 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir135911329/syzkaller.DX6JY5/54/file0" dev="sda1" ino=17077 res=1 05:23:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:03 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ffffffd, 0x8420, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x1000, 0x7f, 0x3, 0x6, 0x0, 0xfffffffc}, 0x0, 0xa, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socket$kcm(0x2, 0x1, 0x84) close(0xffffffffffffffff) r1 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0xb, &(0x7f0000000000), 0xb) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000)=r2, 0xb) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r4, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="0500000000060000000000"]) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80}, 0x20000100) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) 05:23:03 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:03 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:03 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x10e, 0xa, 0x0, 0x0) [ 407.660068][ T27] audit: type=1400 audit(1577164983.618:74): avc: denied { setopt } for pid=11872 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:23:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) 05:23:03 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:03 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:03 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 407.866876][ T27] audit: type=1400 audit(1577164983.828:75): avc: denied { map } for pid=11883 comm="syz-executor.0" path="socket:[44972]" dev="sockfs" ino=44972 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 05:23:03 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:04 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000008, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x14b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:23:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:06 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:06 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0x1000000000000a) ioctl$int_in(r3, 0x5452, &(0x7f0000000080)=0x5) setsockopt$sock_int(r3, 0x1, 0x7, &(0x7f0000000040), 0x4) 05:23:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xbb}, 0x0) 05:23:06 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:06 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:06 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = socket$nl_crypto(0x10, 0x3, 0x15) dup3(r0, r1, 0x0) socket$nl_route(0x10, 0x3, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x70) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0xfffffffffffffffe, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) 05:23:07 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:07 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:07 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 411.266072][ T27] audit: type=1400 audit(1577164987.228:76): avc: denied { create } for pid=11936 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 411.591606][T11955] ptrace attach of "/root/syz-executor.3"[11951] was attempted by "/root/syz-executor.3"[11955] 05:23:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:09 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:09 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8ec3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r1, 0xfffffffffffffffd) syz_emit_ethernet(0xba, &(0x7f0000000540)={@empty, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x84, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[@hopopts={0x87, 0x7, [], [@calipso={0x7, 0x38, {0x80, 0xc, 0x3f, 0x6, [0x5, 0x8, 0x2, 0x0, 0x3, 0xe7]}}, @padn]}, @dstopts, @dstopts={0x84, 0x2, [], [@jumbo={0xc2, 0x4, 0x7f}, @generic, @jumbo={0xc2, 0x4, 0x40}, @enc_lim]}], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r2 = creat(0x0, 0xbb) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) fallocate(r2, 0x100000003, 0x0, 0x28120001) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) open(&(0x7f0000000500)='./file0\x00', 0x60000, 0x0) syz_emit_ethernet(0x2, &(0x7f0000000200)=ANY=[@ANYRES32=0x41424344, @ANYBLOB], 0x0) syz_emit_ethernet(0x93, &(0x7f0000000280)={@local, @link_local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "008000", 0x10, 0xffffff11, 0x0, @remote, @ipv4={[], [], @multicast1}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'HBq', 0x0, "a92008"}}}}}}}, 0x0) 05:23:09 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000f80)={&(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000e80)=[@mask_cswp={0x58, 0x114, 0x9, {{}, 0x0, 0x0}}], 0x58}, 0x4000000) 05:23:09 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:09 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:09 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:10 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 05:23:10 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:10 executing program 1: poll(&(0x7f00000000c0)=[{}], 0x1, 0x800000000004a) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x99}, 0x10) r2 = dup2(r0, r1) recvfrom$inet(r2, 0x0, 0x10473, 0x0, 0x0, 0x800e00511) shutdown(r1, 0x0) 05:23:10 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:10 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 414.564538][T12002] ptrace attach of "/root/syz-executor.3"[11997] was attempted by "/root/syz-executor.3"[12002] 05:23:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:12 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000280)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) 05:23:12 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x7, 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0f000000cb0000ae63b0560700d0e492653045019d73c508ea6352eca19b9ecf6e1ec7c1d33770d9bc2b0859542f686fa1dc3a9eb122c7a3ca653823b1d57373b204762a1b19ef6db3478f6311f5b0797e61d3797350af5713fdcf9ad595e2a2c1be95c6e8ac74c72a9db66c40d5a5d5cf0483aa124f5d4e3e37c5b3a4562b2db85fbd82cc8b2d218b08c1537e6c470897af8eb4d7587b84e390d7bb081e8052627cbfb5148c120ef3a384b212c93d4a06f8bce0e8d7ea88a294f6352f48f055612c2a7a5f6c2f0a2f5ec66356fbed12b3"], 0xd1) lseek(r1, 0x0, 0x3) 05:23:12 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:13 executing program 1: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) pipe(&(0x7f00000000c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 05:23:13 executing program 0: r0 = socket(0x2, 0x5, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000080)=0xffffffff, 0x4) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000000)="cf", 0x2468d, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) 05:23:13 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:13 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:23:13 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:13 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLOCK(r0, 0x0, 0xfffffdc7) 05:23:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:23:16 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:23:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6c50400aeb995298992ea5400c2", 0x10) 05:23:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x10, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000300)=@gcm_256={{0x304}, "d9dc7fc0ba0af532", "ce9cca46fdeec3557ddd8e27fdd6b1b699c9a86553f1f7acaf441d27a3e6e2c6", "695de11a", "eecd446eafb86624"}, 0x38) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 05:23:16 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 420.287343][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:23:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:23:16 executing program 1: r0 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 05:23:16 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:16 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) 05:23:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) [ 421.090615][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:23:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @random="a54d1155e258"}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'}) 05:23:19 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) 05:23:19 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) 05:23:19 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 05:23:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 05:23:19 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1}], 0x1, 0x0) 05:23:19 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) 05:23:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) 05:23:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 423.500097][T12123] IPVS: Unknown mcast interface: syzkaller1 [ 423.530521][T12128] IPVS: Unknown mcast interface: syzkaller1 05:23:19 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}], 0x18}], 0x1, 0x0) [ 423.689559][T12140] IPVS: Unknown mcast interface: syzkaller1 05:23:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 05:23:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socket(0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x686987548330b3, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x22a0f846) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) fchmod(0xffffffffffffffff, 0x1) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x30}, 0x0) fcntl$setown(r2, 0x8, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xe1, 0x2) close(0xffffffffffffffff) 05:23:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0x5}) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="0f000000cb0000ae63b0560700d0e492653045019d73c508ea6352eca19b9ecf6e1ec7c1d33770d9bc2b0859542f686fa1dc3a9eb122c7a3ca653823b1d57373b204762a1b19ef6db3478f6311f5b0797e61d3797350af5713fdcf9ad595e2a2c1be95c6e8ac74c72a9db66c40d5a5d5cf0483aa124f5d4e3e37c5b3a4562b2db85fbd82cc8b2d218b08c1537e6c470897af8eb4d7587b84e390d7bb081e8052627cbfb5148c120ef3a384b212c93d4a06f8bce0e8d7ea88a294f6352f48f055612c2a7a5f6c2f0a2f5ec66356fbed12b321afe63fb9cd25ae06f6"], 0xdb) lseek(r1, 0x0, 0x3) 05:23:22 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}], 0x18}], 0x1, 0x0) 05:23:22 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:22 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}], 0x18}], 0x1, 0x0) [ 426.415533][T12161] IPVS: Unknown mcast interface: syzkaller1 05:23:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 426.420821][ T27] audit: type=1326 audit(1577165002.378:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12150 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 05:23:22 executing program 2: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000600900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 05:23:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 426.626226][T12176] IPVS: Unknown mcast interface: syzkaller1 05:23:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 426.710089][T12182] IPVS: Unknown mcast interface: syzkaller1 05:23:22 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18}], 0x30}], 0x1, 0x0) [ 426.780854][T12179] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:23:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 426.843260][T12190] IPVS: Unknown mcast interface: syzkaller1 [ 426.857451][T12179] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 426.904353][T12194] IPVS: Unknown mcast interface: syzkaller1 [ 426.970790][T12179] F2FS-fs (loop2): invalid crc_offset: 0 [ 426.978278][T12179] F2FS-fs (loop2): invalid crc_offset: 0 [ 426.990985][T12179] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 427.056491][T12179] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 427.077282][T12179] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 427.089560][T12179] F2FS-fs (loop2): invalid crc_offset: 0 [ 427.096354][T12179] F2FS-fs (loop2): invalid crc_offset: 0 [ 427.103825][T12179] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 427.148423][ T27] audit: type=1326 audit(1577165003.108:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12150 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 05:23:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18}], 0x30}], 0x1, 0x0) 05:23:25 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x130, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, &(0x7f0000000480)) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r4, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "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"}) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000001c0)={r6}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c64666c7475690ac8", @ANYRESHEX, @ANYBLOB=',cache=mmap,access=any,dfltgid=', @ANYRESHEX, @ANYBLOB=',fscache,']) fcntl$setstatus(r5, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r5, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r9) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000740)={'syz', 0x3}, &(0x7f0000000040)="b3", 0xfffffffffffffdf5, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) 05:23:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100)=0xabc7, 0x4) r2 = gettid() ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000180)=0x34c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r8, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) close(r7) tkill(r2, 0x1000000000016) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_G_FMT(r10, 0xc0d05604, &(0x7f00000011c0)={0x1, @sdr={0x38415262, 0x401}}) syz_open_procfs(r2, &(0x7f0000000080)='`?m_adj\x00') r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$TUNGETFILTER(r12, 0x801054db, &(0x7f00000001c0)=""/4096) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) 05:23:25 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 429.456194][T12213] IPVS: Unknown mcast interface: syzkaller1 05:23:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18}], 0x30}], 0x1, 0x0) [ 429.630233][T12221] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 05:23:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@init={0x18, 0x84, 0x0, {0x2003}}], 0x18}], 0x1, 0x0) [ 429.737050][T12232] IPVS: Unknown mcast interface: syzkaller1 05:23:25 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={0x0, 0x130, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x5}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10591) connect(r0, &(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x2000}, 0x80) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x10001, 0x28180) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x10, 0x2, 0x10) rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, &(0x7f0000000480)) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x440000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r4, 0x8108551b, &(0x7f00000004c0)={0x909f, 0x1, "52237816aaabb0646d06efcdf62442e4994e0780fe925bd92e5d0d77ec7762add085dac4929389488de35da413d2d500915080eea07867a0da05070d4d0f9b036c117a8518a9fafffc50e676fa790bac5aff4bab1dd5fdf2e7d67b641ae1af26407c535f65c604ca74bd044b95b1fff9e8bfc4167e977a0b0966f1bc9637982a5d6fe7f29f386c17748e5a4b39f53ce917fadb931474a0eefee33726c6014ff0145cc5c5a73c3f304a56d656c068e7d8ae0c9c3ad75c3b8cbd08e8bc6b0bc716090ba72ba51692c91cd7d6dcc7deba1f95d4c07341bb51d8b09887be4725fd08f8165eb0d5166865c5548f88a1c9a2050010b2be4530551f166c7099daa6adba"}) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000001c0)={r6}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="2c64666c7475690ac8", @ANYRESHEX, @ANYBLOB=',cache=mmap,access=any,dfltgid=', @ANYRESHEX, @ANYBLOB=',fscache,']) fcntl$setstatus(r5, 0x4, 0x42000) perf_event_open(0x0, 0x0, 0x5, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r5, 0x0, 0xb, &(0x7f0000000280)='/dev/vcsu#\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r9) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000740)={'syz', 0x3}, &(0x7f0000000040)="b3", 0xfffffffffffffdf5, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0xbe, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160800180009ac0f00000004140e000a0002000000dc2976d153b4", 0x154}], 0x1}, 0x0) 05:23:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@init={0x18, 0x84, 0x0, {0x2003}}], 0x18}], 0x1, 0x0) [ 429.889646][T12241] IPVS: Unknown mcast interface: syzkaller1 [ 430.011252][T12250] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 05:23:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:28 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@init={0x18, 0x84, 0x0, {0x2003}}], 0x18}], 0x1, 0x0) 05:23:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0xfffffffffffffea1}], 0x1, 0x0, 0x0, 0xfffffffffffffda4) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x655dd53d72a9facd, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '#}em1\x00'}) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r4, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r4, &(0x7f00000007c0)={0x10, 0x0, 0x2}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:23:28 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:28 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x800000000004a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000040)={0x99}, 0x10) r3 = dup2(r1, r2) recvfrom$inet(r3, 0x0, 0x10473, 0x0, 0x0, 0x800e00511) shutdown(r2, 0x0) 05:23:28 executing program 5: 05:23:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:28 executing program 1: 05:23:28 executing program 5: 05:23:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0x0, 0x2}, 0x10}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:23:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000)={0x3f}, 0x10) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) bind(0xffffffffffffff9c, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) recvfrom$inet(r0, 0x0, 0xba13, 0x2, 0x0, 0x800e005bd) shutdown(r0, 0x0) 05:23:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:31 executing program 1: r0 = gettid() r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x26a3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa54d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, r1, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x02', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x4, 0x6, 0x8, 0x1, 0x0, 0x7, 0x11c9, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0xb139683faff424d2, 0x0, 0x3, 0x4, 0xc1, 0x4, 0x7}, r0, 0x0, r3, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3d, 0xe1, 0x9, 0x2, 0x0, 0x3, 0x3000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x6, @perf_bp={&(0x7f00000000c0), 0x10}, 0x0, 0x80000000, 0x0, 0x3, 0xf433, 0x6, 0x7}, r1, 0xe, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0185879, 0x20000003) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') 05:23:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0xfffffffffffffea1}], 0x1, 0x0, 0x0, 0xfffffffffffffda4) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x655dd53d72a9facd, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '#}em1\x00'}) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r4, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r4, &(0x7f00000007c0)={0x10, 0x0, 0x2}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:23:31 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:31 executing program 5: 05:23:31 executing program 5: 05:23:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0xfffffffffffffea1}], 0x1, 0x0, 0x0, 0xfffffffffffffda4) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x655dd53d72a9facd, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '#}em1\x00'}) preadv(r4, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r4, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r4, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r4, &(0x7f00000007c0)={0x10, 0x0, 0x2}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:23:32 executing program 5: 05:23:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:34 executing program 5: 05:23:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:34 executing program 2: 05:23:34 executing program 1: r0 = gettid() r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x26a3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa54d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, r1, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x02', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x4, 0x6, 0x8, 0x1, 0x0, 0x7, 0x11c9, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0xb139683faff424d2, 0x0, 0x3, 0x4, 0xc1, 0x4, 0x7}, r0, 0x0, r3, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3d, 0xe1, 0x9, 0x2, 0x0, 0x3, 0x3000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x6, @perf_bp={&(0x7f00000000c0), 0x10}, 0x0, 0x80000000, 0x0, 0x3, 0xf433, 0x6, 0x7}, r1, 0xe, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0185879, 0x20000003) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') 05:23:34 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:34 executing program 2: 05:23:34 executing program 5: 05:23:35 executing program 2: 05:23:35 executing program 5: 05:23:35 executing program 5: 05:23:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:37 executing program 2: 05:23:37 executing program 5: 05:23:37 executing program 1: r0 = gettid() r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x26a3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa54d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, r1, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x02', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x4, 0x6, 0x8, 0x1, 0x0, 0x7, 0x11c9, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0xb139683faff424d2, 0x0, 0x3, 0x4, 0xc1, 0x4, 0x7}, r0, 0x0, r3, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3d, 0xe1, 0x9, 0x2, 0x0, 0x3, 0x3000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x6, @perf_bp={&(0x7f00000000c0), 0x10}, 0x0, 0x80000000, 0x0, 0x3, 0xf433, 0x6, 0x7}, r1, 0xe, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0185879, 0x20000003) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') 05:23:37 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:37 executing program 5: 05:23:37 executing program 2: 05:23:38 executing program 5: 05:23:38 executing program 2: 05:23:38 executing program 5: 05:23:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:40 executing program 5: 05:23:40 executing program 2: 05:23:40 executing program 1: r0 = gettid() r1 = gettid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x26a3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa54d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, r1, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x02', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x4, 0x6, 0x8, 0x1, 0x0, 0x7, 0x11c9, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0xb139683faff424d2, 0x0, 0x3, 0x4, 0xc1, 0x4, 0x7}, r0, 0x0, r3, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3d, 0xe1, 0x9, 0x2, 0x0, 0x3, 0x3000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x6, @perf_bp={&(0x7f00000000c0), 0x10}, 0x0, 0x80000000, 0x0, 0x3, 0xf433, 0x6, 0x7}, r1, 0xe, r6, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0185879, 0x20000003) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') 05:23:40 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:41 executing program 2: 05:23:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:41 executing program 5: [ 445.057738][T12424] IPVS: Unknown mcast interface: syzkaller1 05:23:41 executing program 2: 05:23:41 executing program 5: 05:23:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 445.289606][T12440] IPVS: Unknown mcast interface: syzkaller1 [ 445.547415][T12449] IPVS: Unknown mcast interface: syzkaller1 05:23:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:44 executing program 5: 05:23:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:44 executing program 2: 05:23:44 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:44 executing program 1: [ 448.112008][T12461] IPVS: Unknown mcast interface: syzkaller1 05:23:44 executing program 1: 05:23:44 executing program 2: 05:23:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:44 executing program 5: 05:23:44 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:44 executing program 1: [ 448.458743][T12477] IPVS: Unknown mcast interface: syzkaller1 05:23:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:47 executing program 2: 05:23:47 executing program 5: 05:23:47 executing program 1: 05:23:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 451.152395][T12495] IPVS: Unknown mcast interface: syzkaller1 05:23:47 executing program 1: 05:23:47 executing program 5: 05:23:47 executing program 2: [ 451.364541][T12503] IPVS: Unknown mcast interface: syzkaller1 05:23:47 executing program 5: [ 451.419077][T12510] ptrace attach of "/root/syz-executor.0"[12503] was attempted by "/root/syz-executor.0"[12510] 05:23:47 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:47 executing program 1: 05:23:50 executing program 2: 05:23:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:50 executing program 1: 05:23:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:50 executing program 5: 05:23:50 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:50 executing program 2: 05:23:50 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x3b0, 0x5, 0x1, 0xa, 0x0, 0x5}, &(0x7f0000000140)=0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c379"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) [ 454.309102][T12533] IPVS: Unknown mcast interface: syzkaller1 [ 454.343926][T12536] ptrace attach of "/root/syz-executor.0"[12533] was attempted by "/root/syz-executor.0"[12536] 05:23:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:50 executing program 2: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 05:23:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 454.604080][T12557] IPVS: Unknown mcast interface: syzkaller1 [ 454.610617][T12558] ptrace attach of "/root/syz-executor.0"[12557] was attempted by "/root/syz-executor.0"[12558] 05:23:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r2 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r2, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r2, 0x0) lseek(r1, 0x20400001, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) [ 454.713598][ T27] audit: type=1400 audit(1577165030.678:79): avc: denied { map } for pid=12562 comm="syz-executor.2" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=48508 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 05:23:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 454.784365][T12567] IPVS: Unknown mcast interface: syzkaller1 05:23:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) 05:23:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:53 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup2(r0, r0) poll(&(0x7f0000000200)=[{r1, 0x10a}], 0x1, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x4e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffffdd, 0x0, 0x0, 0x800e0086e) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) shutdown(r2, 0x0) 05:23:53 executing program 3: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 457.421820][ T27] audit: type=1400 audit(1577165033.368:80): avc: denied { cpu } for pid=12585 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 457.443865][T12595] IPVS: Unknown mcast interface: syzkaller1 05:23:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:53 executing program 2: pipe(&(0x7f0000000000)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x0, 0x5, 0x0, 0xa, 0x6}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c379"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) 05:23:53 executing program 3: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:53 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xeb) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x400000, 0x4) 05:23:53 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 457.782553][T12616] IPVS: Unknown mcast interface: syzkaller1 [ 457.975847][T12628] l2tp_ppp: tunl 4: set debug=464c457f [ 458.012127][T10430] l2tp_core: tunl 4: closing all sessions... [ 458.021652][T12632] IPVS: Unknown mcast interface: syzkaller1 [ 458.071389][ C0] l2tp_core: tunl 4: closing... 05:23:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:56 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @multicast2}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223, 0x0}, @empty=0x1000000}}}}}}, 0x0) 05:23:56 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:56 executing program 3: r0 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r2 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r2, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) lseek(r1, 0x20400001, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) 05:23:56 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:23:56 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:56 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:23:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x32f, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)) 05:23:56 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:23:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:23:59 executing program 3: r0 = gettid() r1 = creat(0x0, 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:23:59 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) write$P9_RLERRORu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="1401200007000007002565317d7604a53a12a2f5022362c65634f9734c9cb73f0000008b63af7ae77eb6b5f1922e7a6d310200f5ca33cd2000eef870010035ff81f0200000000000000065cd6d39cddf7d08d205060000008a96c30ec07932fd2a34e9bf734284777ef00439c67f94f00f65d270726b7db6eb1f29d79f5283f00d053590813b305be95c67b2bd7060d4c9688405e4d1940519000000000000000160007370e2cd132691547f5c0139305686b194b2516421b94cad2c136b7a2dff0fc953d607fba1060f08753ce3ecd50eb1ba7242582dbfefebc1b0e23ef9af434ec68a4bdfe9e94dc0c22100000000000000000000000000000000000000000000000000000000008f0d6b46caae0592ce67a15882b3964d538b4c104596ffb133dae6e78827327fc7a1137e3ebcd310ed0e1ba6a70d55f7c1a9b1b9841b45e5dcd2ee63491441e421a9270eee7a"], 0xfcb4) splice(r0, 0x0, r4, 0x0, 0x10005, 0x0) 05:23:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt(r0, 0x10e, 0xb, &(0x7f0000000000)="9a365972", 0x4) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 05:23:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 463.603648][T12691] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:23:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:23:59 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:23:59 executing program 2: syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2}) socket$inet6_udp(0xa, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 05:23:59 executing program 3: r0 = gettid() r1 = creat(0x0, 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 463.977613][T12708] IPVS: Unknown mcast interface: syzkaller1 05:24:00 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:00 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x101, {{0xa, 0x0, 0x10000, @mcast1}}}, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e20, 0x3, @mcast2, 0x5}, {0xa, 0x4e23, 0x7fff, @loopback, 0x8}, 0x5, [0xffff, 0x3, 0x4, 0x7, 0x0, 0x3, 0x5, 0x9]}, 0x5c) getsockname$ax25(r0, &(0x7f00000002c0)={{0x3, @bcast}, [@netrom, @netrom, @null, @netrom, @default, @rose, @default, @rose]}, &(0x7f0000000340)=0x48) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) close(r1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x40047452, 0x0) getpid() r5 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000000)={0x0, r5}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r8, 0x4b65, 0x10000) fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="a164c3419219612aaaf4f77df9617e6c0e80299d780616e13d72008afb91ad629e948b413d8a7cc3809408af9424ece91d9e8da1820cad7460e379553559", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ccead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306", @ANYBLOB="523b6e6f30b336731bb411b62e8e1a2854e393608360a4a0c6df", @ANYRES32=0x0, @ANYRESHEX, @ANYRESDEC=r7], 0x8, 0x2) r9 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x30000000000000, 0x0) sendmsg$unix(r9, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="67da1f1600be5e1e89443fca6c93737f7f652141e9cbab885cdf4ee4709de86a5de321ab10", 0x25}, {&(0x7f0000000180)="2ab665d6f569e4eb", 0x8}, {&(0x7f00000001c0)="c427be4137610a83ce1dbc716833e8a046316b99fa229b7e9da369e89dc3247e082a9102", 0x24}], 0x3, 0x0, 0x0, 0x8040001}, 0x14044010) r10 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r10, 0x4000000000000002) dup2(r10, r6) gettid() 05:24:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:02 executing program 3: r0 = gettid() r1 = creat(0x0, 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:24:02 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:02 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x101, {{0xa, 0x0, 0x10000, @mcast1}}}, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e20, 0x3, @mcast2, 0x5}, {0xa, 0x4e23, 0x7fff, @loopback, 0x8}, 0x5, [0xffff, 0x3, 0x4, 0x7, 0x0, 0x3, 0x5, 0x9]}, 0x5c) getsockname$ax25(r0, &(0x7f00000002c0)={{0x3, @bcast}, [@netrom, @netrom, @null, @netrom, @default, @rose, @default, @rose]}, &(0x7f0000000340)=0x48) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) close(r1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x40047452, 0x0) getpid() r5 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000000)={0x0, r5}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r8, 0x4b65, 0x10000) fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="a164c3419219612aaaf4f77df9617e6c0e80299d780616e13d72008afb91ad629e948b413d8a7cc3809408af9424ece91d9e8da1820cad7460e379553559", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ccead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306", @ANYBLOB="523b6e6f30b336731bb411b62e8e1a2854e393608360a4a0c6df", @ANYRES32=0x0, @ANYRESHEX, @ANYRESDEC=r7], 0x8, 0x2) r9 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x30000000000000, 0x0) sendmsg$unix(r9, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="67da1f1600be5e1e89443fca6c93737f7f652141e9cbab885cdf4ee4709de86a5de321ab10", 0x25}, {&(0x7f0000000180)="2ab665d6f569e4eb", 0x8}, {&(0x7f00000001c0)="c427be4137610a83ce1dbc716833e8a046316b99fa229b7e9da369e89dc3247e082a9102", 0x24}], 0x3, 0x0, 0x0, 0x8040001}, 0x14044010) r10 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r10, 0x4000000000000002) dup2(r10, r6) gettid() 05:24:02 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 466.767910][T12746] IPVS: Unknown mcast interface: syzkaller1 05:24:02 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:02 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/9, 0x9}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e005c1) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x91, 0x0, 0x0, 0x800e004e1) shutdown(r2, 0x0) 05:24:03 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 467.130456][T12770] IPVS: Unknown mcast interface: syzkaller1 05:24:03 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 467.370776][T12782] IPVS: Unknown mcast interface: syzkaller1 05:24:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:05 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:05 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:05 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x101, {{0xa, 0x0, 0x10000, @mcast1}}}, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e20, 0x3, @mcast2, 0x5}, {0xa, 0x4e23, 0x7fff, @loopback, 0x8}, 0x5, [0xffff, 0x3, 0x4, 0x7, 0x0, 0x3, 0x5, 0x9]}, 0x5c) getsockname$ax25(r0, &(0x7f00000002c0)={{0x3, @bcast}, [@netrom, @netrom, @null, @netrom, @default, @rose, @default, @rose]}, &(0x7f0000000340)=0x48) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) close(r1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x40047452, 0x0) getpid() r5 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000000)={0x0, r5}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r8, 0x4b65, 0x10000) fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="a164c3419219612aaaf4f77df9617e6c0e80299d780616e13d72008afb91ad629e948b413d8a7cc3809408af9424ece91d9e8da1820cad7460e379553559", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ccead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306", @ANYBLOB="523b6e6f30b336731bb411b62e8e1a2854e393608360a4a0c6df", @ANYRES32=0x0, @ANYRESHEX, @ANYRESDEC=r7], 0x8, 0x2) r9 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x30000000000000, 0x0) sendmsg$unix(r9, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="67da1f1600be5e1e89443fca6c93737f7f652141e9cbab885cdf4ee4709de86a5de321ab10", 0x25}, {&(0x7f0000000180)="2ab665d6f569e4eb", 0x8}, {&(0x7f00000001c0)="c427be4137610a83ce1dbc716833e8a046316b99fa229b7e9da369e89dc3247e082a9102", 0x24}], 0x3, 0x0, 0x0, 0x8040001}, 0x14044010) r10 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r10, 0x4000000000000002) dup2(r10, r6) gettid() 05:24:05 executing program 1: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r2, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r2, 0x0) lseek(r1, 0x20400001, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 05:24:05 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:05 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:06 executing program 1: 05:24:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:06 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:06 executing program 1: [ 470.561125][T12832] IPVS: Unknown mcast interface: syzkaller1 05:24:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:08 executing program 1: 05:24:08 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x101, {{0xa, 0x0, 0x10000, @mcast1}}}, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000380)={{0xa, 0x4e20, 0x3, @mcast2, 0x5}, {0xa, 0x4e23, 0x7fff, @loopback, 0x8}, 0x5, [0xffff, 0x3, 0x4, 0x7, 0x0, 0x3, 0x5, 0x9]}, 0x5c) getsockname$ax25(r0, &(0x7f00000002c0)={{0x3, @bcast}, [@netrom, @netrom, @null, @netrom, @default, @rose, @default, @rose]}, &(0x7f0000000340)=0x48) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) close(r1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r4, 0x40047452, 0x0) getpid() r5 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000000)={0x0, r5}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBLED(r8, 0x4b65, 0x10000) fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="a164c3419219612aaaf4f77df9617e6c0e80299d780616e13d72008afb91ad629e948b413d8a7cc3809408af9424ece91d9e8da1820cad7460e379553559", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ccead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306", @ANYBLOB="523b6e6f30b336731bb411b62e8e1a2854e393608360a4a0c6df", @ANYRES32=0x0, @ANYRESHEX, @ANYRESDEC=r7], 0x8, 0x2) r9 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x30000000000000, 0x0) sendmsg$unix(r9, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="67da1f1600be5e1e89443fca6c93737f7f652141e9cbab885cdf4ee4709de86a5de321ab10", 0x25}, {&(0x7f0000000180)="2ab665d6f569e4eb", 0x8}, {&(0x7f00000001c0)="c427be4137610a83ce1dbc716833e8a046316b99fa229b7e9da369e89dc3247e082a9102", 0x24}], 0x3, 0x0, 0x0, 0x8040001}, 0x14044010) r10 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r10, 0x4000000000000002) dup2(r10, r6) gettid() 05:24:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:08 executing program 1: 05:24:09 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:09 executing program 1: 05:24:09 executing program 1: [ 473.215561][T12865] FAT-fs (loop5): bogus number of reserved sectors [ 473.240288][T12865] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:09 executing program 1: [ 473.711497][T12886] FAT-fs (loop5): bogus number of reserved sectors [ 473.718058][T12886] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:11 executing program 1: 05:24:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:11 executing program 2: 05:24:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 476.019242][T12898] IPVS: Unknown mcast interface: syzkaller1 [ 476.059661][T12901] FAT-fs (loop5): bogus number of reserved sectors [ 476.101564][T12901] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:12 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:12 executing program 1: 05:24:12 executing program 2: 05:24:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:12 executing program 1: [ 476.321430][T12917] FAT-fs (loop5): bogus number of reserved sectors [ 476.334897][T12917] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:12 executing program 2: 05:24:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:15 executing program 1: 05:24:15 executing program 2: [ 479.124145][T12941] IPVS: Unknown mcast interface: syzkaller1 [ 479.233483][T12939] FAT-fs (loop5): bogus number of reserved sectors [ 479.258731][T12939] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:15 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:15 executing program 2: 05:24:15 executing program 1: 05:24:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:15 executing program 1: 05:24:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:15 executing program 2: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x4b040000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000600900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 05:24:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 479.502452][T12960] IPVS: Unknown mcast interface: syzkaller1 [ 479.651522][T12969] FAT-fs (loop5): bogus number of reserved sectors [ 479.675924][T12969] FAT-fs (loop5): Can't find a valid FAT filesystem [ 479.692224][T12975] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:24:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) [ 479.700099][T12975] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 479.708768][T12975] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 479.717196][T12975] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock 05:24:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 479.758851][T12981] IPVS: Unknown mcast interface: syzkaller1 05:24:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 479.854278][T12975] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 479.871529][T12975] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 479.880279][T12975] F2FS-fs (loop2): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 479.888144][T12975] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 480.014370][T12996] FAT-fs (loop5): bogus number of reserved sectors [ 480.021130][T12996] FAT-fs (loop5): Can't find a valid FAT filesystem [ 480.071567][T12998] IPVS: Unknown mcast interface: syzkaller1 05:24:18 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:18 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0xffffffeb, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "8fd5e3", "22f85c9d284d0752dff8a4c413a0be13b658d4417cb4b431924bead73fd96de50e66c9f6dcb9afb3bb3d0d907fc4276abf60b827ee38928bf6bfc16323a98a54bc707f871affafffbdff0b3a9a573d1f49511b6332aa7341d79a48cf20d2e9fc5a5883cbe8c3557ebe28f00e89f8a8255b91c707d22cde26deac2e4d6ac6f87151c1d5e2ef01e5f570a9fa461a81ef0fecb0c40251ee204a3243f91cbf783c0354b010020601715841e385bb2e67d43c1f60d24dabbe1bc6409d55a23aea90051823a73fa159cc47ae0b240f4b66e4dc637bd47c65f2fc0b578fe2177b464b04d53bd43e1e3dc7995d54f9b691ad77a083af4713ce08aa65bae01901453d1c1c"}}, 0x110) 05:24:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:18 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000200)=@raw={'raw\x00', 0x2, 0x3, 0x280, 0x0, 0x128, 0x128, 0x0, 0x0, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, 'irlan0\x00', 'veth0\x00', {}, {}, 0x21}, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e0) getpid() semget$private(0x0, 0x0, 0x0) semop(0x0, 0x0, 0xfffffffffffffdba) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) 05:24:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 482.557053][T13014] FAT-fs (loop5): bogus number of reserved sectors 05:24:18 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) rt_sigtimedwait(&(0x7f0000000000)={0xffffffff}, 0x0, 0x0, 0x8) [ 482.603787][T13014] FAT-fs (loop5): Can't find a valid FAT filesystem [ 482.626776][T13016] xt_CT: No such helper "pptp" [ 482.644458][T13018] IPVS: Unknown mcast interface: syzkaller1 05:24:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 482.706861][T13024] xt_CT: No such helper "pptp" 05:24:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:18 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 482.848012][T13048] IPVS: Unknown mcast interface: syzkaller1 [ 482.866247][T13045] FAT-fs (loop5): bogus number of reserved sectors [ 482.878984][T13045] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:19 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) rt_sigtimedwait(&(0x7f0000000000)={0xffffffff}, 0x0, 0x0, 0x8) 05:24:21 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:21 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:21 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) rt_sigtimedwait(&(0x7f0000000000)={0xffffffff}, 0x0, 0x0, 0x8) 05:24:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:21 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 485.721675][T13086] FAT-fs (loop5): bogus number of reserved sectors [ 485.742930][T13086] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 485.972078][T13085] ERROR: Domain ' /sbin/init /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 dev(8,1):/root/syzkaller-testdir806147032/syzkaller.Dq4ohP/146/file0' not defined. 05:24:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 486.134890][T13118] FAT-fs (loop5): bogus number of reserved sectors [ 486.147148][T13118] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 486.332589][T13129] FAT-fs (loop5): bogus number of reserved sectors [ 486.339147][T13129] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:24 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:24 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 488.688662][T13142] IPVS: Unknown mcast interface: syzkaller1 [ 488.721536][T13147] FAT-fs (loop5): bogus number of reserved sectors [ 488.731594][T13147] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:24 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:24 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 488.945696][T13165] IPVS: Unknown mcast interface: syzkaller1 05:24:25 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 489.060420][T13171] FAT-fs (loop5): bogus number of reserved sectors 05:24:25 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 489.103700][T13171] FAT-fs (loop5): Can't find a valid FAT filesystem [ 489.284241][T13185] IPVS: Unknown mcast interface: syzkaller1 05:24:27 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:27 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:24:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:27 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:24:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 491.842359][T13201] FAT-fs (loop5): bogus number of reserved sectors [ 491.849084][T13201] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:27 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:24:28 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:24:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:28 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 492.126203][T13227] FAT-fs (loop5): bogus number of reserved sectors 05:24:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 492.166509][T13227] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:28 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f00000001c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 05:24:28 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 492.511090][T13259] FAT-fs (loop5): bogus number of reserved sectors [ 492.525707][T13259] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:28 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:28 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 492.976170][T13298] FAT-fs (loop5): bogus number of reserved sectors 05:24:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 493.024637][T13298] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:29 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 493.365779][T13328] FAT-fs (loop5): invalid media value (0x00) [ 493.372123][T13328] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, 0x0, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:31 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 495.763653][T13346] FAT-fs (loop5): invalid media value (0x00) [ 495.775410][T13346] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:31 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 496.007207][T13360] FAT-fs (loop5): invalid media value (0x00) [ 496.054821][T13360] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:32 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x0, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:32 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 496.358304][T13376] FAT-fs (loop5): invalid media value (0x00) 05:24:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r4, 0x531, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 496.408415][T13376] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:34 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r4, 0x531, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 498.811558][T13407] FAT-fs (loop5): invalid media value (0x00) [ 498.817610][T13407] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r4, 0x531, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 499.011857][T13417] FAT-fs (loop5): invalid media value (0x00) [ 499.027800][T13417] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:35 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:35 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:35 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 499.570888][T13448] FAT-fs (loop5): invalid media value (0x00) [ 499.595646][T13448] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 499.892802][T13467] FAT-fs (loop5): invalid media value (0x00) [ 499.907872][T13467] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x34, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x34}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 500.112528][T13481] FAT-fs (loop5): invalid media value (0x00) [ 500.118676][T13481] FAT-fs (loop5): Can't find a valid FAT filesystem 05:24:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x28}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:38 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:38 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x28}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:38 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x28}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:38 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:38 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:38 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:41 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e2"], 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:41 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 505.540972][T13535] IPVS: Unknown mcast interface: syzkaller1 [ 505.652122][T13545] IPVS: Unknown mcast interface: syzkaller1 05:24:41 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23d"], 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 505.793352][T13555] IPVS: Unknown mcast interface: syzkaller1 05:24:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:41 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 505.918063][T13563] IPVS: Unknown mcast interface: syzkaller1 [ 506.145363][T13577] IPVS: Unknown mcast interface: syzkaller1 05:24:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:44 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r3, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:24:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:44 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:44 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23d"], 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 508.765381][T13588] IPVS: Unknown mcast interface: syzkaller1 05:24:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:24:44 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23d"], 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:45 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23d"], 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 05:24:45 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 05:24:47 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:47 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 05:24:47 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:47 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23d"], 0x3) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:47 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x0, 'Q'}, 0x0) 05:24:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:48 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x0, 'Q'}, 0x0) 05:24:48 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:48 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x0, 'Q'}, 0x0) 05:24:48 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:48 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 512.625238][T13687] ptrace attach of "/root/syz-executor.3"[13684] was attempted by "/root/syz-executor.3"[13687] [ 512.831688][T13700] ptrace attach of "/root/syz-executor.3"[13698] was attempted by "/root/syz-executor.3"[13700] 05:24:50 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:50 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x1}, 0x0) 05:24:50 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 515.015680][T13716] ptrace attach of "/root/syz-executor.3"[13710] was attempted by "/root/syz-executor.3"[13716] 05:24:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:51 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x1}, 0x0) 05:24:51 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:51 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:51 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x8, 0x1}, 0x0) [ 515.393170][T13734] ptrace attach of "/root/syz-executor.1"[13726] was attempted by "/root/syz-executor.1"[13734] 05:24:51 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 515.585184][T13740] ptrace attach of "/root/syz-executor.0"[13728] was attempted by "/root/syz-executor.0"[13740] [ 515.845545][T13752] ptrace attach of "/root/syz-executor.0"[13750] was attempted by "/root/syz-executor.0"[13752] 05:24:53 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:53 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:53 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:53 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:54 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:54 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:54 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:54 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:54 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:54 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:54 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:56 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000001c0)={0x9f0000, 0x7, 0xfffff6b1, r6, 0x0, &(0x7f0000000180)={0x9a0001, 0xc9, [], @p_u32=&(0x7f0000000100)=0x80000000}}) 05:24:56 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:56 executing program 5: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:56 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:24:57 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:57 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000001c0)={0x9f0000, 0x7, 0xfffff6b1, r6, 0x0, &(0x7f0000000180)={0x9a0001, 0xc9, [], @p_u32=&(0x7f0000000100)=0x80000000}}) 05:24:57 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:57 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000001c0)={0x9f0000, 0x7, 0xfffff6b1, r6, 0x0, &(0x7f0000000180)={0x9a0001, 0xc9, [], @p_u32=&(0x7f0000000100)=0x80000000}}) 05:24:57 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:57 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000001c0)={0x9f0000, 0x7, 0xfffff6b1, r6, 0x0, &(0x7f0000000180)={0x9a0001, 0xc9, [], @p_u32=&(0x7f0000000100)=0x80000000}}) 05:24:57 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:57 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:24:57 executing program 0: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 05:24:57 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:24:57 executing program 5 (fault-call:2 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 522.098095][T13843] FAULT_INJECTION: forcing a failure. [ 522.098095][T13843] name failslab, interval 1, probability 0, space 0, times 1 [ 522.118364][T13843] CPU: 1 PID: 13843 Comm: syz-executor.5 Not tainted 5.5.0-rc3-syzkaller #0 [ 522.128034][T13843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.128042][T13843] Call Trace: [ 522.128166][T13843] dump_stack+0x197/0x210 [ 522.128210][T13843] should_fail.cold+0xa/0x15 [ 522.150470][T13843] ? fault_create_debugfs_attr+0x180/0x180 [ 522.157836][T13843] ? ___might_sleep+0x163/0x2c0 [ 522.162812][T13843] __should_failslab+0x121/0x190 [ 522.167820][T13843] should_failslab+0x9/0x14 [ 522.172344][T13843] __kmalloc+0x2e0/0x770 [ 522.176647][T13843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 522.183056][T13843] ? do_handle_open+0x114/0x790 [ 522.187922][T13843] do_handle_open+0x114/0x790 [ 522.192629][T13843] ? do_sys_name_to_handle.isra.0+0x4d0/0x4d0 [ 522.192678][T13843] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.192699][T13843] ? do_syscall_64+0x26/0x790 [ 522.208944][T13843] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.215032][T13843] ? do_syscall_64+0x26/0x790 [ 522.219726][T13843] __x64_sys_open_by_handle_at+0x76/0xb0 [ 522.225376][T13843] do_syscall_64+0xfa/0x790 [ 522.229898][T13843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.235801][T13843] RIP: 0033:0x45a919 [ 522.239709][T13843] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.259756][T13843] RSP: 002b:00007f46126b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 522.268220][T13843] RAX: ffffffffffffffda RBX: 00007f46126b6c90 RCX: 000000000045a919 [ 522.277015][T13843] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 522.284979][T13843] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.292942][T13843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46126b76d4 [ 522.300964][T13843] R13: 00000000004c7e58 R14: 00000000004df020 R15: 0000000000000004 05:25:00 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:00 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 05:25:00 executing program 5 (fault-call:2 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:00 executing program 1 (fault-call:10 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 524.546598][T13856] FAULT_INJECTION: forcing a failure. [ 524.546598][T13856] name failslab, interval 1, probability 0, space 0, times 0 [ 524.552462][T13853] IPVS: Unknown mcast interface: syzkaller1 [ 524.595806][T13856] CPU: 1 PID: 13856 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 524.604629][T13856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.614698][T13856] Call Trace: [ 524.618027][T13856] dump_stack+0x197/0x210 [ 524.622380][T13856] should_fail.cold+0xa/0x15 [ 524.626994][T13856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 524.633261][T13856] ? fault_create_debugfs_attr+0x180/0x180 [ 524.639102][T13856] ? ___might_sleep+0x163/0x2c0 [ 524.643979][T13856] __should_failslab+0x121/0x190 [ 524.649113][T13856] should_failslab+0x9/0x14 [ 524.653636][T13856] __kmalloc+0x2e0/0x770 [ 524.657962][T13856] ? dup_iter+0x260/0x260 [ 524.662312][T13856] ? _copy_from_user+0x12c/0x1a0 [ 524.667323][T13856] ? sock_kmalloc+0xc6/0x120 [ 524.671930][T13856] sock_kmalloc+0xc6/0x120 [ 524.676422][T13856] ____sys_sendmsg+0x696/0x880 [ 524.681205][T13856] ? kernel_sendmsg+0x50/0x50 [ 524.685924][T13856] ? __fget+0x35d/0x550 [ 524.686738][T13865] IPVS: Unknown mcast interface: syzkaller1 [ 524.690162][T13856] ? find_held_lock+0x35/0x130 [ 524.690190][T13856] ___sys_sendmsg+0x100/0x170 [ 524.705523][T13856] ? sendmsg_copy_msghdr+0x70/0x70 [ 524.710649][T13856] ? __kasan_check_read+0x11/0x20 [ 524.715690][T13856] ? __fget+0x37f/0x550 [ 524.719869][T13856] ? ksys_dup3+0x3e0/0x3e0 [ 524.724298][T13856] ? find_held_lock+0x35/0x130 [ 524.729773][T13856] ? get_pid_task+0x11d/0x210 [ 524.734468][T13856] ? __fget_light+0x1a9/0x230 [ 524.739155][T13856] ? __fdget+0x1b/0x20 [ 524.743235][T13856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 524.749483][T13856] ? sockfd_lookup_light+0xcb/0x180 [ 524.750963][T13868] IPVS: Unknown mcast interface: syzkaller1 [ 524.754691][T13856] __sys_sendmmsg+0x1bf/0x4d0 [ 524.754716][T13856] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 524.754761][T13856] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.754837][T13856] ? fput_many+0x12c/0x1a0 [ 524.754856][T13856] ? fput+0x1b/0x20 [ 524.766063][T13870] IPVS: Unknown mcast interface: syzkaller1 [ 524.770456][T13856] ? ksys_write+0x1cf/0x290 [ 524.770480][T13856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.770497][T13856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.770513][T13856] ? do_syscall_64+0x26/0x790 [ 524.770527][T13856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.770547][T13856] ? do_syscall_64+0x26/0x790 [ 524.784992][T13856] __x64_sys_sendmmsg+0x9d/0x100 [ 524.800816][T13856] do_syscall_64+0xfa/0x790 [ 524.800841][T13856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.800853][T13856] RIP: 0033:0x45a919 [ 524.800874][T13856] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.841832][T13874] IPVS: Unknown mcast interface: syzkaller1 [ 524.860696][T13856] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 524.860729][T13856] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 524.860736][T13856] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf, 0x0) 05:25:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf00, 0x0) 05:25:00 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:00 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 524.860743][T13856] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.860752][T13856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 524.860760][T13856] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 524.928003][T13877] IPVS: Unknown mcast interface: syzkaller1 05:25:01 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 525.103174][T13890] FAULT_INJECTION: forcing a failure. [ 525.103174][T13890] name failslab, interval 1, probability 0, space 0, times 0 [ 525.117547][T13890] CPU: 0 PID: 13890 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 525.126234][T13890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.136326][T13890] Call Trace: [ 525.139649][T13890] dump_stack+0x197/0x210 [ 525.143999][T13890] should_fail.cold+0xa/0x15 [ 525.148611][T13890] ? fault_create_debugfs_attr+0x180/0x180 [ 525.154441][T13890] ? mark_held_locks+0xf0/0xf0 [ 525.159222][T13890] ? mark_held_locks+0xa4/0xf0 [ 525.164007][T13890] __should_failslab+0x121/0x190 [ 525.168963][T13890] should_failslab+0x9/0x14 [ 525.173477][T13890] kmem_cache_alloc+0x47/0x710 [ 525.178255][T13890] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 525.184086][T13890] sctp_get_port_local+0xb64/0x1600 [ 525.189309][T13890] ? sctp_set_owner_w+0x4f0/0x4f0 [ 525.194341][T13890] ? __kasan_check_read+0x11/0x20 [ 525.199380][T13890] ? sctp_bind_addr_match+0x1de/0x2c0 [ 525.204777][T13890] sctp_do_bind+0x20f/0x5d0 [ 525.209300][T13890] sctp_autobind+0x168/0x1e0 [ 525.213905][T13890] ? mark_held_locks+0xa4/0xf0 [ 525.218688][T13890] ? sctp_do_bind+0x5d0/0x5d0 [ 525.223488][T13890] ? lock_sock_nested+0xe2/0x120 [ 525.228442][T13890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.234765][T13890] ? selinux_sctp_bind_connect+0x13b/0x2d0 [ 525.240612][T13890] ? trace_hardirqs_on+0x67/0x240 [ 525.245797][T13890] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 525.251716][T13890] sctp_connect_new_asoc+0x44e/0x5a0 [ 525.257096][T13890] ? security_sctp_bind_connect+0x93/0xc0 [ 525.262848][T13890] sctp_sendmsg+0x13a0/0x1f10 [ 525.267556][T13890] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 525.273468][T13890] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 525.279462][T13890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.285820][T13890] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 525.292264][T13890] ? tomoyo_socket_bind_permission+0x360/0x360 05:25:01 executing program 2: [ 525.298446][T13890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.304731][T13890] inet_sendmsg+0x9e/0xe0 [ 525.309073][T13890] ? inet_send_prepare+0x4e0/0x4e0 [ 525.314197][T13890] sock_sendmsg+0xd7/0x130 [ 525.318626][T13890] ____sys_sendmsg+0x358/0x880 [ 525.323403][T13890] ? kernel_sendmsg+0x50/0x50 [ 525.328094][T13890] ? __fget+0x35d/0x550 [ 525.332262][T13890] ? find_held_lock+0x35/0x130 [ 525.337054][T13890] ___sys_sendmsg+0x100/0x170 [ 525.341749][T13890] ? sendmsg_copy_msghdr+0x70/0x70 [ 525.346871][T13890] ? __kasan_check_read+0x11/0x20 [ 525.351910][T13890] ? __fget+0x37f/0x550 [ 525.356088][T13890] ? ksys_dup3+0x3e0/0x3e0 [ 525.360492][T13890] ? find_held_lock+0x35/0x130 [ 525.365242][T13890] ? get_pid_task+0x11d/0x210 [ 525.369907][T13890] ? __fget_light+0x1a9/0x230 [ 525.374577][T13890] ? __fdget+0x1b/0x20 [ 525.378639][T13890] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 525.384884][T13890] ? sockfd_lookup_light+0xcb/0x180 [ 525.390100][T13890] __sys_sendmmsg+0x1bf/0x4d0 [ 525.394789][T13890] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 525.399902][T13890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.406149][T13890] ? fput_many+0x12c/0x1a0 [ 525.410587][T13890] ? fput+0x1b/0x20 [ 525.414410][T13890] ? ksys_write+0x1cf/0x290 [ 525.418926][T13890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.424386][T13890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.429932][T13890] ? do_syscall_64+0x26/0x790 [ 525.434608][T13890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.440757][T13890] ? do_syscall_64+0x26/0x790 [ 525.445481][T13890] __x64_sys_sendmmsg+0x9d/0x100 [ 525.450418][T13890] do_syscall_64+0xfa/0x790 [ 525.454920][T13890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.460851][T13890] RIP: 0033:0x45a919 [ 525.464742][T13890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.484440][T13890] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 525.492859][T13890] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 525.500825][T13890] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 525.508786][T13890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.516745][T13890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 525.524716][T13890] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x20000051, 0x1, 'Q'}, 0x0) 05:25:03 executing program 2: 05:25:03 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 527.725836][T13902] FAULT_INJECTION: forcing a failure. [ 527.725836][T13902] name failslab, interval 1, probability 0, space 0, times 0 [ 527.741625][T13902] CPU: 0 PID: 13902 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 527.750355][T13902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.760424][T13902] Call Trace: [ 527.763740][T13902] dump_stack+0x197/0x210 [ 527.768098][T13902] should_fail.cold+0xa/0x15 [ 527.772710][T13902] ? fault_create_debugfs_attr+0x180/0x180 [ 527.778535][T13902] ? sctp_get_port_local+0xf1f/0x1600 [ 527.783985][T13902] ? __local_bh_enable_ip+0x15a/0x270 [ 527.789417][T13902] __should_failslab+0x121/0x190 [ 527.794553][T13902] should_failslab+0x9/0x14 [ 527.799164][T13902] kmem_cache_alloc_trace+0x4b/0x790 [ 527.804452][T13902] ? sctp_set_owner_w+0x4f0/0x4f0 [ 527.809477][T13902] ? __kasan_check_read+0x11/0x20 [ 527.814702][T13902] sctp_add_bind_addr+0x9f/0x3a0 [ 527.819687][T13902] sctp_do_bind+0x2fa/0x5d0 [ 527.824225][T13902] sctp_autobind+0x168/0x1e0 [ 527.828836][T13902] ? mark_held_locks+0xa4/0xf0 [ 527.833621][T13902] ? sctp_do_bind+0x5d0/0x5d0 [ 527.838328][T13902] ? lock_sock_nested+0xe2/0x120 [ 527.843292][T13902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 527.843345][T13902] ? selinux_sctp_bind_connect+0x13b/0x2d0 [ 527.855384][T13902] ? trace_hardirqs_on+0x67/0x240 [ 527.855404][T13902] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 527.855425][T13902] sctp_connect_new_asoc+0x44e/0x5a0 05:25:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x300, 'Q'}, 0x0) 05:25:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x3f00, 0x0) 05:25:03 executing program 2: [ 527.855448][T13902] ? security_sctp_bind_connect+0x93/0xc0 [ 527.877450][T13902] sctp_sendmsg+0x13a0/0x1f10 [ 527.882174][T13902] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 527.888537][T13902] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 527.894450][T13902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.900762][T13902] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 527.907188][T13902] ? tomoyo_socket_bind_permission+0x360/0x360 [ 527.913929][T13902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 527.920192][T13902] inet_sendmsg+0x9e/0xe0 [ 527.924545][T13902] ? inet_send_prepare+0x4e0/0x4e0 [ 527.929764][T13902] sock_sendmsg+0xd7/0x130 [ 527.934269][T13902] ____sys_sendmsg+0x358/0x880 [ 527.939061][T13902] ? kernel_sendmsg+0x50/0x50 [ 527.941680][T13909] IPVS: Unknown mcast interface: syzkaller1 [ 527.943775][T13902] ? __fget+0x35d/0x550 [ 527.943792][T13902] ? find_held_lock+0x35/0x130 [ 527.943828][T13902] ___sys_sendmsg+0x100/0x170 [ 527.943853][T13902] ? sendmsg_copy_msghdr+0x70/0x70 [ 527.960869][T13911] IPVS: Unknown mcast interface: syzkaller1 [ 527.963486][T13902] ? __kasan_check_read+0x11/0x20 [ 527.963515][T13902] ? __fget+0x37f/0x550 [ 527.963540][T13902] ? ksys_dup3+0x3e0/0x3e0 [ 527.963555][T13902] ? find_held_lock+0x35/0x130 [ 527.963571][T13902] ? get_pid_task+0x11d/0x210 [ 527.963589][T13902] ? __fget_light+0x1a9/0x230 [ 527.963614][T13902] ? __fdget+0x1b/0x20 [ 528.006501][T13902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.012870][T13902] ? sockfd_lookup_light+0xcb/0x180 [ 528.018094][T13902] __sys_sendmmsg+0x1bf/0x4d0 05:25:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:04 executing program 2: [ 528.022847][T13902] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 528.027905][T13902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 528.034453][T13902] ? fput_many+0x12c/0x1a0 [ 528.038894][T13902] ? fput+0x1b/0x20 [ 528.042716][T13902] ? ksys_write+0x1cf/0x290 [ 528.047353][T13902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.052836][T13902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.058404][T13902] ? do_syscall_64+0x26/0x790 [ 528.063108][T13902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.069194][T13902] ? do_syscall_64+0x26/0x790 [ 528.073891][T13902] __x64_sys_sendmmsg+0x9d/0x100 [ 528.073912][T13902] do_syscall_64+0xfa/0x790 [ 528.073931][T13902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.073949][T13902] RIP: 0033:0x45a919 [ 528.093506][T13902] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.093514][T13902] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 05:25:04 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:04 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 528.093528][T13902] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 528.093537][T13902] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 528.093545][T13902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 528.093553][T13902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 528.093562][T13902] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 528.285405][T13925] FAULT_INJECTION: forcing a failure. [ 528.285405][T13925] name failslab, interval 1, probability 0, space 0, times 0 [ 528.345407][T13925] CPU: 0 PID: 13925 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 528.354131][T13925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.364660][T13925] Call Trace: [ 528.367972][T13925] dump_stack+0x197/0x210 [ 528.372328][T13925] should_fail.cold+0xa/0x15 [ 528.376943][T13925] ? fault_create_debugfs_attr+0x180/0x180 [ 528.382773][T13925] ? ___might_sleep+0x163/0x2c0 [ 528.387641][T13925] __should_failslab+0x121/0x190 [ 528.393037][T13925] should_failslab+0x9/0x14 [ 528.397553][T13925] kmem_cache_alloc_trace+0x2d3/0x790 [ 528.402948][T13925] ? sctp_autobind+0x168/0x1e0 [ 528.407715][T13925] ? mark_held_locks+0xa4/0xf0 [ 528.412478][T13925] sctp_association_new+0x93/0x2160 [ 528.412493][T13925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.412505][T13925] ? sctp_v4_scope+0x189/0x1b0 [ 528.412525][T13925] sctp_connect_new_asoc+0x157/0x5a0 [ 528.412541][T13925] ? security_sctp_bind_connect+0x93/0xc0 [ 528.412560][T13925] sctp_sendmsg+0x13a0/0x1f10 [ 528.444495][T13925] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 528.450421][T13925] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 528.456331][T13925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.462591][T13925] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 528.469117][T13925] ? tomoyo_socket_bind_permission+0x360/0x360 [ 528.475308][T13925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 528.481571][T13925] inet_sendmsg+0x9e/0xe0 [ 528.485911][T13925] ? inet_send_prepare+0x4e0/0x4e0 [ 528.491021][T13925] sock_sendmsg+0xd7/0x130 [ 528.495453][T13925] ____sys_sendmsg+0x358/0x880 [ 528.500239][T13925] ? kernel_sendmsg+0x50/0x50 [ 528.504928][T13925] ? __fget+0x35d/0x550 [ 528.509095][T13925] ? find_held_lock+0x35/0x130 [ 528.513885][T13925] ___sys_sendmsg+0x100/0x170 [ 528.518582][T13925] ? sendmsg_copy_msghdr+0x70/0x70 [ 528.523708][T13925] ? __kasan_check_read+0x11/0x20 [ 528.528749][T13925] ? __fget+0x37f/0x550 [ 528.532922][T13925] ? ksys_dup3+0x3e0/0x3e0 [ 528.537369][T13925] ? find_held_lock+0x35/0x130 [ 528.542164][T13925] ? get_pid_task+0x11d/0x210 [ 528.546858][T13925] ? __fget_light+0x1a9/0x230 [ 528.551551][T13925] ? __fdget+0x1b/0x20 [ 528.555639][T13925] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 528.561917][T13925] ? sockfd_lookup_light+0xcb/0x180 [ 528.567141][T13925] __sys_sendmmsg+0x1bf/0x4d0 [ 528.571839][T13925] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 528.576898][T13925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 528.583145][T13925] ? fput_many+0x12c/0x1a0 [ 528.587544][T13925] ? fput+0x1b/0x20 [ 528.591339][T13925] ? ksys_write+0x1cf/0x290 [ 528.595847][T13925] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.601286][T13925] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.606725][T13925] ? do_syscall_64+0x26/0x790 [ 528.611417][T13925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.617826][T13925] ? do_syscall_64+0x26/0x790 [ 528.622660][T13925] __x64_sys_sendmmsg+0x9d/0x100 [ 528.627702][T13925] do_syscall_64+0xfa/0x790 [ 528.632190][T13925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.638078][T13925] RIP: 0033:0x45a919 [ 528.641962][T13925] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.661636][T13925] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 528.670176][T13925] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 528.678151][T13925] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 528.686105][T13925] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 528.694058][T13925] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 528.702013][T13925] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:06 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:06 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0xffffff1f, 'Q'}, 0x0) 05:25:06 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 530.827266][T13944] FAULT_INJECTION: forcing a failure. [ 530.827266][T13944] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 530.840514][T13944] CPU: 1 PID: 13944 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 530.849196][T13944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.859265][T13944] Call Trace: [ 530.862601][T13944] dump_stack+0x197/0x210 [ 530.866955][T13944] should_fail.cold+0xa/0x15 [ 530.871572][T13944] ? fault_create_debugfs_attr+0x180/0x180 [ 530.877406][T13944] ? __kasan_check_read+0x11/0x20 [ 530.882461][T13944] ? __lock_acquire+0x16f2/0x4a00 [ 530.887598][T13944] should_fail_alloc_page+0x50/0x60 [ 530.892830][T13944] __alloc_pages_nodemask+0x1a1/0x910 [ 530.898232][T13944] ? fs_reclaim_release+0xf/0x30 [ 530.903230][T13944] ? __alloc_pages_slowpath+0x2920/0x2920 [ 530.909919][T13944] ? fs_reclaim_release+0xf/0x30 [ 530.914864][T13944] ? fault_create_debugfs_attr+0x180/0x180 [ 530.920682][T13944] cache_grow_begin+0x90/0xc60 [ 530.925465][T13944] ? sctp_association_new+0x93/0x2160 [ 530.930842][T13944] ? trace_hardirqs_off+0x62/0x240 [ 530.935968][T13944] kmem_cache_alloc_trace+0x6b3/0x790 [ 530.941366][T13944] sctp_association_new+0x93/0x2160 [ 530.946591][T13944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.952856][T13944] ? sctp_v4_scope+0x189/0x1b0 [ 530.957645][T13944] sctp_connect_new_asoc+0x157/0x5a0 [ 530.962951][T13944] ? security_sctp_bind_connect+0x93/0xc0 [ 530.968693][T13944] sctp_sendmsg+0x13a0/0x1f10 [ 530.973373][T13944] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 530.979253][T13944] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 530.985140][T13944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.991382][T13944] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 530.997783][T13944] ? tomoyo_socket_bind_permission+0x360/0x360 [ 531.003934][T13944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 531.013376][T13944] inet_sendmsg+0x9e/0xe0 [ 531.017696][T13944] ? inet_send_prepare+0x4e0/0x4e0 [ 531.022801][T13944] sock_sendmsg+0xd7/0x130 [ 531.027225][T13944] ____sys_sendmsg+0x358/0x880 [ 531.031981][T13944] ? kernel_sendmsg+0x50/0x50 [ 531.036663][T13944] ? __fget+0x35d/0x550 [ 531.040806][T13944] ? find_held_lock+0x35/0x130 [ 531.045563][T13944] ___sys_sendmsg+0x100/0x170 [ 531.050228][T13944] ? sendmsg_copy_msghdr+0x70/0x70 [ 531.055328][T13944] ? __kasan_check_read+0x11/0x20 [ 531.060345][T13944] ? __fget+0x37f/0x550 [ 531.064491][T13944] ? ksys_dup3+0x3e0/0x3e0 [ 531.068894][T13944] ? find_held_lock+0x35/0x130 [ 531.073644][T13944] ? get_pid_task+0x11d/0x210 [ 531.078382][T13944] ? __fget_light+0x1a9/0x230 [ 531.083069][T13944] ? __fdget+0x1b/0x20 [ 531.087152][T13944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.093408][T13944] ? sockfd_lookup_light+0xcb/0x180 [ 531.098629][T13944] __sys_sendmmsg+0x1bf/0x4d0 [ 531.103304][T13944] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 531.108338][T13944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 531.114586][T13944] ? fput_many+0x12c/0x1a0 [ 531.119015][T13944] ? fput+0x1b/0x20 [ 531.122818][T13944] ? ksys_write+0x1cf/0x290 [ 531.127333][T13944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.132785][T13944] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.138230][T13944] ? do_syscall_64+0x26/0x790 [ 531.142920][T13944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.149001][T13944] ? do_syscall_64+0x26/0x790 [ 531.153682][T13944] __x64_sys_sendmmsg+0x9d/0x100 [ 531.158710][T13944] do_syscall_64+0xfa/0x790 [ 531.163208][T13944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.169099][T13944] RIP: 0033:0x45a919 [ 531.172993][T13944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.192595][T13944] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 531.200993][T13944] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 531.208969][T13944] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 531.216951][T13944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:25:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x4000, 0x0) 05:25:07 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 531.224932][T13944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 531.232912][T13944] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x2) [ 531.335008][T13961] IPVS: Unknown mcast interface: syzkaller1 [ 531.349013][T13963] IPVS: Unknown mcast interface: syzkaller1 05:25:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf00, 0x0) 05:25:07 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x4000) [ 531.563283][T13970] IPVS: Unknown mcast interface: syzkaller1 [ 531.629534][T13978] FAULT_INJECTION: forcing a failure. [ 531.629534][T13978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 531.642955][T13978] CPU: 0 PID: 13978 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 531.651642][T13978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.661843][T13978] Call Trace: [ 531.665159][T13978] dump_stack+0x197/0x210 [ 531.669512][T13978] should_fail.cold+0xa/0x15 [ 531.674132][T13978] ? fault_create_debugfs_attr+0x180/0x180 [ 531.679967][T13978] ? ___might_sleep+0x163/0x2c0 [ 531.684939][T13978] should_fail_alloc_page+0x50/0x60 [ 531.690157][T13978] __alloc_pages_nodemask+0x1a1/0x910 [ 531.695555][T13978] ? __alloc_pages_slowpath+0x2920/0x2920 [ 531.701270][T13978] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 531.707129][T13978] ? __debug_object_init+0x186/0xee0 [ 531.712406][T13978] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 531.718206][T13978] ? trace_hardirqs_on+0x67/0x240 [ 531.723220][T13978] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 531.729486][T13978] alloc_pages_current+0x107/0x210 [ 531.734593][T13978] __get_free_pages+0xc/0x40 [ 531.739170][T13978] __genradix_ptr_alloc+0x15c/0x3a0 [ 531.744359][T13978] __genradix_prealloc+0x5b/0x80 [ 531.749288][T13978] sctp_stream_alloc_out.part.0+0x55/0xd0 [ 531.754999][T13978] sctp_stream_init+0x27d/0x3d0 [ 531.759841][T13978] sctp_association_new+0x12f3/0x2160 [ 531.765200][T13978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.771434][T13978] sctp_connect_new_asoc+0x157/0x5a0 [ 531.776712][T13978] ? security_sctp_bind_connect+0x93/0xc0 [ 531.782421][T13978] sctp_sendmsg+0x13a0/0x1f10 [ 531.787106][T13978] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 531.792989][T13978] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 531.798884][T13978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.805126][T13978] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 531.811534][T13978] ? tomoyo_socket_bind_permission+0x360/0x360 [ 531.817695][T13978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 531.823947][T13978] inet_sendmsg+0x9e/0xe0 [ 531.828267][T13978] ? inet_send_prepare+0x4e0/0x4e0 [ 531.833399][T13978] sock_sendmsg+0xd7/0x130 [ 531.837823][T13978] ____sys_sendmsg+0x358/0x880 [ 531.842581][T13978] ? kernel_sendmsg+0x50/0x50 [ 531.847244][T13978] ? __fget+0x35d/0x550 [ 531.851386][T13978] ? find_held_lock+0x35/0x130 [ 531.856161][T13978] ___sys_sendmsg+0x100/0x170 [ 531.860830][T13978] ? sendmsg_copy_msghdr+0x70/0x70 [ 531.865968][T13978] ? __kasan_check_read+0x11/0x20 [ 531.870990][T13978] ? __fget+0x37f/0x550 [ 531.875141][T13978] ? ksys_dup3+0x3e0/0x3e0 [ 531.879560][T13978] ? find_held_lock+0x35/0x130 [ 531.884341][T13978] ? get_pid_task+0x11d/0x210 [ 531.889017][T13978] ? __fget_light+0x1a9/0x230 [ 531.893706][T13978] ? __fdget+0x1b/0x20 [ 531.897771][T13978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.904102][T13978] ? sockfd_lookup_light+0xcb/0x180 [ 531.909288][T13978] __sys_sendmmsg+0x1bf/0x4d0 [ 531.913958][T13978] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 531.918984][T13978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 531.925226][T13978] ? fput_many+0x12c/0x1a0 [ 531.929627][T13978] ? fput+0x1b/0x20 [ 531.933442][T13978] ? ksys_write+0x1cf/0x290 [ 531.937934][T13978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.943395][T13978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.948839][T13978] ? do_syscall_64+0x26/0x790 [ 531.953607][T13978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.959699][T13978] ? do_syscall_64+0x26/0x790 [ 531.964394][T13978] __x64_sys_sendmmsg+0x9d/0x100 [ 531.969354][T13978] do_syscall_64+0xfa/0x790 [ 531.973857][T13978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.979743][T13978] RIP: 0033:0x45a919 [ 531.983634][T13978] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.003246][T13978] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 532.011648][T13978] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 532.019633][T13978] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf00, 0x0) [ 532.027606][T13978] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 532.035565][T13978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 532.043524][T13978] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 532.158490][T13982] IPVS: Unknown mcast interface: syzkaller1 05:25:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:09 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf00, 0x0) 05:25:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x1000000) 05:25:09 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 533.875368][T13998] FAULT_INJECTION: forcing a failure. [ 533.875368][T13998] name failslab, interval 1, probability 0, space 0, times 0 [ 533.980376][T14001] IPVS: Unknown mcast interface: syzkaller1 [ 534.001906][T13998] CPU: 1 PID: 13998 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 534.010628][T13998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.020698][T13998] Call Trace: [ 534.024016][T13998] dump_stack+0x197/0x210 [ 534.028372][T13998] should_fail.cold+0xa/0x15 [ 534.032990][T13998] ? fault_create_debugfs_attr+0x180/0x180 [ 534.038834][T13998] ? ___might_sleep+0x163/0x2c0 [ 534.043734][T13998] __should_failslab+0x121/0x190 [ 534.048807][T13998] should_failslab+0x9/0x14 [ 534.053339][T13998] kmem_cache_alloc_trace+0x2d3/0x790 [ 534.058836][T13998] ? __genradix_ptr_alloc+0x236/0x3a0 [ 534.064236][T13998] sctp_auth_shkey_create+0x87/0x1b0 [ 534.069542][T13998] sctp_auth_asoc_copy_shkeys+0x1f1/0x360 [ 534.075297][T13998] sctp_association_new+0x1735/0x2160 [ 534.080688][T13998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.086951][T13998] sctp_connect_new_asoc+0x157/0x5a0 [ 534.092245][T13998] ? security_sctp_bind_connect+0x93/0xc0 [ 534.097988][T13998] sctp_sendmsg+0x13a0/0x1f10 [ 534.102687][T13998] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 534.108597][T13998] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 534.114517][T13998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.120776][T13998] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 534.127212][T13998] ? tomoyo_socket_bind_permission+0x360/0x360 [ 534.133399][T13998] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 534.139644][T13998] inet_sendmsg+0x9e/0xe0 [ 534.143962][T13998] ? inet_send_prepare+0x4e0/0x4e0 [ 534.149064][T13998] sock_sendmsg+0xd7/0x130 [ 534.153483][T13998] ____sys_sendmsg+0x358/0x880 [ 534.158248][T13998] ? kernel_sendmsg+0x50/0x50 [ 534.162922][T13998] ? __fget+0x35d/0x550 [ 534.167081][T13998] ? find_held_lock+0x35/0x130 [ 534.171859][T13998] ___sys_sendmsg+0x100/0x170 [ 534.176551][T13998] ? sendmsg_copy_msghdr+0x70/0x70 [ 534.181645][T13998] ? __kasan_check_read+0x11/0x20 [ 534.186662][T13998] ? __fget+0x37f/0x550 [ 534.190813][T13998] ? ksys_dup3+0x3e0/0x3e0 [ 534.195242][T13998] ? find_held_lock+0x35/0x130 [ 534.199996][T13998] ? get_pid_task+0x11d/0x210 [ 534.204670][T13998] ? __fget_light+0x1a9/0x230 [ 534.209360][T13998] ? __fdget+0x1b/0x20 [ 534.213426][T13998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.219664][T13998] ? sockfd_lookup_light+0xcb/0x180 [ 534.224867][T13998] __sys_sendmmsg+0x1bf/0x4d0 [ 534.229797][T13998] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 534.234817][T13998] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 534.241311][T13998] ? fput_many+0x12c/0x1a0 [ 534.245722][T13998] ? fput+0x1b/0x20 [ 534.249511][T13998] ? ksys_write+0x1cf/0x290 [ 534.254017][T13998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.259581][T13998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.265029][T13998] ? do_syscall_64+0x26/0x790 [ 534.269706][T13998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.275769][T13998] ? do_syscall_64+0x26/0x790 [ 534.280456][T13998] __x64_sys_sendmmsg+0x9d/0x100 [ 534.285387][T13998] do_syscall_64+0xfa/0x790 [ 534.289899][T13998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.296324][T13998] RIP: 0033:0x45a919 [ 534.300240][T13998] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.319950][T13998] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 05:25:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x34000, 0x0) 05:25:10 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x2) 05:25:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x2000000) 05:25:10 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 534.328375][T13998] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 534.336362][T13998] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 534.344771][T13998] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 534.352739][T13998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 534.352748][T13998] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 534.565393][T14026] IPVS: Unknown mcast interface: syzkaller1 [ 534.596859][T14032] IPVS: Unknown mcast interface: syzkaller1 05:25:10 executing program 2 (fault-call:5 fault-nth:0): openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 534.634771][T14035] FAULT_INJECTION: forcing a failure. [ 534.634771][T14035] name failslab, interval 1, probability 0, space 0, times 0 [ 534.692911][T14035] CPU: 1 PID: 14035 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 534.701635][T14035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.712632][T14035] Call Trace: [ 534.715948][T14035] dump_stack+0x197/0x210 [ 534.720302][T14035] should_fail.cold+0xa/0x15 [ 534.724908][T14035] ? __kasan_check_read+0x11/0x20 [ 534.729957][T14035] ? fault_create_debugfs_attr+0x180/0x180 [ 534.735792][T14035] ? __x64_sys_sendmmsg+0x9d/0x100 [ 534.740925][T14035] ? do_syscall_64+0xfa/0x790 [ 534.745625][T14035] __should_failslab+0x121/0x190 [ 534.750578][T14035] should_failslab+0x9/0x14 [ 534.755100][T14035] kmem_cache_alloc_trace+0x4b/0x790 [ 534.760439][T14035] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 534.766353][T14035] sctp_add_bind_addr+0x9f/0x3a0 [ 534.771304][T14035] sctp_copy_local_addr_list+0x385/0x530 [ 534.776950][T14035] ? sctp_defaults_init+0xcb0/0xcb0 [ 534.782221][T14035] ? _get_random_bytes+0x1b2/0x430 [ 534.787340][T14035] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 534.793246][T14035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.799496][T14035] sctp_copy_one_addr+0x5f/0x170 [ 534.804453][T14035] ? sctp_copy_one_addr+0x5f/0x170 [ 534.809577][T14035] sctp_bind_addr_copy+0xfc/0x2c8 [ 534.814619][T14035] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 534.820878][T14035] sctp_connect_new_asoc+0x178/0x5a0 [ 534.826175][T14035] ? security_sctp_bind_connect+0x93/0xc0 [ 534.831911][T14035] sctp_sendmsg+0x13a0/0x1f10 [ 534.836696][T14035] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 05:25:10 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 534.842603][T14035] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 534.848522][T14035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.854872][T14035] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 534.861314][T14035] ? tomoyo_socket_bind_permission+0x360/0x360 [ 534.867501][T14035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 534.873769][T14035] inet_sendmsg+0x9e/0xe0 [ 534.878121][T14035] ? inet_send_prepare+0x4e0/0x4e0 [ 534.883249][T14035] sock_sendmsg+0xd7/0x130 [ 534.887686][T14035] ____sys_sendmsg+0x358/0x880 [ 534.892471][T14035] ? kernel_sendmsg+0x50/0x50 [ 534.897165][T14035] ? __fget+0x35d/0x550 [ 534.901332][T14035] ? find_held_lock+0x35/0x130 [ 534.906102][T14035] ___sys_sendmsg+0x100/0x170 [ 534.910782][T14035] ? sendmsg_copy_msghdr+0x70/0x70 [ 534.915889][T14035] ? __kasan_check_read+0x11/0x20 [ 534.921039][T14035] ? __fget+0x37f/0x550 [ 534.925233][T14035] ? ksys_dup3+0x3e0/0x3e0 [ 534.929659][T14035] ? find_held_lock+0x35/0x130 [ 534.934412][T14035] ? get_pid_task+0x11d/0x210 [ 534.939203][T14035] ? __fget_light+0x1a9/0x230 [ 534.943872][T14035] ? __fdget+0x1b/0x20 [ 534.947929][T14035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.954154][T14035] ? sockfd_lookup_light+0xcb/0x180 [ 534.959338][T14035] __sys_sendmmsg+0x1bf/0x4d0 [ 534.964098][T14035] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 534.969130][T14035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 534.975353][T14035] ? fput_many+0x12c/0x1a0 [ 534.979767][T14035] ? fput+0x1b/0x20 [ 534.983556][T14035] ? ksys_write+0x1cf/0x290 [ 534.988045][T14035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.993524][T14035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.998966][T14035] ? do_syscall_64+0x26/0x790 [ 535.003626][T14035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.009675][T14035] ? do_syscall_64+0x26/0x790 [ 535.014341][T14035] __x64_sys_sendmmsg+0x9d/0x100 [ 535.019285][T14035] do_syscall_64+0xfa/0x790 [ 535.023790][T14035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.029668][T14035] RIP: 0033:0x45a919 [ 535.033550][T14035] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.053142][T14035] RSP: 002b:00007fba54602c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 535.061583][T14035] RAX: ffffffffffffffda RBX: 00007fba54602c90 RCX: 000000000045a919 [ 535.069546][T14035] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 535.077508][T14035] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 535.085461][T14035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546036d4 [ 535.093439][T14035] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:12 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000000)=[0x3, 0x1], 0x2) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x40000000) 05:25:12 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 537.062023][T14048] FAULT_INJECTION: forcing a failure. [ 537.062023][T14048] name failslab, interval 1, probability 0, space 0, times 0 05:25:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x100000000000000) [ 537.110391][T14048] CPU: 1 PID: 14048 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 537.119110][T14048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.129185][T14048] Call Trace: [ 537.132490][T14048] dump_stack+0x197/0x210 [ 537.136842][T14048] should_fail.cold+0xa/0x15 [ 537.141457][T14048] ? fault_create_debugfs_attr+0x180/0x180 [ 537.147287][T14048] ? sctp_add_bind_addr+0x9f/0x3a0 [ 537.152471][T14048] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 537.158043][T14048] __should_failslab+0x121/0x190 [ 537.163113][T14048] should_failslab+0x9/0x14 [ 537.167605][T14048] kmem_cache_alloc_trace+0x4b/0x790 [ 537.172487][T14058] ptrace attach of "/root/syz-executor.4"[14057] was attempted by "/root/syz-executor.4"[14058] [ 537.172893][T14048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.189619][T14048] ? __ipv6_addr_type+0x219/0x32d [ 537.194638][T14048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 537.200545][T14048] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 537.206269][T14048] sctp_add_bind_addr+0x9f/0x3a0 [ 537.211223][T14048] sctp_copy_local_addr_list+0x385/0x530 [ 537.216843][T14048] ? sctp_defaults_init+0xcb0/0xcb0 [ 537.222031][T14048] ? _get_random_bytes+0x1b2/0x430 [ 537.227127][T14048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 537.233007][T14048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.239274][T14048] sctp_copy_one_addr+0x5f/0x170 [ 537.244237][T14048] ? sctp_copy_one_addr+0x5f/0x170 [ 537.249346][T14048] sctp_bind_addr_copy+0xfc/0x2c8 [ 537.254428][T14048] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 537.260768][T14048] sctp_connect_new_asoc+0x178/0x5a0 [ 537.266048][T14048] ? security_sctp_bind_connect+0x93/0xc0 [ 537.271762][T14048] sctp_sendmsg+0x13a0/0x1f10 [ 537.276458][T14048] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 537.282353][T14048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 537.288243][T14048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 537.294658][T14048] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 537.301080][T14048] ? tomoyo_socket_bind_permission+0x360/0x360 [ 537.307326][T14048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.313566][T14048] inet_sendmsg+0x9e/0xe0 [ 537.317893][T14048] ? inet_send_prepare+0x4e0/0x4e0 [ 537.323016][T14048] sock_sendmsg+0xd7/0x130 [ 537.327435][T14048] ____sys_sendmsg+0x358/0x880 [ 537.332199][T14048] ? kernel_sendmsg+0x50/0x50 [ 537.336913][T14048] ? __fget+0x35d/0x550 [ 537.341057][T14048] ? find_held_lock+0x35/0x130 [ 537.346350][T14048] ___sys_sendmsg+0x100/0x170 [ 537.351083][T14048] ? sendmsg_copy_msghdr+0x70/0x70 [ 537.356192][T14048] ? __kasan_check_read+0x11/0x20 [ 537.361206][T14048] ? __fget+0x37f/0x550 [ 537.366062][T14048] ? ksys_dup3+0x3e0/0x3e0 [ 537.370483][T14048] ? find_held_lock+0x35/0x130 [ 537.375373][T14048] ? get_pid_task+0x11d/0x210 [ 537.380091][T14048] ? __fget_light+0x1a9/0x230 [ 537.384767][T14048] ? __fdget+0x1b/0x20 [ 537.388843][T14048] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 537.395081][T14048] ? sockfd_lookup_light+0xcb/0x180 [ 537.400281][T14048] __sys_sendmmsg+0x1bf/0x4d0 [ 537.404959][T14048] ? __ia32_sys_sendmsg+0xb0/0xb0 05:25:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x400300, 0x0) [ 537.410042][T14048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.416276][T14048] ? fput_many+0x12c/0x1a0 [ 537.420703][T14048] ? fput+0x1b/0x20 [ 537.424502][T14048] ? ksys_write+0x1cf/0x290 [ 537.429052][T14048] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.434519][T14048] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.439999][T14048] ? do_syscall_64+0x26/0x790 [ 537.444690][T14048] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.450785][T14048] ? do_syscall_64+0x26/0x790 [ 537.455489][T14048] __x64_sys_sendmmsg+0x9d/0x100 [ 537.460548][T14048] do_syscall_64+0xfa/0x790 [ 537.465057][T14048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.465069][T14048] RIP: 0033:0x45a919 [ 537.465084][T14048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.465091][T14048] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 537.465104][T14048] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 537.465113][T14048] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 537.465120][T14048] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 537.465128][T14048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 537.465142][T14048] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 537.525160][T14061] IPVS: Unknown mcast interface: syzkaller1 05:25:13 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:13 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x5a0240, 0x0) getdents64(r0, &(0x7f0000000d00)=""/232, 0xe8) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000180)={0x6, &(0x7f0000000100)=[{0x4, 0x9, 0x7, 0xfffffffe}, {0x8000, 0x3, 0x1f, 0xabc}, {0x7d, 0x8, 0x1, 0xcda}, {0x1008, 0x6, 0x4, 0x7}, {0x0, 0x80, 0x1, 0x78}, {0x7, 0x20, 0x46, 0xb}]}) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xb0108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x10000, 0x0, 0xfffffffd, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) membarrier(0x40, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000380)) ioctl$KDGETMODE(r3, 0x4b3b, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x40, 0x6}, {0x5, 0x7651}, {0xb57, 0x1425}, {0x6, 0x2}, {0x0, 0x3}, {0x6, 0x3f}, {0x4e, 0x81}, {0xfff, 0xf5b6}, {0x4, 0x5}, {0x989}]}) ioctl$GIO_FONT(r2, 0x5608, 0x0) r4 = getpgrp(0xffffffffffffffff) fcntl$lock(r1, 0x0, &(0x7f0000000040)={0x1, 0x3, 0x7600, 0x1ff, r4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000003c0)={0x0, 0x0}) r7 = fcntl$getown(r5, 0x9) capget(&(0x7f0000000300)={0x20080522, r7}, &(0x7f0000000340)={0xf29, 0x9, 0x336, 0x75, 0x2cc, 0xb416}) capset(&(0x7f0000000240)={0x20071026, r6}, &(0x7f00000002c0)={0xa3c, 0x7f, 0xfffff6ac, 0x401, 0x0, 0x7fff}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 537.585693][T14065] IPVS: Unknown mcast interface: syzkaller1 05:25:13 executing program 0 (fault-call:3 fault-nth:9): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x1000000, 0x0) [ 537.745042][T14072] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 05:25:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x200000000000000) [ 537.914024][T14086] FAULT_INJECTION: forcing a failure. [ 537.914024][T14086] name failslab, interval 1, probability 0, space 0, times 0 [ 537.956995][T14086] CPU: 0 PID: 14086 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 537.965839][T14086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.973782][T14092] IPVS: Unknown mcast interface: syzkaller1 [ 537.975903][T14086] Call Trace: [ 537.975930][T14086] dump_stack+0x197/0x210 [ 537.975954][T14086] should_fail.cold+0xa/0x15 [ 537.975972][T14086] ? fault_create_debugfs_attr+0x180/0x180 [ 537.975996][T14086] ? sctp_add_bind_addr+0x9f/0x3a0 [ 538.004996][T14086] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 538.010567][T14086] __should_failslab+0x121/0x190 [ 538.011168][T14095] IPVS: Unknown mcast interface: syzkaller1 [ 538.015517][T14086] should_failslab+0x9/0x14 [ 538.015533][T14086] kmem_cache_alloc_trace+0x4b/0x790 [ 538.015551][T14086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.015567][T14086] ? __ipv6_addr_type+0x219/0x32d [ 538.015582][T14086] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.015598][T14086] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 538.015616][T14086] sctp_add_bind_addr+0x9f/0x3a0 [ 538.015639][T14086] sctp_copy_local_addr_list+0x385/0x530 [ 538.015658][T14086] ? sctp_defaults_init+0xcb0/0xcb0 [ 538.015680][T14086] ? _get_random_bytes+0x1b2/0x430 [ 538.075169][T14086] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.081079][T14086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.087341][T14086] sctp_copy_one_addr+0x5f/0x170 [ 538.092298][T14086] ? sctp_copy_one_addr+0x5f/0x170 [ 538.097426][T14086] sctp_bind_addr_copy+0xfc/0x2c8 [ 538.102466][T14086] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 538.108722][T14086] sctp_connect_new_asoc+0x178/0x5a0 [ 538.114026][T14086] ? security_sctp_bind_connect+0x93/0xc0 [ 538.119853][T14086] sctp_sendmsg+0x13a0/0x1f10 [ 538.124548][T14086] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 538.130455][T14086] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.136363][T14086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.142626][T14086] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 538.149060][T14086] ? tomoyo_socket_bind_permission+0x360/0x360 05:25:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x4000000000000000) [ 538.155247][T14086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 538.161595][T14086] inet_sendmsg+0x9e/0xe0 [ 538.165944][T14086] ? inet_send_prepare+0x4e0/0x4e0 [ 538.171074][T14086] sock_sendmsg+0xd7/0x130 [ 538.175506][T14086] ____sys_sendmsg+0x358/0x880 [ 538.180288][T14086] ? kernel_sendmsg+0x50/0x50 [ 538.184979][T14086] ? __fget+0x35d/0x550 [ 538.189136][T14086] ? find_held_lock+0x35/0x130 [ 538.193912][T14086] ___sys_sendmsg+0x100/0x170 [ 538.198605][T14086] ? sendmsg_copy_msghdr+0x70/0x70 [ 538.203768][T14086] ? __kasan_check_read+0x11/0x20 [ 538.208815][T14086] ? __fget+0x37f/0x550 [ 538.212990][T14086] ? ksys_dup3+0x3e0/0x3e0 [ 538.217410][T14086] ? find_held_lock+0x35/0x130 [ 538.222195][T14086] ? get_pid_task+0x11d/0x210 [ 538.226887][T14086] ? __fget_light+0x1a9/0x230 [ 538.231576][T14086] ? __fdget+0x1b/0x20 [ 538.235664][T14086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.241908][T14086] ? sockfd_lookup_light+0xcb/0x180 [ 538.247094][T14086] __sys_sendmmsg+0x1bf/0x4d0 [ 538.251780][T14086] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 538.256834][T14086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 538.263072][T14086] ? fput_many+0x12c/0x1a0 [ 538.267474][T14086] ? fput+0x1b/0x20 [ 538.271278][T14086] ? ksys_write+0x1cf/0x290 [ 538.275791][T14086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.281250][T14086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.286742][T14086] ? do_syscall_64+0x26/0x790 [ 538.291659][T14086] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.297724][T14086] ? do_syscall_64+0x26/0x790 [ 538.302398][T14086] __x64_sys_sendmmsg+0x9d/0x100 [ 538.307328][T14086] do_syscall_64+0xfa/0x790 [ 538.311838][T14086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.317726][T14086] RIP: 0033:0x45a919 [ 538.321797][T14086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.341476][T14086] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 538.349928][T14086] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 05:25:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x1a0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000001200)={0x3, 0x2bfad69218f5fa91, 0x4, 0x1, 0x5, {r1, r2/1000+30000}, {0x1, 0x1, 0x81, 0x79, 0x8, 0x8, "e7811719"}, 0x0, 0x2, @userptr=0x7, 0x9, 0x0, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f00000002c0)={r7, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000180)={r7, 0x0, 0x3}, 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={r7, 0x3, 0x3, 0x7}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000001280)={r8, 0x7, 0xc}, &(0x7f00000012c0)=0x8) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r9, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x11, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 538.357895][T14086] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 538.365860][T14086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 538.374404][T14086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 538.382378][T14086] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:14 executing program 0 (fault-call:3 fault-nth:10): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 538.555114][T14108] FAULT_INJECTION: forcing a failure. [ 538.555114][T14108] name failslab, interval 1, probability 0, space 0, times 0 [ 538.594991][T14108] CPU: 1 PID: 14108 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 05:25:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file1\x00', r0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 538.603712][T14108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.613783][T14108] Call Trace: [ 538.617090][T14108] dump_stack+0x197/0x210 [ 538.621446][T14108] should_fail.cold+0xa/0x15 [ 538.626091][T14108] ? fault_create_debugfs_attr+0x180/0x180 [ 538.631920][T14108] ? sctp_add_bind_addr+0x9f/0x3a0 [ 538.637062][T14108] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 538.642634][T14108] __should_failslab+0x121/0x190 [ 538.647600][T14108] should_failslab+0x9/0x14 05:25:14 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r2, &(0x7f0000000080)=""/87}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 538.652126][T14108] kmem_cache_alloc_trace+0x4b/0x790 [ 538.657432][T14108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.663690][T14108] ? __ipv6_addr_type+0x219/0x32d [ 538.668756][T14108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.674667][T14108] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 538.680411][T14108] sctp_add_bind_addr+0x9f/0x3a0 [ 538.685371][T14108] sctp_copy_local_addr_list+0x385/0x530 [ 538.691025][T14108] ? sctp_defaults_init+0xcb0/0xcb0 [ 538.696276][T14108] ? _get_random_bytes+0x1b2/0x430 05:25:14 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x0, 0xd, 0x4, 0x4038002, 0x3, {r0, r1/1000+30000}, {0xa, 0xc, 0x5, 0x20, 0x80, 0x3, "b256c4f4"}, 0x6, 0x4, @fd, 0x7fff, 0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = accept4$alg(r2, 0x0, 0x0, 0x800) preadv(r4, &(0x7f00000036c0)=[{&(0x7f0000000180)=""/136, 0x88}, {&(0x7f00000002c0)=""/232, 0xe8}, {&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/94, 0x5e}, {&(0x7f00000024c0)=""/91, 0x5b}, {&(0x7f0000002540)=""/205, 0xcd}, {&(0x7f0000002640)=""/94, 0x5e}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0xa, 0xe1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$VT_RELDISP(r3, 0x5605) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 538.701403][T14108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.707318][T14108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.713582][T14108] sctp_copy_one_addr+0x5f/0x170 [ 538.718541][T14108] ? sctp_copy_one_addr+0x5f/0x170 [ 538.723672][T14108] sctp_bind_addr_copy+0xfc/0x2c8 [ 538.728718][T14108] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 538.734985][T14108] sctp_connect_new_asoc+0x178/0x5a0 [ 538.740296][T14108] ? security_sctp_bind_connect+0x93/0xc0 [ 538.746048][T14108] sctp_sendmsg+0x13a0/0x1f10 [ 538.750758][T14108] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 538.756674][T14108] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 538.762598][T14108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 538.768862][T14108] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 538.775298][T14108] ? tomoyo_socket_bind_permission+0x360/0x360 [ 538.781489][T14108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 538.787759][T14108] inet_sendmsg+0x9e/0xe0 [ 538.792106][T14108] ? inet_send_prepare+0x4e0/0x4e0 [ 538.797233][T14108] sock_sendmsg+0xd7/0x130 [ 538.801668][T14108] ____sys_sendmsg+0x358/0x880 [ 538.806449][T14108] ? kernel_sendmsg+0x50/0x50 [ 538.811137][T14108] ? __fget+0x35d/0x550 [ 538.815312][T14108] ? find_held_lock+0x35/0x130 [ 538.820161][T14108] ___sys_sendmsg+0x100/0x170 [ 538.824830][T14108] ? sendmsg_copy_msghdr+0x70/0x70 [ 538.829932][T14108] ? __kasan_check_read+0x11/0x20 [ 538.835074][T14108] ? __fget+0x37f/0x550 [ 538.839221][T14108] ? ksys_dup3+0x3e0/0x3e0 [ 538.843657][T14108] ? find_held_lock+0x35/0x130 [ 538.848412][T14108] ? get_pid_task+0x11d/0x210 [ 538.853075][T14108] ? __fget_light+0x1a9/0x230 [ 538.857745][T14108] ? __fdget+0x1b/0x20 [ 538.861809][T14108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 538.868061][T14108] ? sockfd_lookup_light+0xcb/0x180 [ 538.873260][T14108] __sys_sendmmsg+0x1bf/0x4d0 [ 538.877942][T14108] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 538.882964][T14108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 538.889190][T14108] ? fput_many+0x12c/0x1a0 [ 538.893589][T14108] ? fput+0x1b/0x20 [ 538.897397][T14108] ? ksys_write+0x1cf/0x290 [ 538.901904][T14108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.907352][T14108] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.912797][T14108] ? do_syscall_64+0x26/0x790 [ 538.917464][T14108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.923534][T14108] ? do_syscall_64+0x26/0x790 [ 538.928203][T14108] __x64_sys_sendmmsg+0x9d/0x100 [ 538.933149][T14108] do_syscall_64+0xfa/0x790 [ 538.937668][T14108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.943544][T14108] RIP: 0033:0x45a919 [ 538.947420][T14108] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.967112][T14108] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 538.975510][T14108] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 538.983475][T14108] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 538.991462][T14108] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 538.999437][T14108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 539.007394][T14108] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:16 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)={0x6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:16 executing program 0 (fault-call:3 fault-nth:11): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:16 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x4) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000380)={0x1ff, 0x8}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000), 0x18) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000f20bff077259a6"], 0xc) close(0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)="8d", 0x94c155ac}], 0x176, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)={0x30, r4, 0x23f, 0x3000000}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0xde0b7b72078a04ca) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 540.775847][T14133] FAULT_INJECTION: forcing a failure. [ 540.775847][T14133] name failslab, interval 1, probability 0, space 0, times 0 [ 540.810229][T14133] CPU: 1 PID: 14133 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 540.818977][T14133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.829061][T14133] Call Trace: [ 540.832373][T14133] dump_stack+0x197/0x210 [ 540.836728][T14133] should_fail.cold+0xa/0x15 [ 540.841345][T14133] ? fault_create_debugfs_attr+0x180/0x180 [ 540.847178][T14133] ? sctp_add_bind_addr+0x9f/0x3a0 [ 540.852309][T14133] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 540.857894][T14133] __should_failslab+0x121/0x190 [ 540.862850][T14133] should_failslab+0x9/0x14 [ 540.867371][T14133] kmem_cache_alloc_trace+0x4b/0x790 [ 540.872674][T14133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.878928][T14133] ? __ipv6_addr_type+0x219/0x32d [ 540.883970][T14133] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.889880][T14133] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 540.895710][T14133] sctp_add_bind_addr+0x9f/0x3a0 [ 540.900674][T14133] sctp_copy_local_addr_list+0x385/0x530 [ 540.906323][T14133] ? sctp_defaults_init+0xcb0/0xcb0 [ 540.911541][T14133] ? _get_random_bytes+0x1b2/0x430 [ 540.916669][T14133] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.922600][T14133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.928859][T14133] sctp_copy_one_addr+0x5f/0x170 [ 540.933812][T14133] ? sctp_copy_one_addr+0x5f/0x170 [ 540.938949][T14133] sctp_bind_addr_copy+0xfc/0x2c8 [ 540.944003][T14133] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 540.950285][T14133] sctp_connect_new_asoc+0x178/0x5a0 [ 540.955595][T14133] ? security_sctp_bind_connect+0x93/0xc0 [ 540.961337][T14133] sctp_sendmsg+0x13a0/0x1f10 [ 540.966049][T14133] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 540.971959][T14133] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 540.977880][T14133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 540.977899][T14133] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 540.977921][T14133] ? tomoyo_socket_bind_permission+0x360/0x360 [ 540.990577][T14133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 540.990597][T14133] inet_sendmsg+0x9e/0xe0 [ 540.990617][T14133] ? inet_send_prepare+0x4e0/0x4e0 [ 541.012556][T14133] sock_sendmsg+0xd7/0x130 [ 541.017013][T14133] ____sys_sendmsg+0x358/0x880 [ 541.021804][T14133] ? kernel_sendmsg+0x50/0x50 [ 541.026497][T14133] ? __fget+0x35d/0x550 [ 541.030659][T14133] ? find_held_lock+0x35/0x130 [ 541.035436][T14133] ___sys_sendmsg+0x100/0x170 [ 541.040113][T14133] ? sendmsg_copy_msghdr+0x70/0x70 [ 541.045302][T14133] ? __kasan_check_read+0x11/0x20 [ 541.050359][T14133] ? __fget+0x37f/0x550 [ 541.054499][T14133] ? ksys_dup3+0x3e0/0x3e0 [ 541.058916][T14133] ? find_held_lock+0x35/0x130 [ 541.063711][T14133] ? get_pid_task+0x11d/0x210 [ 541.068393][T14133] ? __fget_light+0x1a9/0x230 [ 541.073074][T14133] ? __fdget+0x1b/0x20 [ 541.077132][T14133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.083356][T14133] ? sockfd_lookup_light+0xcb/0x180 [ 541.088551][T14133] __sys_sendmmsg+0x1bf/0x4d0 [ 541.093227][T14133] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 541.098258][T14133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 541.104555][T14133] ? fput_many+0x12c/0x1a0 [ 541.109081][T14133] ? fput+0x1b/0x20 [ 541.112911][T14133] ? ksys_write+0x1cf/0x290 [ 541.117430][T14133] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.123154][T14133] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.128750][T14133] ? do_syscall_64+0x26/0x790 [ 541.133430][T14133] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.139483][T14133] ? do_syscall_64+0x26/0x790 [ 541.144250][T14133] __x64_sys_sendmmsg+0x9d/0x100 [ 541.149174][T14133] do_syscall_64+0xfa/0x790 [ 541.153666][T14133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.159709][T14133] RIP: 0033:0x45a919 [ 541.163601][T14133] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.183581][T14133] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 541.192002][T14133] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 541.200209][T14133] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 541.208173][T14133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 541.216128][T14133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:25:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf000000, 0x0) 05:25:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:17 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fallocate(r0, 0x0, 0xff, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/245, 0xf5) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={{r2}, 0x7, 0x7fff, 0x6}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4b3b, 0x0) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x10000}, 0x16, 0x2) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f0000000280)) r7 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r3, 0x0, 0x54, &(0x7f0000000440)={@empty, @loopback, 0x0}, &(0x7f0000000480)=0xc) sendmsg$nl_route(r7, &(0x7f0000000580)={&(0x7f0000000300), 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="780000001c00000c2abd7000fddbdf2502000000", @ANYRES32=r8, @ANYBLOB="310001001400030005000000ce0a0000040000000300000008000400fcffffff08000100ac1e010114000100ff0100000000000000000000000000010c000100aaaaaaaaaa2a000008000a000900000008000800", @ANYRES32=r9, @ANYBLOB="794cfa9ca5788751f0f3f7715fa793af0900000000000000a5"], 0x78}, 0x1, 0x0, 0x0, 0x14000850}, 0x80041) getdents64(r7, &(0x7f0000000d00)=""/232, 0xe8) ioctl$PPPIOCSMRU1(r7, 0x40047452, &(0x7f0000000180)=0x400) r10 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r10, &(0x7f0000000d00)=""/232, 0xe8) ioctl$EVIOCGRAB(r10, 0x40044590, &(0x7f0000000340)=0x800) [ 541.224104][T14133] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:17 executing program 0 (fault-call:3 fault-nth:12): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 541.389532][T14152] IPVS: Unknown mcast interface: syzkaller1 05:25:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x80, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb5d, 0x200000) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x5) [ 541.439833][T14158] IPVS: Unknown mcast interface: syzkaller1 [ 541.456460][T14157] FAULT_INJECTION: forcing a failure. [ 541.456460][T14157] name failslab, interval 1, probability 0, space 0, times 0 [ 541.482343][T14157] CPU: 0 PID: 14157 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 541.491063][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.501136][T14157] Call Trace: [ 541.504483][T14157] dump_stack+0x197/0x210 [ 541.508844][T14157] should_fail.cold+0xa/0x15 [ 541.513460][T14157] ? fault_create_debugfs_attr+0x180/0x180 [ 541.519286][T14157] ? sctp_add_bind_addr+0x9f/0x3a0 [ 541.524422][T14157] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 541.529998][T14157] __should_failslab+0x121/0x190 [ 541.534965][T14157] should_failslab+0x9/0x14 [ 541.539504][T14157] kmem_cache_alloc_trace+0x4b/0x790 [ 541.544819][T14157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.551083][T14157] ? __ipv6_addr_type+0x219/0x32d [ 541.556130][T14157] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 541.562044][T14157] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 541.567969][T14157] sctp_add_bind_addr+0x9f/0x3a0 [ 541.572938][T14157] sctp_copy_local_addr_list+0x385/0x530 [ 541.578600][T14157] ? sctp_defaults_init+0xcb0/0xcb0 [ 541.583825][T14157] ? _get_random_bytes+0x1b2/0x430 [ 541.588956][T14157] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 541.594872][T14157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.601140][T14157] sctp_copy_one_addr+0x5f/0x170 [ 541.606096][T14157] ? sctp_copy_one_addr+0x5f/0x170 [ 541.611260][T14157] sctp_bind_addr_copy+0xfc/0x2c8 [ 541.616309][T14157] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 541.622586][T14157] sctp_connect_new_asoc+0x178/0x5a0 [ 541.627894][T14157] ? security_sctp_bind_connect+0x93/0xc0 [ 541.633669][T14157] sctp_sendmsg+0x13a0/0x1f10 [ 541.638376][T14157] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 541.644293][T14157] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 541.650209][T14157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 541.656469][T14157] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 541.662896][T14157] ? tomoyo_socket_bind_permission+0x360/0x360 [ 541.669170][T14157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 541.669191][T14157] inet_sendmsg+0x9e/0xe0 [ 541.669213][T14157] ? inet_send_prepare+0x4e0/0x4e0 [ 541.684905][T14157] sock_sendmsg+0xd7/0x130 [ 541.689347][T14157] ____sys_sendmsg+0x358/0x880 [ 541.694195][T14157] ? kernel_sendmsg+0x50/0x50 [ 541.698908][T14157] ? __fget+0x35d/0x550 [ 541.703085][T14157] ? find_held_lock+0x35/0x130 [ 541.707873][T14157] ___sys_sendmsg+0x100/0x170 [ 541.712577][T14157] ? sendmsg_copy_msghdr+0x70/0x70 [ 541.717709][T14157] ? __kasan_check_read+0x11/0x20 [ 541.722751][T14157] ? __fget+0x37f/0x550 [ 541.726924][T14157] ? ksys_dup3+0x3e0/0x3e0 [ 541.731351][T14157] ? find_held_lock+0x35/0x130 [ 541.736134][T14157] ? get_pid_task+0x11d/0x210 [ 541.740834][T14157] ? __fget_light+0x1a9/0x230 [ 541.745526][T14157] ? __fdget+0x1b/0x20 [ 541.749615][T14157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 541.755889][T14157] ? sockfd_lookup_light+0xcb/0x180 [ 541.761109][T14157] __sys_sendmmsg+0x1bf/0x4d0 [ 541.765985][T14157] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 541.771051][T14157] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 541.777306][T14157] ? fput_many+0x12c/0x1a0 [ 541.781737][T14157] ? fput+0x1b/0x20 [ 541.785570][T14157] ? ksys_write+0x1cf/0x290 [ 541.790092][T14157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.795574][T14157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.801659][T14157] ? do_syscall_64+0x26/0x790 [ 541.806357][T14157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.812448][T14157] ? do_syscall_64+0x26/0x790 [ 541.817152][T14157] __x64_sys_sendmmsg+0x9d/0x100 [ 541.822116][T14157] do_syscall_64+0xfa/0x790 [ 541.826835][T14157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.832734][T14157] RIP: 0033:0x45a919 [ 541.836776][T14157] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.856388][T14157] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 541.866566][T14157] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 541.874640][T14157] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 541.882647][T14157] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:25:17 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'syz_tun\x00', 0x2}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:17 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6ae6008088d1842b, 0x4, 0x0, 0x5, 0x0, 0x0, 0x3f86}, 0x0, 0xffffffffffffffff, r0, 0xf) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:17 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000000)=[r0, r2], 0x2) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'ip_vti0\x00'}, 0x18) [ 541.890644][T14157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 541.898638][T14157] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:19 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000640)=0x0) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000780)=0xe8) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x20, 0x7, &(0x7f0000000580)=[{&(0x7f0000000180)="3e86dcad6c36359c4a6f5b92181c45a3dc64d3a9cbea8c683694731d1a994ab291b0215ca0262337ed620ec926cb332fe9e671bea21bccdbfbe2ea2c3c924c05f86e860d52f87205ab30fa93ee88a14f8329f221567f3cb31873291988e6534db35dcd2596a0e5f43cd1a084eb9e36fae462ae1cf629aa52c7b420e6cf866d636de34dd0ceb90f1ac829c1694db97b46dc5cefc4d2799f077a952ac1297d070dce169872b727abeaae446ae5fa70c9354ea440e22d87a2786b65539cc7cd3dee070c66de79acb7eb7b08660bc8b33fea07d344d73a1268d90fa2677d80081e", 0xdf, 0x1}, {&(0x7f00000000c0)="57f54e7e6c8472dcbed472d39c8b4aed188202364595d9343b0af0a4f84d28bafd54502500ca6b28b2c0c0f6da9891499714fd0d37100468dc1bd4216f5310544cde8004385c363c142290a73235fbbe6263ad06", 0x54, 0x4}, {&(0x7f0000000300)="4147e28718340a1ab4a3d5e17ca46bc4093d198ea735d55813a1d53c7ab06944edb0e6e8b0667c375e24d27aecf794c8b3e5eee3e4f674fc9c13dc3294e70ebe68911a591bc0f5a5398771ade1e426b341cb81eca965deebb389a641addfb2310356e0f1f8d72d7a41f6a54b818d315b862d6c7c0661bdeec3526befe08800293a052e2158668e3c17bac56210a8e700775d3c3aa69170be45aeb8537eb2ef3cbe4a1b2458481fa714887b5b43d78c", 0xaf}, {&(0x7f00000003c0)="08f76a3805d9feb7f81003158886cd864d282b381f7dc43af72200da0aabc20aa219f58c606cd38ea09620a562692a655a3a2d7d6df1b2468dab1f7d776cac4bf9eb744334939db83f8ccb03967453", 0x4f, 0x1}, {&(0x7f0000000280)="8f0d3276a745477398832e63d20b3e1bab5ce2f1a1b7a950c3438045b4a5baf1811e8dce17967bd07518", 0x2a, 0x1f}, {&(0x7f0000000440)="45ea108614071be4d60b6539a766c3d0f42f26333525f6bcd79066c304f9e6dd943a4f1e795eae100ee647782fe3fc62dc2424ad602eacefa0a35b7e8c9fce418e28abc40c61fb9d8e8e483e0a25db6c62d857fb58ccaa2e435cfe894bd07415cb4d482cf64ac0599980aefb72cec58e4c2b821c95c45fc2b5d1d6b1f96351a6a2127dcf3112cbfd", 0x88, 0x3}, {&(0x7f0000000500)="069d51e643102845f2b27bc700ecbbb2420489df54b662ad86aa7f015513acbe9574daf7df75d10374fca2aafe750f645ab29e37", 0x34, 0x3ff}], 0x6080, &(0x7f00000007c0)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_lt={'euid<', r2}}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r4}}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}, {@euid_lt={'euid<', r6}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}]}) 05:25:19 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000040)='sync\x00', 0x0, 0x0) 05:25:19 executing program 0 (fault-call:3 fault-nth:13): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 543.887536][T14187] FAULT_INJECTION: forcing a failure. [ 543.887536][T14187] name failslab, interval 1, probability 0, space 0, times 0 [ 543.907483][T14187] CPU: 1 PID: 14187 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 543.916197][T14187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.926261][T14187] Call Trace: [ 543.929569][T14187] dump_stack+0x197/0x210 [ 543.933922][T14187] should_fail.cold+0xa/0x15 [ 543.938528][T14187] ? fault_create_debugfs_attr+0x180/0x180 [ 543.944349][T14187] ? sctp_add_bind_addr+0x9f/0x3a0 [ 543.949479][T14187] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 543.955051][T14187] __should_failslab+0x121/0x190 [ 543.960011][T14187] should_failslab+0x9/0x14 [ 543.964538][T14187] kmem_cache_alloc_trace+0x4b/0x790 [ 543.969856][T14187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.976116][T14187] ? __ipv6_addr_type+0x219/0x32d [ 543.981158][T14187] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 543.987073][T14187] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 543.992823][T14187] sctp_add_bind_addr+0x9f/0x3a0 [ 543.997781][T14187] sctp_copy_local_addr_list+0x385/0x530 [ 544.003434][T14187] ? sctp_defaults_init+0xcb0/0xcb0 [ 544.008650][T14187] ? _get_random_bytes+0x1b2/0x430 [ 544.013782][T14187] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 544.019700][T14187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.025964][T14187] sctp_copy_one_addr+0x5f/0x170 [ 544.030928][T14187] ? sctp_copy_one_addr+0x5f/0x170 [ 544.036070][T14187] sctp_bind_addr_copy+0xfc/0x2c8 [ 544.041121][T14187] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 544.047385][T14187] sctp_connect_new_asoc+0x178/0x5a0 [ 544.052690][T14187] ? security_sctp_bind_connect+0x93/0xc0 [ 544.058436][T14187] sctp_sendmsg+0x13a0/0x1f10 [ 544.063132][T14187] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 544.069045][T14187] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 544.074949][T14187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.081185][T14187] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 544.087620][T14187] ? tomoyo_socket_bind_permission+0x360/0x360 [ 544.093805][T14187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.100050][T14187] inet_sendmsg+0x9e/0xe0 [ 544.104369][T14187] ? inet_send_prepare+0x4e0/0x4e0 [ 544.109479][T14187] sock_sendmsg+0xd7/0x130 [ 544.113971][T14187] ____sys_sendmsg+0x358/0x880 [ 544.118839][T14187] ? kernel_sendmsg+0x50/0x50 [ 544.123522][T14187] ? __fget+0x35d/0x550 [ 544.127674][T14187] ? find_held_lock+0x35/0x130 [ 544.132458][T14187] ___sys_sendmsg+0x100/0x170 [ 544.137135][T14187] ? sendmsg_copy_msghdr+0x70/0x70 [ 544.142236][T14187] ? __kasan_check_read+0x11/0x20 [ 544.147244][T14187] ? __fget+0x37f/0x550 [ 544.151386][T14187] ? ksys_dup3+0x3e0/0x3e0 [ 544.155784][T14187] ? find_held_lock+0x35/0x130 [ 544.160536][T14187] ? get_pid_task+0x11d/0x210 [ 544.165198][T14187] ? __fget_light+0x1a9/0x230 [ 544.169864][T14187] ? __fdget+0x1b/0x20 [ 544.173919][T14187] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 544.180146][T14187] ? sockfd_lookup_light+0xcb/0x180 [ 544.185347][T14187] __sys_sendmmsg+0x1bf/0x4d0 [ 544.190054][T14187] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 544.195272][T14187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.201510][T14187] ? fput_many+0x12c/0x1a0 [ 544.205938][T14187] ? fput+0x1b/0x20 [ 544.209733][T14187] ? ksys_write+0x1cf/0x290 [ 544.214242][T14187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.219689][T14187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.225143][T14187] ? do_syscall_64+0x26/0x790 [ 544.229810][T14187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.235861][T14187] ? do_syscall_64+0x26/0x790 [ 544.240534][T14187] __x64_sys_sendmmsg+0x9d/0x100 [ 544.245461][T14187] do_syscall_64+0xfa/0x790 [ 544.249964][T14187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.255845][T14187] RIP: 0033:0x45a919 [ 544.259737][T14187] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.279344][T14187] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 05:25:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x3f000000, 0x0) 05:25:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x81, 0x80) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x12, 0x7, 0x1, {{0x5, 'vfat\x00'}, 0x10000}}, 0x12) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 544.287759][T14187] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 544.295912][T14187] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 544.303898][T14187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 544.311877][T14187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 544.311886][T14187] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:20 executing program 0 (fault-call:3 fault-nth:14): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:20 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x10}) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000080)=@fragment={0x121, 0x0, 0x0, 0x1, 0x0, 0x7, 0x66}, 0x8) ioctl$GIO_FONT(r1, 0x5608, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000000)="4bd6b21e32aa732796d6a1e2305a686e23db4d08329739f0a3fe2679ecd1eb03fb8076661a09832d17a76d13e326090cae01fb214e04404c209d0203ddd96927f1e6e401d4f8ed33", 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$PPPIOCGFLAGS(r5, 0x8004745a, &(0x7f0000000180)) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 544.564532][T14210] FAULT_INJECTION: forcing a failure. [ 544.564532][T14210] name failslab, interval 1, probability 0, space 0, times 0 [ 544.606621][T14210] CPU: 1 PID: 14210 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 544.615527][T14210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.625595][T14210] Call Trace: [ 544.628902][T14210] dump_stack+0x197/0x210 [ 544.633252][T14210] should_fail.cold+0xa/0x15 [ 544.637860][T14210] ? fault_create_debugfs_attr+0x180/0x180 [ 544.643685][T14210] ? sctp_add_bind_addr+0x9f/0x3a0 [ 544.648814][T14210] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 544.654385][T14210] __should_failslab+0x121/0x190 [ 544.659352][T14210] should_failslab+0x9/0x14 [ 544.663873][T14210] kmem_cache_alloc_trace+0x4b/0x790 [ 544.669179][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.675431][T14210] ? __ipv6_addr_type+0x219/0x32d [ 544.680479][T14210] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 544.686385][T14210] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 544.692150][T14210] sctp_add_bind_addr+0x9f/0x3a0 [ 544.697121][T14210] sctp_copy_local_addr_list+0x385/0x530 05:25:20 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000280)=0x1a0) write$P9_RREADLINK(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000017020007002e0f66696c512ced2eb54e10741fbe0ff5bbac5ba1c31e60af909f1163edae8a36ddfcf71e832a16b1a8bc925c7d3d6fff3b0f7afafa383e"], 0x10) ftruncate(r2, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x8, 0xffffffff, 0x689d, 0x1f, 0x9, 0x8, 0x8, 0x4}}) 05:25:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 544.702783][T14210] ? sctp_defaults_init+0xcb0/0xcb0 [ 544.708009][T14210] ? _get_random_bytes+0x1b2/0x430 [ 544.713133][T14210] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 544.719131][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.725396][T14210] sctp_copy_one_addr+0x5f/0x170 [ 544.730345][T14210] ? sctp_copy_one_addr+0x5f/0x170 [ 544.735478][T14210] sctp_bind_addr_copy+0xfc/0x2c8 [ 544.740525][T14210] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 544.746792][T14210] sctp_connect_new_asoc+0x178/0x5a0 05:25:20 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r2, 0xe1000) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$inet6_tcp_buf(r3, 0x6, 0x30, &(0x7f0000000040)="e280415895c91dbe7c35658ac16ab9e924d56190ac567c0f3acbf5226b923a20c32cc503976512de95ac820000af22a22e2ed38ffde23f420d12808a072022073fd4fe5f0bbe5eef785a663f3874225f42f6546520d17ff26e37f808b621629439cb0d7ac0ea735e9b8250e13f12bd9fc51b089fc8ee24ca4b5706452f3c23c1a66fe3f52abecc6f71f64d30e76da267e0537b17fa24d573605d936c334c8fc6f515d634fee8c089a9504dcea13e73889d73b1838d5359e3eb6c2dc1ccd7df119b012734950ef3530b4e2c94e24d09d9f11d67dbc9370553d4", 0xd9) [ 544.752805][T14210] ? security_sctp_bind_connect+0x93/0xc0 [ 544.758539][T14210] sctp_sendmsg+0x13a0/0x1f10 [ 544.763249][T14210] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 544.769164][T14210] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 544.775077][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 544.781427][T14210] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 544.788081][T14210] ? tomoyo_socket_bind_permission+0x360/0x360 [ 544.794272][T14210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.800540][T14210] inet_sendmsg+0x9e/0xe0 [ 544.804893][T14210] ? inet_send_prepare+0x4e0/0x4e0 [ 544.810024][T14210] sock_sendmsg+0xd7/0x130 [ 544.814463][T14210] ____sys_sendmsg+0x358/0x880 [ 544.819257][T14210] ? kernel_sendmsg+0x50/0x50 [ 544.824159][T14210] ? __fget+0x35d/0x550 [ 544.828338][T14210] ? find_held_lock+0x35/0x130 [ 544.833128][T14210] ___sys_sendmsg+0x100/0x170 [ 544.837825][T14210] ? sendmsg_copy_msghdr+0x70/0x70 [ 544.842956][T14210] ? __kasan_check_read+0x11/0x20 [ 544.847994][T14210] ? __fget+0x37f/0x550 [ 544.852176][T14210] ? ksys_dup3+0x3e0/0x3e0 [ 544.856600][T14210] ? find_held_lock+0x35/0x130 [ 544.861389][T14210] ? get_pid_task+0x11d/0x210 [ 544.866066][T14210] ? __fget_light+0x1a9/0x230 [ 544.870856][T14210] ? __fdget+0x1b/0x20 [ 544.874967][T14210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 544.881218][T14210] ? sockfd_lookup_light+0xcb/0x180 [ 544.886508][T14210] __sys_sendmmsg+0x1bf/0x4d0 [ 544.891177][T14210] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 544.896235][T14210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 544.902592][T14210] ? fput_many+0x12c/0x1a0 [ 544.907094][T14210] ? fput+0x1b/0x20 [ 544.911013][T14210] ? ksys_write+0x1cf/0x290 [ 544.915523][T14210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.920980][T14210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 544.926439][T14210] ? do_syscall_64+0x26/0x790 [ 544.931118][T14210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.937173][T14210] ? do_syscall_64+0x26/0x790 [ 544.941838][T14210] __x64_sys_sendmmsg+0x9d/0x100 [ 544.946759][T14210] do_syscall_64+0xfa/0x790 [ 544.951248][T14210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.957119][T14210] RIP: 0033:0x45a919 [ 544.960999][T14210] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.982160][T14210] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 544.990576][T14210] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 544.998533][T14210] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 545.006489][T14210] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 545.014467][T14210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 545.025661][T14210] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) 05:25:22 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x31c}, 0xc00, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r4, &(0x7f0000000d00)=""/232, 0xe8) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000180)={0x7fffffff, 0x4, 0x4, 0x800, 0x5, {0x77359400}, {0x0, 0xc, 0x8, 0x1, 0x1, 0x1f, 'Bfs\f'}, 0x4, 0x1, @userptr=0x2, 0x9, 0x0, r3}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x80, 0x4, 0x4, 0x8, 0x6, 0x5, 0x0, 0x0, 0x6, 0x2, 0x7, 0xda, 0x1, 0xff}, 0xe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000100)={0x0, 0x2, 0x5, 0x25, 0x0, 0xb83}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_dccp_buf(r5, 0x21, 0xd, &(0x7f00000002c0)=""/152, &(0x7f0000000080)=0x98) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000000)) 05:25:22 executing program 0 (fault-call:3 fault-nth:15): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:22 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000200), &(0x7f0000000240)=0x8) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, r3, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty=0xe0000000}]}, 0x2c}}, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc6033f915bdf4bc3}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c000000f93fc192744ddc49b9fafed1faffcda4789511922862bc7c8e8ecc94ea550ac13b4606d6fa81ad0d1e0681f177c8c57dd1f13116b93236a9fd04171e73eefc852170d937f88578c5d58ebc9f87a0fd03b67568b61408698151adeaa0b148bf37296e31bb6d40663e03070000000000", @ANYRES16=r3, @ANYBLOB="000429bd7000ffdbdf250100000008000800ac1e000108000a004e2200000800080000000003080002000200000014000900ff01000000000000000000000000000114000900ff020000000000000000000000000001"], 0x5c}, 0x1, 0x0, 0x0, 0x1004}, 0x200000a1) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 546.949923][ T27] audit: type=1400 audit(1577165122.908:81): avc: denied { getopt } for pid=14231 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 546.952295][T14235] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 547.013792][T14239] FAULT_INJECTION: forcing a failure. [ 547.013792][T14239] name failslab, interval 1, probability 0, space 0, times 0 [ 547.028271][T14238] IPVS: Unknown mcast interface: syzkaller1 [ 547.045696][T14239] CPU: 1 PID: 14239 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 547.054410][T14239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.064563][T14239] Call Trace: [ 547.068046][T14239] dump_stack+0x197/0x210 [ 547.072396][T14239] should_fail.cold+0xa/0x15 [ 547.077012][T14239] ? fault_create_debugfs_attr+0x180/0x180 [ 547.082840][T14239] ? sctp_add_bind_addr+0x9f/0x3a0 [ 547.087970][T14239] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 547.093542][T14239] __should_failslab+0x121/0x190 [ 547.098503][T14239] should_failslab+0x9/0x14 [ 547.103026][T14239] kmem_cache_alloc_trace+0x4b/0x790 [ 547.107674][T14248] IPVS: Unknown mcast interface: syzkaller1 [ 547.108330][T14239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.120458][T14239] ? __ipv6_addr_type+0x219/0x32d [ 547.125507][T14239] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.131419][T14239] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.137170][T14239] sctp_add_bind_addr+0x9f/0x3a0 [ 547.142143][T14239] sctp_copy_local_addr_list+0x385/0x530 [ 547.147799][T14239] ? sctp_defaults_init+0xcb0/0xcb0 [ 547.153024][T14239] ? _get_random_bytes+0x1b2/0x430 [ 547.158157][T14239] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.164069][T14239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.170331][T14239] sctp_copy_one_addr+0x5f/0x170 [ 547.175284][T14239] ? sctp_copy_one_addr+0x5f/0x170 [ 547.180422][T14239] sctp_bind_addr_copy+0xfc/0x2c8 [ 547.185478][T14239] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 547.191746][T14239] sctp_connect_new_asoc+0x178/0x5a0 [ 547.197154][T14239] ? security_sctp_bind_connect+0x93/0xc0 [ 547.202899][T14239] sctp_sendmsg+0x13a0/0x1f10 [ 547.207620][T14239] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 547.213536][T14239] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.219449][T14239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.225714][T14239] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 547.232241][T14239] ? tomoyo_socket_bind_permission+0x360/0x360 [ 547.238428][T14239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 547.244689][T14239] inet_sendmsg+0x9e/0xe0 [ 547.249037][T14239] ? inet_send_prepare+0x4e0/0x4e0 [ 547.254172][T14239] sock_sendmsg+0xd7/0x130 [ 547.258611][T14239] ____sys_sendmsg+0x358/0x880 05:25:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 547.263394][T14239] ? kernel_sendmsg+0x50/0x50 [ 547.268080][T14239] ? __fget+0x35d/0x550 [ 547.272252][T14239] ? find_held_lock+0x35/0x130 [ 547.277043][T14239] ___sys_sendmsg+0x100/0x170 [ 547.281738][T14239] ? sendmsg_copy_msghdr+0x70/0x70 [ 547.286867][T14239] ? __kasan_check_read+0x11/0x20 [ 547.291901][T14239] ? __fget+0x37f/0x550 [ 547.296065][T14239] ? ksys_dup3+0x3e0/0x3e0 [ 547.300478][T14239] ? find_held_lock+0x35/0x130 [ 547.305290][T14239] ? get_pid_task+0x11d/0x210 [ 547.309954][T14239] ? __fget_light+0x1a9/0x230 [ 547.314630][T14239] ? __fdget+0x1b/0x20 [ 547.318688][T14239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 547.324921][T14239] ? sockfd_lookup_light+0xcb/0x180 [ 547.330122][T14239] __sys_sendmmsg+0x1bf/0x4d0 [ 547.335141][T14239] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 547.340182][T14239] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 547.346447][T14239] ? fput_many+0x12c/0x1a0 [ 547.350847][T14239] ? fput+0x1b/0x20 [ 547.354658][T14239] ? ksys_write+0x1cf/0x290 [ 547.359183][T14239] ? trace_hardirqs_on_thunk+0x1a/0x1c 05:25:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:23 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000600)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000640)={0x1, 0x0, 0x100, 0x4, {0x8, 0x9, 0x1, 0x700}}) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000180)={@remote}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r4}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0xa0124ca2}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r6, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4110}, 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380300001c00080028bd7000fcdbdf253c080019006c000000ac000700000000000000000000000000000000007f0000010000000000000000000000004e2000004e230000000020205e000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="00000000000000000000000000000000000004d22b000000000000000a0000000000ffff000000051418993065f736dd04000000000000000514000000000000ff0f000000000000068d0000000000000300000000e900000500000000000000ffffffffffffffff00000000400f040007000000000000000000001001000000010000800000000004000000060000000700000026bd700000000000000001ff200000000000000010000a002a5a1e4b6cbd700000000100000000000000000000000008001800f60900"/215], 0x338}, 0x1, 0x0, 0x0, 0x4000}, 0x10881) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 547.364640][T14239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 547.370095][T14239] ? do_syscall_64+0x26/0x790 [ 547.374779][T14239] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.380857][T14239] ? do_syscall_64+0x26/0x790 [ 547.385547][T14239] __x64_sys_sendmmsg+0x9d/0x100 [ 547.390522][T14239] do_syscall_64+0xfa/0x790 [ 547.395046][T14239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.400949][T14239] RIP: 0033:0x45a919 [ 547.404856][T14239] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.424468][T14239] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 547.432883][T14239] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 547.440855][T14239] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 547.440870][T14239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 547.457016][T14239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:25:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x40030000000000, 0x0) [ 547.465009][T14239] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:23 executing program 0 (fault-call:3 fault-nth:16): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x1) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 547.717582][T14272] FAULT_INJECTION: forcing a failure. [ 547.717582][T14272] name failslab, interval 1, probability 0, space 0, times 0 [ 547.753498][T14267] IPVS: Unknown mcast interface: syzkaller1 [ 547.773752][T14267] IPVS: Unknown mcast interface: syzkaller1 [ 547.783167][T14272] CPU: 1 PID: 14272 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 547.791876][T14272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.801940][T14272] Call Trace: [ 547.805247][T14272] dump_stack+0x197/0x210 [ 547.809599][T14272] should_fail.cold+0xa/0x15 [ 547.814212][T14272] ? fault_create_debugfs_attr+0x180/0x180 [ 547.820039][T14272] ? sctp_add_bind_addr+0x9f/0x3a0 [ 547.825181][T14272] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 547.830749][T14272] __should_failslab+0x121/0x190 [ 547.835719][T14272] should_failslab+0x9/0x14 [ 547.840243][T14272] kmem_cache_alloc_trace+0x4b/0x790 [ 547.845549][T14272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.851812][T14272] ? __ipv6_addr_type+0x219/0x32d [ 547.856853][T14272] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.862755][T14272] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.868477][T14272] sctp_add_bind_addr+0x9f/0x3a0 [ 547.873423][T14272] sctp_copy_local_addr_list+0x385/0x530 [ 547.879077][T14272] ? sctp_defaults_init+0xcb0/0xcb0 [ 547.884293][T14272] ? _get_random_bytes+0x1b2/0x430 [ 547.889431][T14272] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.895342][T14272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.901607][T14272] sctp_copy_one_addr+0x5f/0x170 [ 547.906568][T14272] ? sctp_copy_one_addr+0x5f/0x170 [ 547.911709][T14272] sctp_bind_addr_copy+0xfc/0x2c8 [ 547.916748][T14272] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 547.923097][T14272] sctp_connect_new_asoc+0x178/0x5a0 [ 547.928377][T14272] ? security_sctp_bind_connect+0x93/0xc0 [ 547.934225][T14272] sctp_sendmsg+0x13a0/0x1f10 [ 547.938963][T14272] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 547.944864][T14272] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 547.950753][T14272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.956994][T14272] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 547.963417][T14272] ? tomoyo_socket_bind_permission+0x360/0x360 [ 547.969660][T14272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 547.975906][T14272] inet_sendmsg+0x9e/0xe0 [ 547.980237][T14272] ? inet_send_prepare+0x4e0/0x4e0 [ 547.985369][T14272] sock_sendmsg+0xd7/0x130 [ 547.989800][T14272] ____sys_sendmsg+0x358/0x880 [ 547.994566][T14272] ? kernel_sendmsg+0x50/0x50 [ 547.999253][T14272] ? __fget+0x35d/0x550 [ 548.003420][T14272] ? find_held_lock+0x35/0x130 [ 548.008175][T14272] ___sys_sendmsg+0x100/0x170 [ 548.012864][T14272] ? sendmsg_copy_msghdr+0x70/0x70 [ 548.017981][T14272] ? __kasan_check_read+0x11/0x20 [ 548.023110][T14272] ? __fget+0x37f/0x550 [ 548.027268][T14272] ? ksys_dup3+0x3e0/0x3e0 [ 548.031774][T14272] ? find_held_lock+0x35/0x130 [ 548.036550][T14272] ? get_pid_task+0x11d/0x210 [ 548.041313][T14272] ? __fget_light+0x1a9/0x230 [ 548.045996][T14272] ? __fdget+0x1b/0x20 [ 548.050057][T14272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.056300][T14272] ? sockfd_lookup_light+0xcb/0x180 [ 548.061558][T14272] __sys_sendmmsg+0x1bf/0x4d0 [ 548.066231][T14272] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 548.071258][T14272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.077538][T14272] ? fput_many+0x12c/0x1a0 [ 548.081956][T14272] ? fput+0x1b/0x20 [ 548.085773][T14272] ? ksys_write+0x1cf/0x290 [ 548.090300][T14272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.095769][T14272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.101238][T14272] ? do_syscall_64+0x26/0x790 [ 548.105903][T14272] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.111965][T14272] ? do_syscall_64+0x26/0x790 [ 548.116656][T14272] __x64_sys_sendmmsg+0x9d/0x100 [ 548.121730][T14272] do_syscall_64+0xfa/0x790 [ 548.127438][T14272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.133322][T14272] RIP: 0033:0x45a919 [ 548.137219][T14272] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.156827][T14272] RSP: 002b:00007fba54602c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 548.165254][T14272] RAX: ffffffffffffffda RBX: 00007fba54602c90 RCX: 000000000045a919 05:25:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x100000000000000, 0x0) 05:25:24 executing program 0 (fault-call:3 fault-nth:17): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 548.173219][T14272] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 548.181189][T14272] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 548.189142][T14272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546036d4 [ 548.197111][T14272] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 548.314129][T14282] IPVS: Unknown mcast interface: syzkaller1 05:25:24 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x306, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x82205, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x3}, 0x0, 0x1, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 548.360119][T14285] FAULT_INJECTION: forcing a failure. [ 548.360119][T14285] name failslab, interval 1, probability 0, space 0, times 0 [ 548.376430][T14288] IPVS: Unknown mcast interface: syzkaller1 05:25:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0xf00000000000000, 0x0) [ 548.439383][T14285] CPU: 0 PID: 14285 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 548.448109][T14285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.458176][T14285] Call Trace: [ 548.461486][T14285] dump_stack+0x197/0x210 [ 548.465840][T14285] should_fail.cold+0xa/0x15 [ 548.470460][T14285] ? fault_create_debugfs_attr+0x180/0x180 [ 548.476294][T14285] ? sctp_add_bind_addr+0x9f/0x3a0 [ 548.481427][T14285] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 548.486995][T14285] __should_failslab+0x121/0x190 [ 548.491956][T14285] should_failslab+0x9/0x14 [ 548.497259][T14285] kmem_cache_alloc_trace+0x4b/0x790 [ 548.502566][T14285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.508825][T14285] ? __ipv6_addr_type+0x219/0x32d [ 548.513864][T14285] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 548.519771][T14285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 548.525509][T14285] sctp_add_bind_addr+0x9f/0x3a0 [ 548.530470][T14285] sctp_copy_local_addr_list+0x385/0x530 [ 548.531292][T14296] IPVS: Unknown mcast interface: syzkaller1 [ 548.536113][T14285] ? sctp_defaults_init+0xcb0/0xcb0 [ 548.536136][T14285] ? _get_random_bytes+0x1b2/0x430 [ 548.536153][T14285] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 548.536173][T14285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.536192][T14285] sctp_copy_one_addr+0x5f/0x170 [ 548.536204][T14285] ? sctp_copy_one_addr+0x5f/0x170 [ 548.536225][T14285] sctp_bind_addr_copy+0xfc/0x2c8 [ 548.546571][T14298] IPVS: Unknown mcast interface: syzkaller1 [ 548.547312][T14285] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 548.547338][T14285] sctp_connect_new_asoc+0x178/0x5a0 [ 548.547354][T14285] ? security_sctp_bind_connect+0x93/0xc0 [ 548.547375][T14285] sctp_sendmsg+0x13a0/0x1f10 [ 548.579676][T14285] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 548.591857][T14285] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 548.591875][T14285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.591894][T14285] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 548.591914][T14285] ? tomoyo_socket_bind_permission+0x360/0x360 [ 548.591948][T14285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.644494][T14285] inet_sendmsg+0x9e/0xe0 [ 548.648851][T14285] ? inet_send_prepare+0x4e0/0x4e0 [ 548.653946][T14285] sock_sendmsg+0xd7/0x130 [ 548.658372][T14285] ____sys_sendmsg+0x358/0x880 [ 548.663133][T14285] ? kernel_sendmsg+0x50/0x50 [ 548.668061][T14285] ? __fget+0x35d/0x550 [ 548.672209][T14285] ? find_held_lock+0x35/0x130 [ 548.676963][T14285] ___sys_sendmsg+0x100/0x170 [ 548.681777][T14285] ? sendmsg_copy_msghdr+0x70/0x70 [ 548.686889][T14285] ? __kasan_check_read+0x11/0x20 [ 548.691914][T14285] ? __fget+0x37f/0x550 [ 548.696070][T14285] ? ksys_dup3+0x3e0/0x3e0 [ 548.700471][T14285] ? find_held_lock+0x35/0x130 [ 548.705324][T14285] ? get_pid_task+0x11d/0x210 [ 548.710015][T14285] ? __fget_light+0x1a9/0x230 [ 548.714683][T14285] ? __fdget+0x1b/0x20 [ 548.718737][T14285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.725015][T14285] ? sockfd_lookup_light+0xcb/0x180 [ 548.730225][T14285] __sys_sendmmsg+0x1bf/0x4d0 [ 548.734920][T14285] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 548.739960][T14285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 548.746191][T14285] ? fput_many+0x12c/0x1a0 [ 548.750607][T14285] ? fput+0x1b/0x20 [ 548.754410][T14285] ? ksys_write+0x1cf/0x290 [ 548.758897][T14285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.764341][T14285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.769782][T14285] ? do_syscall_64+0x26/0x790 [ 548.774454][T14285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.780510][T14285] ? do_syscall_64+0x26/0x790 [ 548.785198][T14285] __x64_sys_sendmmsg+0x9d/0x100 [ 548.790131][T14285] do_syscall_64+0xfa/0x790 [ 548.794635][T14285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.800507][T14285] RIP: 0033:0x45a919 [ 548.804394][T14285] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.823988][T14285] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 548.832383][T14285] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 548.840338][T14285] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 548.848295][T14285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.856272][T14285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 548.864281][T14285] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:26 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 05:25:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x3f00000000000000, 0x0) [ 550.065555][T14305] IPVS: Unknown mcast interface: syzkaller1 [ 550.075348][T14307] IPVS: Unknown mcast interface: syzkaller1 05:25:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:26 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x8, 0x8000a, 0x3f, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) sendmsg$nl_generic(r0, 0x0, 0xc63b12f10c15d499) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:25:26 executing program 0 (fault-call:3 fault-nth:18): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x4000000000000000, 0x0) 05:25:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key(&(0x7f0000000140)='rxrpc_s\x00', 0x0, &(0x7f00000001c0)="0e58a260a37b2e67", 0x8, r2) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="a5bea0273316e310debbf93dd8188ace26474e572a2fe7", 0x17, r2) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key(&(0x7f0000000140)='rxrpc_s\x00', 0x0, &(0x7f00000001c0)="0e58a260a37b2e67", 0x8, r5) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000280)=[{&(0x7f0000000100)="8b57a143bbd5e8a4ad8f112ff4acec4e5bfbde098fdcf4820c", 0x19}, {&(0x7f0000000180)="621e0ea3e64c3d830bc919ea508450093a57dafa033b0e4e1dead211b1059dbc392d4fbee3b11b8da8426794b10e9e5ebbd5ebac06bc1047b4cfd774cb81b7f82d23376e9a005e51be66fa5a3fd004f8c5d95d12537d6e0048aca98ea56857d87e6d52b7327b6eed00b49a84efd8e55f5ad17c27c597a273346a41c5d6a2b69c5ab4cea8071b577b4ac686674911a1664fcd16923c85c504094694fa11a81d6f52abec29a6580dbb4289bc8367ed40ce1f05f74eaab09702f4ced31f690bb10c87", 0xc1}, {&(0x7f0000000300)="052c3f361f35c75695462903f0e2a8cff27a47db63125953580c5a8c516fd12d29d45c9c92834155725aca56ec82da3e19b9cbb7d6de718f14c55c5f4e09d0755d1fe0e1e869fbc9b98f5ef7c51fc812d48cd87ec853d986f5ef3a265c1ac418e4f91d5ee60d02340e7702bcf25f9656a0e1d1eca84987459b3b0d61590cc8c12b499aa6c791bb8513bbda05f5067cc937f861395fb8f44cd3110ef5a0139dce702c07", 0xa3}, {&(0x7f0000000480)="63c28d73b426dc565f12007bff21085e434f29c10a209456bf2813c8514fe66f7d4c78cdbfa6147a61036ba6c71c4b21c509a1caa4f79572e504987a02cec3db5cf893b5a5e4573a0b23c8e3d6b830d4e6c082e52f58e26a2b6ea68bf7fb2e7166e4b99e263239192b5905e87b39ec0b0f5db7db7e0b50b9b3699c4509db5cd3c77882857e7254c11c37ee39dfe06a6e1fe6c7ba2a1b6cd9e226ea94e71945e208e0290296fdc39799b67b4391c0", 0xfffffffffffffe95}], 0x4, r5) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 550.552100][T14322] IPVS: Unknown mcast interface: syzkaller1 [ 550.558450][T14323] FAULT_INJECTION: forcing a failure. [ 550.558450][T14323] name failslab, interval 1, probability 0, space 0, times 0 [ 550.609552][T14329] IPVS: Unknown mcast interface: syzkaller1 [ 550.624722][T14323] CPU: 0 PID: 14323 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 550.638990][T14323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.649063][T14323] Call Trace: [ 550.652371][T14323] dump_stack+0x197/0x210 [ 550.656727][T14323] should_fail.cold+0xa/0x15 [ 550.661338][T14323] ? fault_create_debugfs_attr+0x180/0x180 [ 550.667169][T14323] ? sctp_add_bind_addr+0x9f/0x3a0 [ 550.672299][T14323] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 550.677882][T14323] __should_failslab+0x121/0x190 [ 550.682859][T14323] should_failslab+0x9/0x14 [ 550.687370][T14323] kmem_cache_alloc_trace+0x4b/0x790 [ 550.692672][T14323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.698958][T14323] ? __ipv6_addr_type+0x219/0x32d [ 550.703991][T14323] ? __sanitizer_cov_trace_switch+0x49/0x80 05:25:26 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r6, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000001400)=0x800, 0x4) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r7, 0x4b3b, 0x0) sendmsg$unix(r3, &(0x7f00000013c0)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000180)="a52de9c2b1dd22d6151f80002e905a02f5c523d960bd24deba146b7034354206590dfa171b15a50dd4a255ae18610af3f136b3a57a0fdece565a24bf4b336239e56e3dd2c2ee50656c6b171af510b2012d10e5c607703c84a472c3c4e7e125c968e0a6130a8edf7bfa4385c3ae9f923195f96fd4afca3430960356ba77caded83a91ed55f7678e244218fb3476d40969de4613f7a1f229f55a8a2b34600e3b593b7effe3b73c829f68c1bd3fdf10d33cdad3c40b6a95bbbe4de3497b0f6336551bc9e306566a911990ab415ab769ce9cd6ace3e104d724b90b78724d36c3c229bab750e1d760c4fb49bb9c30a252ca021be5a9", 0xf3}, {&(0x7f0000000080)="f51145787bc564b3e9c1e6befe0902cfb0f040c8b76cd30eedfa", 0x1a}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="21a5dc9b944effe26417b68bd23010935fe49553bdae1920b55ba305ed18e3ef9b91d4f4be2e9016b0baa2d07f15910ab99a2cfd9be0ba7cec12668d4f0163d44bafa6fe2081da9ea081682665a7168b9ad189f1a1156b4df6847142f1d9b0efbe1f5aeb69cfa561f22f88ce5730e14730de80c8137bba7b3b86aaea67e648a839268ae73c06f27aed1960f8363654a256f6b33052e8098e48ed2de4d9e5197185f09adf461b2d171f9a21414403311dfb6c8841e5e5cc5a3e8cd5345a9a5404458ff82ba68750a6efd872810b0a35bd7235e08845", 0xd5}], 0x4, &(0x7f0000000100)=[@rights={{0x18, 0x1, 0x1, [r4, r2]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r1, r2, r1, r5, r7]}}], 0x40, 0x80}, 0x80) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 550.709898][T14323] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 550.715633][T14323] sctp_add_bind_addr+0x9f/0x3a0 [ 550.720586][T14323] sctp_copy_local_addr_list+0x385/0x530 [ 550.726235][T14323] ? sctp_defaults_init+0xcb0/0xcb0 [ 550.731453][T14323] ? _get_random_bytes+0x1b2/0x430 [ 550.736579][T14323] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 550.742494][T14323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.748758][T14323] sctp_copy_one_addr+0x5f/0x170 [ 550.753712][T14323] ? sctp_copy_one_addr+0x5f/0x170 05:25:26 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) r2 = getpgrp(0x0) sched_getparam(r2, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 550.758851][T14323] sctp_bind_addr_copy+0xfc/0x2c8 [ 550.763896][T14323] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 550.770155][T14323] sctp_connect_new_asoc+0x178/0x5a0 [ 550.775457][T14323] ? security_sctp_bind_connect+0x93/0xc0 [ 550.781197][T14323] sctp_sendmsg+0x13a0/0x1f10 [ 550.785901][T14323] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 550.791803][T14323] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 550.797710][T14323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.803964][T14323] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb 05:25:26 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000d00)=""/232, 0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x7f, 0x0, 0x7f, 0x1402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000000)={0x101, 0x101, 0x200, 0x7, 0x7fffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 550.810391][T14323] ? tomoyo_socket_bind_permission+0x360/0x360 [ 550.816579][T14323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.822838][T14323] inet_sendmsg+0x9e/0xe0 [ 550.827177][T14323] ? inet_send_prepare+0x4e0/0x4e0 [ 550.832302][T14323] sock_sendmsg+0xd7/0x130 [ 550.836736][T14323] ____sys_sendmsg+0x358/0x880 [ 550.841526][T14323] ? kernel_sendmsg+0x50/0x50 [ 550.846208][T14323] ? __fget+0x35d/0x550 [ 550.850379][T14323] ? find_held_lock+0x35/0x130 [ 550.855174][T14323] ___sys_sendmsg+0x100/0x170 [ 550.859875][T14323] ? sendmsg_copy_msghdr+0x70/0x70 [ 550.865020][T14323] ? __kasan_check_read+0x11/0x20 [ 550.870061][T14323] ? __fget+0x37f/0x550 [ 550.874236][T14323] ? ksys_dup3+0x3e0/0x3e0 [ 550.878661][T14323] ? find_held_lock+0x35/0x130 [ 550.883545][T14323] ? get_pid_task+0x11d/0x210 [ 550.888252][T14323] ? __fget_light+0x1a9/0x230 [ 550.893299][T14323] ? __fdget+0x1b/0x20 [ 550.897392][T14323] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.903821][T14323] ? sockfd_lookup_light+0xcb/0x180 [ 550.909069][T14323] __sys_sendmmsg+0x1bf/0x4d0 [ 550.913770][T14323] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 550.918864][T14323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.925122][T14323] ? fput_many+0x12c/0x1a0 [ 550.929561][T14323] ? fput+0x1b/0x20 [ 550.933381][T14323] ? ksys_write+0x1cf/0x290 [ 550.937909][T14323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 550.943536][T14323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 550.949010][T14323] ? do_syscall_64+0x26/0x790 [ 550.953701][T14323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.959785][T14323] ? do_syscall_64+0x26/0x790 [ 550.964493][T14323] __x64_sys_sendmmsg+0x9d/0x100 [ 550.969459][T14323] do_syscall_64+0xfa/0x790 [ 550.973990][T14323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.979897][T14323] RIP: 0033:0x45a919 [ 550.983806][T14323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:25:26 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) socket$netlink(0x10, 0x3, 0x7) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyprintk\x00', 0x200000, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x7b5c7b3bdb8cdcaf, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r4, 0xc4c85512, &(0x7f00000002c0)={{0x8, 0x0, 0x49, 0x4, 'syz1\x00', 0xfca}, 0x0, [0x1000, 0x0, 0x3, 0x0, 0x100000000, 0x200, 0x1, 0x9, 0x9, 0x4, 0x1, 0x1000, 0x3e99, 0x6, 0x482, 0x8, 0x5, 0x6c0, 0x8000, 0x3, 0x6, 0xff, 0x2, 0x80000000, 0x8001, 0x6, 0x2, 0x3cd01770, 0x3f, 0x3, 0x1, 0x8, 0x7c83324, 0xcabe, 0x800, 0x6, 0x7, 0x3, 0x9, 0x1, 0x80000001, 0x2, 0x1f, 0x1, 0xd69, 0x661, 0xa2, 0x9, 0x4, 0x1000, 0x5, 0xfffffffffffffff8, 0x8, 0x5, 0x1, 0x401, 0x70, 0x2, 0x5, 0x94c, 0x8001, 0xfffffffffffffffc, 0x2, 0x1000, 0x8f37, 0x7, 0x1ff, 0x0, 0x61, 0x7, 0x7288, 0x9, 0x5, 0x6, 0x2, 0x5a, 0x8, 0x335, 0x6, 0x0, 0x4, 0x7fff, 0x5, 0x4, 0xff, 0xca7, 0x8, 0x9, 0x100000000, 0x9, 0x7, 0x3, 0x828, 0x3ff, 0x9, 0x8, 0xeee, 0xa8c0, 0x8, 0x2, 0x7, 0x2, 0x727, 0x6, 0x0, 0x9c2a, 0x0, 0x6, 0x6, 0xff, 0x80000000, 0x5, 0xc00000000, 0x3f, 0x4fe2, 0x1, 0x100000001, 0x1000, 0x9, 0x6, 0x9, 0x4, 0xc00000000000000, 0x1, 0xff, 0xff, 0xfff, 0x8]}) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r6, &(0x7f0000000d00)=""/232, 0xe8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f00000000c0)={0x9, 0x3, 0x4, 0x20000, 0x0, {0x0, 0x2710}, {0x1, 0x1a, 0x1, 0x2, 0x8, 0xed, "c8deb60d"}, 0xfffffffa, 0x4, @fd=r6, 0xf08, 0x0, r7}) ioctl$VIDIOC_DQEVENT(r8, 0x80885659, &(0x7f0000000180)={0x0, @src_change}) socket$netlink(0x10, 0x3, 0x3) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000040), 0x2) r9 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r9, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f00000007c0)=0x57de6f38, 0x4) accept4$vsock_stream(r9, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x1}, 0x10, 0xbe6fbce9bc337125) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, 0x0, &(0x7f0000000280)) r11 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r11, 0x4b3b, 0x0) ioctl$TCGETS(r11, 0x5401, &(0x7f0000000800)) [ 551.003425][T14323] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 551.012000][T14323] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 551.019990][T14323] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 551.027984][T14323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 551.035969][T14323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 551.043952][T14323] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:29 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:29 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x40, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) sendmsg$nl_generic(r2, 0x0, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @remote}, {0x6, @broadcast}, 0x10, {0x2, 0x4e21, @remote}, 'hwsim0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000280)=""/172) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r5, 0x20, 0x70bd25, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x80000001, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20000001) wait4(0x0, 0x0, 0x0, 0x0) [ 553.211755][T14363] IPVS: Unknown mcast interface: syzkaller1 [ 553.244983][T14363] IPVS: Unknown mcast interface: syzkaller1 05:25:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:29 executing program 0 (fault-call:3 fault-nth:19): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0xe553367a14890401, 0x54, 0x1f, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0xa20934, 0x1, [], @value=0x7fffffff}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8002, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x5b93, 0x0, 0xffffffffffffff90, 0x0, @tick, {}, {}, @connect}], 0x1c) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f00000000c0)={r2, 0x8, 0x6}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r2, 0x0, 0x200}) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0xf335b0cb76cad0c6, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000000)=0x9) 05:25:29 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x60801) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="dd145b04fd72b37d6e173ce8b1618a530dcf500d6f02ce357c895328afab07a801981eea1e8fec69294040f171f265352b5a46393d2ef6c78b13a5c367de93cbb712d9ac68eb076ae48da5626056657560c2ae78f5c0f980acdfeefc1ee2371333867e0b7ea88262bb56f30c1bce11ffe9dd5bb7ad0bcb24684a1b8cd2d6b82c8dc41416ede6a2f4543a1222787b378ab2dbc1bc07d9567880859d58958d14c9f75d26cd368f972b831d62484ea1c37b736f0923c23cc35cf83e78e6bdf2a71bfea20d5e99d7edcffb6e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x24) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x401}, 0x4) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:29 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) [ 553.694491][T14384] FAULT_INJECTION: forcing a failure. [ 553.694491][T14384] name failslab, interval 1, probability 0, space 0, times 0 [ 553.731481][T14384] CPU: 1 PID: 14384 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 553.740234][T14384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.750282][T14384] Call Trace: [ 553.753588][T14384] dump_stack+0x197/0x210 [ 553.757947][T14384] should_fail.cold+0xa/0x15 [ 553.762559][T14384] ? fault_create_debugfs_attr+0x180/0x180 [ 553.768389][T14384] ? sctp_add_bind_addr+0x9f/0x3a0 [ 553.773510][T14384] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 553.779080][T14384] __should_failslab+0x121/0x190 [ 553.784041][T14384] should_failslab+0x9/0x14 [ 553.788553][T14384] kmem_cache_alloc_trace+0x4b/0x790 [ 553.789359][T14381] IPVS: Unknown mcast interface: syzkaller1 [ 553.793851][T14384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.793869][T14384] ? __ipv6_addr_type+0x219/0x32d [ 553.793882][T14384] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 553.793896][T14384] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 553.793915][T14384] sctp_add_bind_addr+0x9f/0x3a0 [ 553.793935][T14384] sctp_copy_local_addr_list+0x385/0x530 [ 553.793956][T14384] ? sctp_defaults_init+0xcb0/0xcb0 [ 553.838634][T14384] ? _get_random_bytes+0x1b2/0x430 [ 553.843733][T14384] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 553.849620][T14384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.855856][T14384] sctp_copy_one_addr+0x5f/0x170 [ 553.860775][T14384] ? sctp_copy_one_addr+0x5f/0x170 [ 553.865872][T14384] sctp_bind_addr_copy+0xfc/0x2c8 [ 553.870897][T14384] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 553.877136][T14384] sctp_connect_new_asoc+0x178/0x5a0 [ 553.882420][T14384] ? security_sctp_bind_connect+0x93/0xc0 [ 553.888560][T14384] sctp_sendmsg+0x13a0/0x1f10 [ 553.893228][T14384] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 553.899540][T14384] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 553.905419][T14384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.911819][T14384] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 553.918229][T14384] ? tomoyo_socket_bind_permission+0x360/0x360 [ 553.924379][T14384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.930618][T14384] inet_sendmsg+0x9e/0xe0 [ 553.934939][T14384] ? inet_send_prepare+0x4e0/0x4e0 [ 553.940041][T14384] sock_sendmsg+0xd7/0x130 [ 553.944445][T14384] ____sys_sendmsg+0x358/0x880 [ 553.949198][T14384] ? kernel_sendmsg+0x50/0x50 [ 553.953858][T14384] ? __fget+0x35d/0x550 [ 553.957997][T14384] ? find_held_lock+0x35/0x130 [ 553.962752][T14384] ___sys_sendmsg+0x100/0x170 [ 553.967418][T14384] ? sendmsg_copy_msghdr+0x70/0x70 [ 553.972514][T14384] ? __kasan_check_read+0x11/0x20 [ 553.977524][T14384] ? __fget+0x37f/0x550 [ 553.981691][T14384] ? ksys_dup3+0x3e0/0x3e0 [ 553.986091][T14384] ? find_held_lock+0x35/0x130 [ 553.990842][T14384] ? get_pid_task+0x11d/0x210 [ 553.995506][T14384] ? __fget_light+0x1a9/0x230 [ 554.000164][T14384] ? __fdget+0x1b/0x20 [ 554.004228][T14384] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.010452][T14384] ? sockfd_lookup_light+0xcb/0x180 [ 554.015638][T14384] __sys_sendmmsg+0x1bf/0x4d0 [ 554.020307][T14384] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 554.025331][T14384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.031558][T14384] ? fput_many+0x12c/0x1a0 [ 554.035962][T14384] ? fput+0x1b/0x20 [ 554.039762][T14384] ? ksys_write+0x1cf/0x290 [ 554.044252][T14384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 554.049700][T14384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 554.055142][T14384] ? do_syscall_64+0x26/0x790 [ 554.059807][T14384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.065858][T14384] ? do_syscall_64+0x26/0x790 [ 554.070555][T14384] __x64_sys_sendmmsg+0x9d/0x100 [ 554.075500][T14384] do_syscall_64+0xfa/0x790 [ 554.080263][T14384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.086163][T14384] RIP: 0033:0x45a919 [ 554.090046][T14384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.109651][T14384] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 554.118067][T14384] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 554.126041][T14384] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 554.134017][T14384] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:25:30 executing program 0 (fault-call:3 fault-nth:20): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000000)={0x0, 0x5, 0xe810}) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4600a5e1", @ANYRES16=r5, @ANYBLOB="31050000000000001d0008000000280003001400020073797a6b616c6c651c0d98dc243a6d5200010000000000000000000000000067faac65b3b6416cee31760d7f2a46cb02ba4da6fa22d7308b2f7670c2c63a64ccdd3f5fc54ac55d5b46f17efd9634faf67c6cf74dec08393f04f649a71c4b989b04875d3e7ab26a44aa6525838ebbe3793755290b91c9870cab8cd0de17cf196ab0d5d3db4a4ed674330d49197a0835c244caf3ebbf9617cc2cd24aed259dc1528ed840e797b4baac82ed424430a0871129cd6d15b2ee58801579c77dcdf3efe3baf1332396a6f74016c10b7be701b215c4956da7b7f589411ff12c2d9e754aea513848364940960582adaaa03f7db8eed8a392b2be22adb14136ad0f13e3c21b40e148d8e058c830212f5cea2633e56457b31881a88e5fc617f09eb093ef0f00000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 554.141987][T14384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 554.149943][T14384] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 554.176554][T14393] IPVS: Unknown mcast interface: syzkaller1 05:25:30 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsync(r0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 554.312692][T14402] FAULT_INJECTION: forcing a failure. [ 554.312692][T14402] name failslab, interval 1, probability 0, space 0, times 0 [ 554.357182][T14402] CPU: 1 PID: 14402 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 554.365900][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.375963][T14402] Call Trace: [ 554.379276][T14402] dump_stack+0x197/0x210 [ 554.383627][T14402] should_fail.cold+0xa/0x15 [ 554.388243][T14402] ? fault_create_debugfs_attr+0x180/0x180 [ 554.394072][T14402] ? sctp_add_bind_addr+0x9f/0x3a0 [ 554.399201][T14402] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 554.404772][T14402] __should_failslab+0x121/0x190 [ 554.409720][T14402] should_failslab+0x9/0x14 [ 554.414229][T14402] kmem_cache_alloc_trace+0x4b/0x790 [ 554.419519][T14402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.425777][T14402] ? __ipv6_addr_type+0x219/0x32d [ 554.430806][T14402] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 554.437050][T14402] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 554.442796][T14402] sctp_add_bind_addr+0x9f/0x3a0 [ 554.447787][T14402] sctp_copy_local_addr_list+0x385/0x530 [ 554.453437][T14402] ? sctp_defaults_init+0xcb0/0xcb0 [ 554.458640][T14402] ? _get_random_bytes+0x1b2/0x430 [ 554.463744][T14402] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 554.469644][T14402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.475902][T14402] sctp_copy_one_addr+0x5f/0x170 [ 554.480849][T14402] ? sctp_copy_one_addr+0x5f/0x170 [ 554.485975][T14402] sctp_bind_addr_copy+0xfc/0x2c8 [ 554.491021][T14402] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 554.497279][T14402] sctp_connect_new_asoc+0x178/0x5a0 [ 554.502583][T14402] ? security_sctp_bind_connect+0x93/0xc0 [ 554.508327][T14402] sctp_sendmsg+0x13a0/0x1f10 [ 554.513041][T14402] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 554.518952][T14402] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 554.524877][T14402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.531136][T14402] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 554.537581][T14402] ? tomoyo_socket_bind_permission+0x360/0x360 [ 554.543772][T14402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.550119][T14402] inet_sendmsg+0x9e/0xe0 05:25:30 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x2000000000000010, 0x3, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r5, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r5, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x8de8163b1ebc1d25, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r8, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 554.554461][T14402] ? inet_send_prepare+0x4e0/0x4e0 [ 554.559583][T14402] sock_sendmsg+0xd7/0x130 [ 554.564022][T14402] ____sys_sendmsg+0x358/0x880 [ 554.568890][T14402] ? kernel_sendmsg+0x50/0x50 [ 554.573581][T14402] ? __fget+0x35d/0x550 [ 554.577752][T14402] ? find_held_lock+0x35/0x130 [ 554.582544][T14402] ___sys_sendmsg+0x100/0x170 [ 554.587227][T14402] ? sendmsg_copy_msghdr+0x70/0x70 [ 554.592334][T14402] ? __kasan_check_read+0x11/0x20 [ 554.597357][T14402] ? __fget+0x37f/0x550 [ 554.601519][T14402] ? ksys_dup3+0x3e0/0x3e0 [ 554.606020][T14402] ? find_held_lock+0x35/0x130 [ 554.610778][T14402] ? get_pid_task+0x11d/0x210 [ 554.615464][T14402] ? __fget_light+0x1a9/0x230 [ 554.620141][T14402] ? __fdget+0x1b/0x20 [ 554.624211][T14402] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.630444][T14402] ? sockfd_lookup_light+0xcb/0x180 [ 554.635632][T14402] __sys_sendmmsg+0x1bf/0x4d0 [ 554.640294][T14402] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 554.645584][T14402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.652168][T14402] ? fput_many+0x12c/0x1a0 [ 554.656597][T14402] ? fput+0x1b/0x20 [ 554.660412][T14402] ? ksys_write+0x1cf/0x290 [ 554.664901][T14402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 554.670518][T14402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 554.676230][T14402] ? do_syscall_64+0x26/0x790 [ 554.680901][T14402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.687060][T14402] ? do_syscall_64+0x26/0x790 [ 554.691752][T14402] __x64_sys_sendmmsg+0x9d/0x100 [ 554.696706][T14402] do_syscall_64+0xfa/0x790 [ 554.701233][T14402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.707179][T14402] RIP: 0033:0x45a919 [ 554.711098][T14402] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.731576][T14402] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 554.740006][T14402] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 554.747970][T14402] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000540), &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfd5c}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x420001, 0x40) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 554.755933][T14402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 554.763893][T14402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 554.771856][T14402] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 554.809463][T14409] IPVS: Unknown mcast interface: syzkaller1 [ 554.829167][T14409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14409 comm=syz-executor.1 [ 554.858734][T14415] IPVS: Unknown mcast interface: syzkaller1 05:25:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:32 executing program 0 (fault-call:3 fault-nth:21): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:32 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r1, 0x700f) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x8, &(0x7f0000000600)=[{&(0x7f00000002c0)="a4aceb7a07001dae8a4e2029ba57e99e6a9888baa396a1a3c0cb5efb112028a28f127d27a5de26932205caabdc75b9d76f3447f7183473d82e8e96d4d397828bd84b704088177a69d83a956a923e45a947d4e4bdb8ffb614ac0c2fbcfdc665b5635e934154b68c9706193f07ca36f04bc7065d42e10cb40b33f62376c35e085638", 0x81, 0x77}, {&(0x7f0000000380)="4e23bb7893fff283e03c563a288a5845c02870a3e17844680f82cdbe0b1043526d9f250a8939b1bdc7e10555d1a3ec9bec0d8cf485c2d1fcdda219ea1f394e9d526298c57f2084a45b75207645950b54c106b7713102b0c7e81547c3cb5ee2658dfa5f5d28bee466fcdbc76bcb8c56b873cd1b4dc74d58b411c153540d90f8693b379afba8ff5d27006d84e6dc741aead4bd63b82234465b22", 0x99, 0x3cf9}, {&(0x7f0000000440)="50c4db02934ddc53674534994141a9aed176f5c96d8f56f6a4f8074fed83cc1492029394721de5401009feca43c3b1c883ea8c8514a962620b531bcd3bf9d0e17835dce60c62d42d571604f92eeab7fe80469e53ee3e41d68073d84e8cd6d9bc301dbdb7a52d3cf166667393f58afe20ee58624c723f466eb354849b4d2a90e96d56e6cf5f537ec142e2a9067f4b49a263a61959c88d4f2b4691925c98d313d95d29e4e8ca94190dc55ebb6e61c1c0de4356cbfccc4052f9b3d1d764b84b6d653864ff417ba3e83403d70fc09c299b29156bd0b4d8b97db851486f", 0xdb, 0x8001}, {&(0x7f0000000180)="3751fec35f816d91c838914f20d8a6db04d9238f8fe586df843a1b4c2879d3183f2d8c8f0717afef61", 0x29, 0x7e7}, {&(0x7f0000000200)="76b556ad01057445d4293704b7c4075a79bdce05a4a05aeac49637ae7e0e791d02ee9a581ff4fd1a9a67ee83143fb74003", 0x31, 0x65}, {&(0x7f0000000540)="0748590eb140fbc07a1ccea40b5f70d5ef7be54a0773b4afaf026e235f6d5b4709682df82e44b75b3fa109fe87c844ca362c470a2a3efc826061b3584af0f59fd1b47a11b4090a5848fbe90e4a8239ed2aac769ca99904367a87b5d35c321c2f9558859a82bd9ceb55f70a911d3953de35daab38227b7b840c16988c29ef4ede7ccd0ec3", 0x84, 0x7ff}, {&(0x7f0000000e00)="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", 0x1000, 0xdb31}, {&(0x7f0000000240)="53772c0197f3bb69e370ec5a3470ea334157169d0f2c0cadb47e68273c907ddd1c5b2a3c549afa2c130b7da92c7c721b4346d9042fbf", 0x36, 0xfffffffffffffff8}], 0x2000, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) mmap$snddsp_status(&(0x7f0000ffc000/0x4000)=nil, 0x1000, 0x4, 0x4000010, r2, 0x82000000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="e86f569ed23d002f37", @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800010000000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0900000001020000514eb5ddc67d1c9a77fb3946c5df45a003ebd8caae0950ac8084ad54e3734ae34e2bda1b084145bb75212d6544aa8162366667f4f45edb378113b5093b36ec2487f4ce04719fa03e1982adf4b5008829a113eb9716e3231b7f7b13f260c063f711891335f1"], 0x0) 05:25:32 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:32 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) sendmsg$nl_generic(r2, 0x0, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 556.804184][T14441] FAULT_INJECTION: forcing a failure. [ 556.804184][T14441] name failslab, interval 1, probability 0, space 0, times 0 [ 556.866486][T14441] CPU: 1 PID: 14441 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 556.875207][T14441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.885793][T14441] Call Trace: [ 556.889104][T14441] dump_stack+0x197/0x210 [ 556.893446][T14441] should_fail.cold+0xa/0x15 [ 556.893465][T14441] ? fault_create_debugfs_attr+0x180/0x180 [ 556.893482][T14441] ? sctp_add_bind_addr+0x9f/0x3a0 [ 556.893503][T14441] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 556.914560][T14441] __should_failslab+0x121/0x190 [ 556.919511][T14441] should_failslab+0x9/0x14 [ 556.924009][T14441] kmem_cache_alloc_trace+0x4b/0x790 [ 556.929313][T14441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.935569][T14441] ? __ipv6_addr_type+0x219/0x32d [ 556.940624][T14441] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 556.946534][T14441] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 556.952276][T14441] sctp_add_bind_addr+0x9f/0x3a0 [ 556.957238][T14441] sctp_copy_local_addr_list+0x385/0x530 [ 556.962894][T14441] ? sctp_defaults_init+0xcb0/0xcb0 [ 556.968116][T14441] ? _get_random_bytes+0x1b2/0x430 [ 556.973236][T14441] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 556.979150][T14441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.985413][T14441] sctp_copy_one_addr+0x5f/0x170 [ 556.990357][T14441] ? sctp_copy_one_addr+0x5f/0x170 [ 556.995491][T14441] sctp_bind_addr_copy+0xfc/0x2c8 [ 557.001335][T14441] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 557.001356][T14441] sctp_connect_new_asoc+0x178/0x5a0 05:25:32 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x80}}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 557.001380][T14441] ? security_sctp_bind_connect+0x93/0xc0 [ 557.001405][T14441] sctp_sendmsg+0x13a0/0x1f10 [ 557.018724][T14441] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 557.029291][T14441] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 557.035212][T14441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.041472][T14441] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 557.048003][T14441] ? tomoyo_socket_bind_permission+0x360/0x360 [ 557.054213][T14441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 557.060566][T14441] inet_sendmsg+0x9e/0xe0 05:25:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x800) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x10d280, 0x24) socket$netlink(0x10, 0x3, 0x34) write$nbd(r2, &(0x7f0000000180)={0x67446698, 0x0, 0x1, 0x2, 0x4, "f0321278a587106281c52d0e5f864f39579292f37de00ffaa6c4575ace8e7e0c984bc0a0b633bf39aba140a085ba21a27da0aa86b462bffd846e53c71d290558c5456f37897f4fb4cac258999205fa17daed70cc723acc5741339eda000909f3edee9cd4eb8a1d37a3c2aa8af7b927b45b800d486032de14a7993268212b501e7f29954fe1458120eebfe79e011b0d51805ee833349c7caf72f99fbc710a6c552d58687b310d250fd18b3c68119b3a7dbe1061382d48c95ce3975bdf4dc8565e75ca143d58c66ad32b6e9c510923036df330c10bd6d8fbf0b34420051ec5b4e9eba128b2a72af36a331b61ea604b128e"}, 0x100) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000000)=0x6d7) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 557.064926][T14441] ? inet_send_prepare+0x4e0/0x4e0 [ 557.070054][T14441] sock_sendmsg+0xd7/0x130 [ 557.074485][T14441] ____sys_sendmsg+0x358/0x880 [ 557.079983][T14441] ? kernel_sendmsg+0x50/0x50 [ 557.084673][T14441] ? __fget+0x35d/0x550 [ 557.089106][T14441] ? find_held_lock+0x35/0x130 [ 557.093891][T14441] ___sys_sendmsg+0x100/0x170 [ 557.098590][T14441] ? sendmsg_copy_msghdr+0x70/0x70 [ 557.103809][T14441] ? __kasan_check_read+0x11/0x20 [ 557.108859][T14441] ? __fget+0x37f/0x550 [ 557.113049][T14441] ? ksys_dup3+0x3e0/0x3e0 [ 557.117479][T14441] ? find_held_lock+0x35/0x130 [ 557.122259][T14441] ? get_pid_task+0x11d/0x210 [ 557.126961][T14441] ? __fget_light+0x1a9/0x230 [ 557.131657][T14441] ? __fdget+0x1b/0x20 [ 557.135741][T14441] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.142007][T14441] ? sockfd_lookup_light+0xcb/0x180 [ 557.147225][T14441] __sys_sendmmsg+0x1bf/0x4d0 [ 557.152970][T14441] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 557.158035][T14441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 05:25:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0xd3, 0x0, 0x7f, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x10000) [ 557.164315][T14441] ? fput_many+0x12c/0x1a0 [ 557.168743][T14441] ? fput+0x1b/0x20 [ 557.172589][T14441] ? ksys_write+0x1cf/0x290 [ 557.177110][T14441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 557.182587][T14441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 557.189983][T14441] ? do_syscall_64+0x26/0x790 [ 557.194677][T14441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.200764][T14441] ? do_syscall_64+0x26/0x790 [ 557.205459][T14441] __x64_sys_sendmmsg+0x9d/0x100 [ 557.210688][T14441] do_syscall_64+0xfa/0x790 [ 557.215211][T14441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.221126][T14441] RIP: 0033:0x45a919 [ 557.225123][T14441] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.244744][T14441] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 557.253172][T14441] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 05:25:33 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x10004, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_bp={0x0}, 0x1100}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040)=0x6e, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 557.261292][T14441] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 557.269275][T14441] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 557.277260][T14441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 557.285243][T14441] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:35 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0900000100000051"], 0x0) 05:25:35 executing program 0 (fault-call:3 fault-nth:22): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:35 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r2}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000), 0x10) wait4(0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000280)=0x1a0) r7 = creat(&(0x7f0000000740)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x4002) r8 = dup(0xffffffffffffffff) r9 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, 0x0, 0x0) connect$inet6(r9, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r9, r10, &(0x7f0000000240)=0x202, 0x4000000000dc) r11 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r10, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r11, @ANYBLOB="e5510142cf8b33c4bba137fc0711763a1d02ecc7f9f3cb4d7437e23954978027ecb82fc6c544fe5287497378f62e8dbfbdda162c3686ba44093d08825f135d12f7e696ebd25e01c260510011e6382d857b3f472fa6fb"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r12 = epoll_create1(0x0) close(r12) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xf2ba825992b3006c}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4466649c42f4ed537e5db8", @ANYRES16=r11, @ANYRES64=r12], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x20004811) sendmsg$NBD_CMD_CONNECT(r8, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r11, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r11, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x40004}, 0x2) sendmsg$NBD_CMD_STATUS(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r11, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x8040}, 0xc001) [ 559.877671][T14487] IPVS: Unknown mcast interface: syzkaller1 [ 559.937544][T14493] FAULT_INJECTION: forcing a failure. [ 559.937544][T14493] name failslab, interval 1, probability 0, space 0, times 0 [ 559.976168][T14493] CPU: 1 PID: 14493 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 559.980015][ T27] audit: type=1804 audit(1577165135.928:82): pid=14486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir135911329/syzkaller.DX6JY5/127/file0" dev="sda1" ino=17105 res=1 [ 559.984971][T14493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.984978][T14493] Call Trace: [ 559.985001][T14493] dump_stack+0x197/0x210 [ 559.985022][T14493] should_fail.cold+0xa/0x15 [ 559.985044][T14493] ? fault_create_debugfs_attr+0x180/0x180 [ 560.040607][T14493] ? sctp_add_bind_addr+0x9f/0x3a0 [ 560.045740][T14493] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 560.051316][T14493] __should_failslab+0x121/0x190 [ 560.056277][T14493] should_failslab+0x9/0x14 [ 560.060800][T14493] kmem_cache_alloc_trace+0x4b/0x790 [ 560.062141][T14504] IPVS: Unknown mcast interface: syzkaller1 [ 560.066103][T14493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.066120][T14493] ? __ipv6_addr_type+0x219/0x32d [ 560.066134][T14493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 560.066154][T14493] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.094913][T14493] sctp_add_bind_addr+0x9f/0x3a0 [ 560.099970][T14493] sctp_copy_local_addr_list+0x385/0x530 [ 560.103938][ T27] audit: type=1400 audit(1577165135.938:83): avc: denied { connect } for pid=14483 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 560.105637][T14493] ? sctp_defaults_init+0xcb0/0xcb0 [ 560.105658][T14493] ? _get_random_bytes+0x1b2/0x430 [ 560.105680][T14493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 560.146600][T14493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.152862][T14493] sctp_copy_one_addr+0x5f/0x170 [ 560.157808][T14493] ? sctp_copy_one_addr+0x5f/0x170 [ 560.162909][T14493] sctp_bind_addr_copy+0xfc/0x2c8 [ 560.167921][T14493] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 560.174155][T14493] sctp_connect_new_asoc+0x178/0x5a0 [ 560.179442][T14493] ? security_sctp_bind_connect+0x93/0xc0 [ 560.185280][T14493] sctp_sendmsg+0x13a0/0x1f10 [ 560.189945][T14493] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 560.195859][T14493] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 560.202101][T14493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.208327][T14493] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 560.214741][T14493] ? tomoyo_socket_bind_permission+0x360/0x360 [ 560.220983][T14493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.227208][T14493] inet_sendmsg+0x9e/0xe0 [ 560.231526][T14493] ? inet_send_prepare+0x4e0/0x4e0 [ 560.236621][T14493] sock_sendmsg+0xd7/0x130 [ 560.241020][T14493] ____sys_sendmsg+0x358/0x880 [ 560.245821][T14493] ? kernel_sendmsg+0x50/0x50 [ 560.250494][T14493] ? __fget+0x35d/0x550 [ 560.254633][T14493] ? find_held_lock+0x35/0x130 [ 560.259402][T14493] ___sys_sendmsg+0x100/0x170 [ 560.264091][T14493] ? sendmsg_copy_msghdr+0x70/0x70 [ 560.269267][T14493] ? __kasan_check_read+0x11/0x20 [ 560.274280][T14493] ? __fget+0x37f/0x550 [ 560.278424][T14493] ? ksys_dup3+0x3e0/0x3e0 [ 560.282835][T14493] ? find_held_lock+0x35/0x130 [ 560.287585][T14493] ? get_pid_task+0x11d/0x210 [ 560.292260][T14493] ? __fget_light+0x1a9/0x230 [ 560.296922][T14493] ? __fdget+0x1b/0x20 [ 560.300982][T14493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.307242][T14493] ? sockfd_lookup_light+0xcb/0x180 [ 560.312427][T14493] __sys_sendmmsg+0x1bf/0x4d0 [ 560.317088][T14493] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 560.322127][T14493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.328374][T14493] ? fput_many+0x12c/0x1a0 [ 560.332773][T14493] ? fput+0x1b/0x20 [ 560.336589][T14493] ? ksys_write+0x1cf/0x290 [ 560.341085][T14493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.346542][T14493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.351986][T14493] ? do_syscall_64+0x26/0x790 [ 560.356647][T14493] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.362799][T14493] ? do_syscall_64+0x26/0x790 [ 560.367466][T14493] __x64_sys_sendmmsg+0x9d/0x100 [ 560.372403][T14493] do_syscall_64+0xfa/0x790 [ 560.376912][T14493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.382809][T14493] RIP: 0033:0x45a919 [ 560.386685][T14493] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.406274][T14493] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 560.414674][T14493] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 560.422640][T14493] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 560.430595][T14493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:25:36 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x1, 0x0) setsockopt$ax25_int(r1, 0x101, 0x7, &(0x7f0000000080)=0xffff, 0x4) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xf, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:36 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x7fff, 0x8, &(0x7f0000000500)=[{&(0x7f0000000100)="121a789f2e39bcaf173d955cfd87430d62d11a2a2649507b1314f7812a3bb536360acc5984871398cad206dcb3", 0x2d, 0xa1b}, {&(0x7f0000000240)="1668b7fc543d1f03cea25a5340af1f3481c4495b1e1b7e90cb12b8161d1fcf247eae173e495b0a2d437afb363045a2d7c371032f058977cb4b50925ce3d6d9cd491593381161e60afc772af4855524573e0c226bc7187242ba53a16b2f1e0c808da3b598f7bc3776d43d503e8c34b670b1c75b71710a6732ecbf98397df4afdef775d8067aacb528ca85a37fa0eebe62b34406967b66fe6c9eac1bf713b306deb7c8ebfe632bd0d2ea81453d0b2b4d571cc628893497a9ce19188b15f2adf1829a77cfa8d7b1d3c2a37d66ad994f3dae113923530c1cfa9e3c08dabd1c06e15ffbc4e6f48e5925969fc73f20a3bd5c9536bfc4036ac1", 0xf6, 0x1}, {&(0x7f0000000340)="ebbb702e201c19a7b6ebc3481a0752569220c35e8bdd36cb49abf0f2060fb1c8aa787bd6a3dd74b7855ed60561e5c873a9b94c3e27e6da2f4e9d7983ced94a30499b1def8a40151d9d03fe7cb522fb91c3efacdb2910b23ccca3d34d2b0803d3672c8ad77ed70b19bb92ec890f72c2d3abe171aacc254376dc0e31462e06db78bf34c28d8556f3e748baa3bdd5bb68af7b28cc009c46ab353742fefab221185ccbfcadd9ded58897f86035b2c9d79311bcf687e5454bcb5d3c5f8b64368eebb48b4aab5bfff0a5ce8800a7e2aca3526802853dad66d4df9778daadb2b949932d44ae9f81ff8a826838516c4741ae11", 0xef, 0x10000}, {&(0x7f0000000140)="e826981bc7700461ffdd4cc3975fa16d5e3d0ef3dfb44a016b845e30f87fc42c25fa8a527c1ad1285b76ec85b0643f553e62", 0x32, 0x9}, {&(0x7f0000000180)='f', 0x1, 0x6}, {&(0x7f0000000440)="c96c38d77c10eebcf9355f531f68046a03d4af8d9a32ceb85c33e8c2911cc8d32797c957d9868e40b90514932664f05bd07175a87e49b3f29bad4f21daf5", 0x3e, 0x2}, {&(0x7f0000000480)="8fe2a3cf6020c10b6e9f810952ac426437201a96f73491b45b7c5f1306f350319e3f894972e1", 0x26, 0x80000000}, {&(0x7f00000004c0)="a7a66e80223bb9fb4a9da0093b1a88543406b21e3d832a9ade438894b233c9b4751a1f6a", 0x24, 0x5}], 0x10048, &(0x7f00000005c0)={[{@acl='acl'}, {@thread_pool={'thread_pool', 0x3d, 0x7}}, {@noflushoncommit='noflushoncommit'}, {@nodatasum='nodatasum'}, {@inode_cache='inode_cache'}, {@ssd_spread='ssd_spread'}, {@notreelog='notreelog'}, {@fragment_metadata='fragment=metadata'}, {@check_int_data='check_int_data'}, {@discard='discard'}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0x8000, 0x0) r1 = syz_open_dev$media(&(0x7f0000000780)='/dev/media#\x00', 0x0, 0x245201) renameat2(r0, &(0x7f0000000740)='./file0\x00', r1, 0x0, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, &(0x7f00000006c0)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4b3b, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000680)={0xcc, 0x1, 0x7f}) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="a0dc69f4", @ANYRES16, @ANYBLOB="b100001200000000000029000000"], 0x3}, 0x1, 0x0, 0x0, 0x24000095}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 560.438559][T14493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 560.446515][T14493] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xb3, "c1898ecc073213c2b15f2636ae7930b7ef6d933eded4de2154566cbd141c9ad0fb16912fa84998393c8ba083af5cff8c644c0bae2d05baae1ae37adbe7faee59cf7e1de0aadf0341463c7f47645af8305661c6eb258fccd14f0d739bea6724c15931be05b80ee5d1d598a7d63ec2ca41d60e225feedb276e2614d30ffbd838ad47059023ce5ccae31584b45fa348402875b993d137365ec603d1b3f96eb7d89a921003899f72342cf958b07d92f40aa2352174"}, &(0x7f0000000180)=0xbb) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x5}, 0x8) removexattr(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)=@random={'btrfs.', '-,ppp0ppp0ppp1em1\x00'}) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) iopl(0x62) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'vfat\x00'}, &(0x7f0000000400)='eth1&em1/%&+%vboxnet1em0nodevcgroupeth1GPL\x00', 0x2b, 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) 05:25:36 executing program 0 (fault-call:3 fault-nth:23): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:36 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2c2000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000001c0)={0xff, {{0xa, 0x4e23, 0x800, @dev={0xfe, 0x80, [], 0xe}, 0x8}}}, 0x88) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r3, 0x4b3b, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r5 = dup2(r3, r4) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000180)={@remote}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r7}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f00000002c0)={@mcast1, 0x13, r7}) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2140, 0x0) write$UHID_CREATE2(r8, &(0x7f0000000440)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000001000000000000000000000000000000000000000000000000000000005447948be2f41564e4d3e9621e000000000000000000000000000000000000000000000000004200020002000000008000000dfe02000000000004323b0b81afea179baf57febd5652b1a8e069b395e29ddbb0ab449c41dbe0964c68e7b8743712673a954efdd6a680081c1791f96981a09618bed300f25b604a6878"], 0x15a) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r9 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r9, &(0x7f0000000d00)=""/232, 0xe8) bind$pptp(r9, &(0x7f0000000040)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0xfc, 0x0}}}, 0x3) r10 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r10, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r10, 0x5418, &(0x7f0000000280)=0x1a0) sendmsg$nl_generic(r8, 0x0, 0x8000) accept4$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@remote, @null, @bcast, @default, @rose, @bcast, @rose, @rose]}, &(0x7f0000000100)=0x48, 0xc00) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 560.698229][ T27] audit: type=1804 audit(1577165136.658:84): pid=14520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir135911329/syzkaller.DX6JY5/128/file0" dev="sda1" ino=17154 res=1 [ 560.854492][T14537] FAULT_INJECTION: forcing a failure. [ 560.854492][T14537] name failslab, interval 1, probability 0, space 0, times 0 [ 560.885054][T14537] CPU: 1 PID: 14537 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 560.893781][T14537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.903845][T14537] Call Trace: [ 560.907156][T14537] dump_stack+0x197/0x210 [ 560.911545][T14537] should_fail.cold+0xa/0x15 [ 560.916169][T14537] ? fault_create_debugfs_attr+0x180/0x180 [ 560.922001][T14537] ? sctp_add_bind_addr+0x9f/0x3a0 [ 560.927138][T14537] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 560.932709][T14537] __should_failslab+0x121/0x190 [ 560.937671][T14537] should_failslab+0x9/0x14 [ 560.942190][T14537] kmem_cache_alloc_trace+0x4b/0x790 [ 560.947485][T14537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.953796][T14537] ? __ipv6_addr_type+0x219/0x32d [ 560.958841][T14537] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 560.964737][T14537] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 560.970452][T14537] sctp_add_bind_addr+0x9f/0x3a0 [ 560.975407][T14537] sctp_copy_local_addr_list+0x385/0x530 [ 560.981046][T14537] ? sctp_defaults_init+0xcb0/0xcb0 [ 560.986293][T14537] ? _get_random_bytes+0x1b2/0x430 [ 560.991511][T14537] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 560.997446][T14537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.003688][T14537] sctp_copy_one_addr+0x5f/0x170 [ 561.008613][T14537] ? sctp_copy_one_addr+0x5f/0x170 [ 561.013718][T14537] sctp_bind_addr_copy+0xfc/0x2c8 [ 561.018733][T14537] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 561.024956][T14537] sctp_connect_new_asoc+0x178/0x5a0 [ 561.030235][T14537] ? security_sctp_bind_connect+0x93/0xc0 [ 561.036436][T14537] sctp_sendmsg+0x13a0/0x1f10 [ 561.041125][T14537] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 561.047092][T14537] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 561.052971][T14537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.059203][T14537] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 561.065704][T14537] ? tomoyo_socket_bind_permission+0x360/0x360 [ 561.071860][T14537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.078091][T14537] inet_sendmsg+0x9e/0xe0 [ 561.082405][T14537] ? inet_send_prepare+0x4e0/0x4e0 [ 561.087496][T14537] sock_sendmsg+0xd7/0x130 [ 561.091913][T14537] ____sys_sendmsg+0x358/0x880 [ 561.096664][T14537] ? kernel_sendmsg+0x50/0x50 [ 561.101334][T14537] ? __fget+0x35d/0x550 [ 561.105500][T14537] ? find_held_lock+0x35/0x130 [ 561.110261][T14537] ___sys_sendmsg+0x100/0x170 [ 561.114923][T14537] ? sendmsg_copy_msghdr+0x70/0x70 [ 561.120011][T14537] ? __kasan_check_read+0x11/0x20 [ 561.125030][T14537] ? __fget+0x37f/0x550 [ 561.129168][T14537] ? ksys_dup3+0x3e0/0x3e0 [ 561.133562][T14537] ? find_held_lock+0x35/0x130 [ 561.138317][T14537] ? get_pid_task+0x11d/0x210 [ 561.142973][T14537] ? __fget_light+0x1a9/0x230 [ 561.147629][T14537] ? __fdget+0x1b/0x20 [ 561.151680][T14537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.157964][T14537] ? sockfd_lookup_light+0xcb/0x180 [ 561.163255][T14537] __sys_sendmmsg+0x1bf/0x4d0 [ 561.167942][T14537] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 561.172967][T14537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.179194][T14537] ? fput_many+0x12c/0x1a0 [ 561.183949][T14537] ? fput+0x1b/0x20 [ 561.187777][T14537] ? ksys_write+0x1cf/0x290 [ 561.192279][T14537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.197718][T14537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.203155][T14537] ? do_syscall_64+0x26/0x790 [ 561.207835][T14537] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.213880][T14537] ? do_syscall_64+0x26/0x790 [ 561.218543][T14537] __x64_sys_sendmmsg+0x9d/0x100 [ 561.223465][T14537] do_syscall_64+0xfa/0x790 [ 561.227951][T14537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.233839][T14537] RIP: 0033:0x45a919 [ 561.237735][T14537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.257324][T14537] RSP: 002b:00007fba54602c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 561.265805][T14537] RAX: ffffffffffffffda RBX: 00007fba54602c90 RCX: 000000000045a919 [ 561.273789][T14537] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 561.281753][T14537] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 561.289710][T14537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546036d4 [ 561.297667][T14537] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:38 executing program 1: socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r2, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f0000000180)={0x9e0000, 0x8, 0x81a2, r5, 0x0, &(0x7f0000000140)={0x9c0001, 0x80, [], @ptr=0x5}}) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r8, 0x10, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4060069}, 0x4046) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, r8, 0x100, 0x70bd25, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x880) wait4(0x0, 0x0, 0x0, 0x0) 05:25:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x8000, 0x3) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:38 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:38 executing program 0 (fault-call:3 fault-nth:24): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:38 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x2a) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 563.019139][T14556] IPVS: Unknown mcast interface: syzkaller1 [ 563.033219][T14556] IPVS: Unknown mcast interface: syzkaller1 [ 563.057324][T14553] FAULT_INJECTION: forcing a failure. 05:25:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_netdev_private(r2, 0x89f9, &(0x7f0000000240)="f6fc37b2cc6e941c6d0fb10a9e2e0313742c18dc19b61363cb8409c631190cf7d94a5179b594f2e9b8deeb847a7ce3b3eb2c2037a754859810ede5394705151a33a5c52a779eb611b060c14d754f4ba036005843da02a828b8ed7ed2e9dd27a5b5a017bc4db5d27ba8f09531016000ed59bae9d53c809bebdb8ffea0c25d934a3efe95b130315a7d276a872bad737fc04132353c7e13bf8686c65651f54643df9a686105b1a3ad642a938b09e3cbfe71ab2464413145f59b00f333bc449b6721b1492ec8166191e256d47433") r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r5, 0x531, 0x0, 0x25dfdbfd, {0x9}}, 0x14}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 563.057324][T14553] name failslab, interval 1, probability 0, space 0, times 0 [ 563.121882][T14553] CPU: 1 PID: 14553 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 563.130694][T14553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.140763][T14553] Call Trace: [ 563.144077][T14553] dump_stack+0x197/0x210 [ 563.148437][T14553] should_fail.cold+0xa/0x15 [ 563.153055][T14553] ? fault_create_debugfs_attr+0x180/0x180 [ 563.158881][T14553] ? sctp_add_bind_addr+0x9f/0x3a0 [ 563.164308][T14553] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 563.169880][T14553] __should_failslab+0x121/0x190 [ 563.174840][T14553] should_failslab+0x9/0x14 [ 563.179359][T14553] kmem_cache_alloc_trace+0x4b/0x790 [ 563.184667][T14553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.190927][T14553] ? __ipv6_addr_type+0x219/0x32d [ 563.196005][T14553] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 563.201956][T14553] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 563.208654][T14553] sctp_add_bind_addr+0x9f/0x3a0 [ 563.213614][T14553] sctp_copy_local_addr_list+0x385/0x530 [ 563.219265][T14553] ? sctp_defaults_init+0xcb0/0xcb0 [ 563.224493][T14553] ? _get_random_bytes+0x1b2/0x430 [ 563.229623][T14553] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 563.235542][T14553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.241805][T14553] sctp_copy_one_addr+0x5f/0x170 [ 563.246754][T14553] ? sctp_copy_one_addr+0x5f/0x170 [ 563.251898][T14553] sctp_bind_addr_copy+0xfc/0x2c8 [ 563.251922][T14553] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 563.251942][T14553] sctp_connect_new_asoc+0x178/0x5a0 [ 563.251959][T14553] ? security_sctp_bind_connect+0x93/0xc0 [ 563.251980][T14553] sctp_sendmsg+0x13a0/0x1f10 [ 563.252007][T14553] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 563.252024][T14553] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 563.252039][T14553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.252054][T14553] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 563.252073][T14553] ? tomoyo_socket_bind_permission+0x360/0x360 [ 563.252104][T14553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.316137][T14553] inet_sendmsg+0x9e/0xe0 05:25:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:39 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 563.320493][T14553] ? inet_send_prepare+0x4e0/0x4e0 [ 563.325630][T14553] sock_sendmsg+0xd7/0x130 [ 563.330073][T14553] ____sys_sendmsg+0x358/0x880 [ 563.334861][T14553] ? kernel_sendmsg+0x50/0x50 [ 563.339561][T14553] ? __fget+0x35d/0x550 [ 563.343733][T14553] ? find_held_lock+0x35/0x130 [ 563.348530][T14553] ___sys_sendmsg+0x100/0x170 [ 563.353322][T14553] ? sendmsg_copy_msghdr+0x70/0x70 [ 563.358459][T14553] ? __kasan_check_read+0x11/0x20 [ 563.363506][T14553] ? __fget+0x37f/0x550 [ 563.367690][T14553] ? ksys_dup3+0x3e0/0x3e0 [ 563.372127][T14553] ? find_held_lock+0x35/0x130 [ 563.376912][T14553] ? get_pid_task+0x11d/0x210 [ 563.381616][T14553] ? __fget_light+0x1a9/0x230 [ 563.386310][T14553] ? __fdget+0x1b/0x20 [ 563.390430][T14553] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.396701][T14553] ? sockfd_lookup_light+0xcb/0x180 [ 563.401923][T14553] __sys_sendmmsg+0x1bf/0x4d0 [ 563.406633][T14553] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 563.412478][T14553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.418733][T14553] ? fput_many+0x12c/0x1a0 [ 563.423167][T14553] ? fput+0x1b/0x20 [ 563.426992][T14553] ? ksys_write+0x1cf/0x290 [ 563.431519][T14553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 563.436999][T14553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 563.442478][T14553] ? do_syscall_64+0x26/0x790 [ 563.447176][T14553] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.453266][T14553] ? do_syscall_64+0x26/0x790 [ 563.457967][T14553] __x64_sys_sendmmsg+0x9d/0x100 [ 563.462929][T14553] do_syscall_64+0xfa/0x790 [ 563.467460][T14553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.473367][T14553] RIP: 0033:0x45a919 [ 563.477273][T14553] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 563.496913][T14553] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 563.505444][T14553] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 563.513437][T14553] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:39 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x7) setuid(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getpeername$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10) ioctl$GIO_FONT(r0, 0x5608, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000000)={0x0, 0x7fffffff, 0xcaa, {0xfff, 0x10001}, 0x5, 0x4}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r5, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 563.521430][T14553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 563.529425][T14553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 563.537417][T14553] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 563.546157][ T27] audit: type=1804 audit(1577165139.088:85): pid=14552 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir135911329/syzkaller.DX6JY5/129/file0" dev="sda1" ino=17553 res=1 05:25:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$ax25_int(r3, 0x101, 0x8, &(0x7f0000000000)=0x3, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c040000", @ANYRES16=r5, @ANYBLOB="310500000000000000000900d83cd38303001400020073797a6b616c6c65723100000000000008000100000000000800030000000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000040)={0x81, 0x0, 0x30003, 0x8000}) [ 563.622875][T14590] IPVS: Unknown mcast interface: syzkaller1 [ 563.639178][T14590] IPVS: Unknown mcast interface: syzkaller1 05:25:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) socket$vsock_stream(0x28, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) ioctl$VHOST_SET_LOG_BASE(r5, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000140)) wait4(0x0, 0x0, 0x0, 0x0) 05:25:41 executing program 0 (fault-call:3 fault-nth:25): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:41 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x1, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f00000002c0)=""/4096) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000040)={0x3d, "fdbcc92077ca72ae3cd9b7842ee64cb73c4783deb89d7b10b82053f0887ac7dba42d6b368e315bc2fb2774277c1d1e15c17e8345f62806136de377d3d773a38634102772aa88d9f295a8029692829771c6725a9b581859751104e587eeed35c18026a191237248cf9ef8b71f43144fae051ef1488eca7feb7f887a9889bf7d3b"}) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='*\xbf\xce}\xe8', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 566.077113][T14616] FAULT_INJECTION: forcing a failure. [ 566.077113][T14616] name failslab, interval 1, probability 0, space 0, times 0 [ 566.110651][T14618] IPVS: Unknown mcast interface: syzkaller1 [ 566.146667][T14616] CPU: 0 PID: 14616 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 566.155392][T14616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.165545][T14616] Call Trace: [ 566.168853][T14616] dump_stack+0x197/0x210 [ 566.173212][T14616] should_fail.cold+0xa/0x15 [ 566.177829][T14616] ? fault_create_debugfs_attr+0x180/0x180 [ 566.183668][T14616] ? sctp_add_bind_addr+0x9f/0x3a0 [ 566.183947][T14629] IPVS: Unknown mcast interface: syzkaller1 [ 566.188793][T14616] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 566.188818][T14616] __should_failslab+0x121/0x190 [ 566.188844][T14616] should_failslab+0x9/0x14 [ 566.209738][T14616] kmem_cache_alloc_trace+0x4b/0x790 [ 566.215049][T14616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.221310][T14616] ? __ipv6_addr_type+0x219/0x32d [ 566.226355][T14616] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 566.232263][T14616] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.238013][T14616] sctp_add_bind_addr+0x9f/0x3a0 [ 566.243005][T14616] sctp_copy_local_addr_list+0x385/0x530 [ 566.248780][T14616] ? sctp_defaults_init+0xcb0/0xcb0 [ 566.254002][T14616] ? _get_random_bytes+0x1b2/0x430 [ 566.259130][T14616] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 566.265046][T14616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.271311][T14616] sctp_copy_one_addr+0x5f/0x170 [ 566.276309][T14616] ? sctp_copy_one_addr+0x5f/0x170 [ 566.281473][T14616] sctp_bind_addr_copy+0xfc/0x2c8 [ 566.286525][T14616] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 566.292796][T14616] sctp_connect_new_asoc+0x178/0x5a0 [ 566.298103][T14616] ? security_sctp_bind_connect+0x93/0xc0 [ 566.303846][T14616] sctp_sendmsg+0x13a0/0x1f10 [ 566.308551][T14616] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 566.314458][T14616] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 566.320367][T14616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.326627][T14616] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 566.333071][T14616] ? tomoyo_socket_bind_permission+0x360/0x360 [ 566.339274][T14616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.345538][T14616] inet_sendmsg+0x9e/0xe0 [ 566.349885][T14616] ? inet_send_prepare+0x4e0/0x4e0 [ 566.355010][T14616] sock_sendmsg+0xd7/0x130 [ 566.359452][T14616] ____sys_sendmsg+0x358/0x880 [ 566.364394][T14616] ? kernel_sendmsg+0x50/0x50 [ 566.369216][T14616] ? __fget+0x35d/0x550 [ 566.373399][T14616] ? find_held_lock+0x35/0x130 [ 566.378276][T14616] ___sys_sendmsg+0x100/0x170 [ 566.382976][T14616] ? sendmsg_copy_msghdr+0x70/0x70 [ 566.388105][T14616] ? __kasan_check_read+0x11/0x20 [ 566.393150][T14616] ? __fget+0x37f/0x550 [ 566.397327][T14616] ? ksys_dup3+0x3e0/0x3e0 [ 566.401757][T14616] ? find_held_lock+0x35/0x130 [ 566.406537][T14616] ? get_pid_task+0x11d/0x210 [ 566.411237][T14616] ? __fget_light+0x1a9/0x230 [ 566.416018][T14616] ? __fdget+0x1b/0x20 [ 566.420103][T14616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.426364][T14616] ? sockfd_lookup_light+0xcb/0x180 [ 566.431587][T14616] __sys_sendmmsg+0x1bf/0x4d0 [ 566.436292][T14616] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 566.441354][T14616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.447613][T14616] ? fput_many+0x12c/0x1a0 [ 566.452046][T14616] ? fput+0x1b/0x20 [ 566.455876][T14616] ? ksys_write+0x1cf/0x290 [ 566.460403][T14616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 566.465882][T14616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 566.471353][T14616] ? do_syscall_64+0x26/0x790 [ 566.476667][T14616] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.482755][T14616] ? do_syscall_64+0x26/0x790 [ 566.487482][T14616] __x64_sys_sendmmsg+0x9d/0x100 [ 566.492440][T14616] do_syscall_64+0xfa/0x790 [ 566.496963][T14616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.504228][T14616] RIP: 0033:0x45a919 [ 566.508139][T14616] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 566.527755][T14616] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 566.536207][T14616] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 05:25:42 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x55}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, &(0x7f0000000040)={0x3}) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r2, 0x8}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:42 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:42 executing program 0 (fault-call:3 fault-nth:26): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 566.544199][T14616] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 566.552232][T14616] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 566.560215][T14616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 566.568202][T14616] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 566.851276][T14644] FAULT_INJECTION: forcing a failure. [ 566.851276][T14644] name failslab, interval 1, probability 0, space 0, times 0 [ 566.871464][T14644] CPU: 1 PID: 14644 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 566.880181][T14644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.890241][T14644] Call Trace: [ 566.893549][T14644] dump_stack+0x197/0x210 [ 566.897912][T14644] should_fail.cold+0xa/0x15 [ 566.902523][T14644] ? fault_create_debugfs_attr+0x180/0x180 [ 566.908348][T14644] ? sctp_add_bind_addr+0x9f/0x3a0 [ 566.913476][T14644] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 566.919045][T14644] __should_failslab+0x121/0x190 [ 566.924004][T14644] should_failslab+0x9/0x14 [ 566.928522][T14644] kmem_cache_alloc_trace+0x4b/0x790 [ 566.933836][T14644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.940085][T14644] ? __ipv6_addr_type+0x219/0x32d [ 566.945119][T14644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 566.951017][T14644] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 566.956756][T14644] sctp_add_bind_addr+0x9f/0x3a0 [ 566.961724][T14644] sctp_copy_local_addr_list+0x385/0x530 [ 566.967374][T14644] ? sctp_defaults_init+0xcb0/0xcb0 [ 566.972590][T14644] ? _get_random_bytes+0x1b2/0x430 [ 566.977704][T14644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 566.983604][T14644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.989959][T14644] sctp_copy_one_addr+0x5f/0x170 [ 566.994894][T14644] ? sctp_copy_one_addr+0x5f/0x170 [ 566.999994][T14644] sctp_bind_addr_copy+0xfc/0x2c8 [ 567.005038][T14644] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 567.011293][T14644] sctp_connect_new_asoc+0x178/0x5a0 [ 567.016590][T14644] ? security_sctp_bind_connect+0x93/0xc0 [ 567.022329][T14644] sctp_sendmsg+0x13a0/0x1f10 [ 567.027023][T14644] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 567.032926][T14644] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 567.039801][T14644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.046054][T14644] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 567.052489][T14644] ? tomoyo_socket_bind_permission+0x360/0x360 [ 567.058686][T14644] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.064942][T14644] inet_sendmsg+0x9e/0xe0 [ 567.069286][T14644] ? inet_send_prepare+0x4e0/0x4e0 [ 567.074407][T14644] sock_sendmsg+0xd7/0x130 [ 567.078834][T14644] ____sys_sendmsg+0x358/0x880 [ 567.083619][T14644] ? kernel_sendmsg+0x50/0x50 [ 567.088924][T14644] ? __fget+0x35d/0x550 [ 567.093088][T14644] ? find_held_lock+0x35/0x130 [ 567.097870][T14644] ___sys_sendmsg+0x100/0x170 [ 567.102565][T14644] ? sendmsg_copy_msghdr+0x70/0x70 [ 567.107688][T14644] ? __kasan_check_read+0x11/0x20 [ 567.112726][T14644] ? __fget+0x37f/0x550 [ 567.116896][T14644] ? ksys_dup3+0x3e0/0x3e0 [ 567.121319][T14644] ? find_held_lock+0x35/0x130 [ 567.126090][T14644] ? get_pid_task+0x11d/0x210 [ 567.130779][T14644] ? __fget_light+0x1a9/0x230 [ 567.135464][T14644] ? __fdget+0x1b/0x20 [ 567.139543][T14644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.145792][T14644] ? sockfd_lookup_light+0xcb/0x180 [ 567.151003][T14644] __sys_sendmmsg+0x1bf/0x4d0 [ 567.155697][T14644] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 567.160751][T14644] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.167135][T14644] ? fput_many+0x12c/0x1a0 [ 567.171566][T14644] ? fput+0x1b/0x20 [ 567.175391][T14644] ? ksys_write+0x1cf/0x290 [ 567.180177][T14644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.185645][T14644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.191119][T14644] ? do_syscall_64+0x26/0x790 [ 567.195806][T14644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.201884][T14644] ? do_syscall_64+0x26/0x790 [ 567.206575][T14644] __x64_sys_sendmmsg+0x9d/0x100 [ 567.211528][T14644] do_syscall_64+0xfa/0x790 [ 567.216045][T14644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.221939][T14644] RIP: 0033:0x45a919 [ 567.225839][T14644] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:25:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) [ 567.245452][T14644] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 567.253881][T14644] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 567.261893][T14644] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 567.269882][T14644] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 567.277916][T14644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 567.285902][T14644] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:43 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x1ff, 0x0, 0x81, 0x5, 0x2}}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:43 executing program 0 (fault-call:3 fault-nth:27): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 567.694841][T14659] FAULT_INJECTION: forcing a failure. [ 567.694841][T14659] name failslab, interval 1, probability 0, space 0, times 0 [ 567.723182][T14659] CPU: 0 PID: 14659 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 567.731898][T14659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.741971][T14659] Call Trace: 05:25:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) r2 = dup2(r0, r1) open_by_handle_at(r2, &(0x7f0000000000)={0xfffffffffffffee8, 0x1, "09f6d5f8ca242d51"}, 0x101200) [ 567.745280][T14659] dump_stack+0x197/0x210 [ 567.749633][T14659] should_fail.cold+0xa/0x15 [ 567.754248][T14659] ? fault_create_debugfs_attr+0x180/0x180 [ 567.760072][T14659] ? sctp_add_bind_addr+0x9f/0x3a0 [ 567.765211][T14659] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 567.770785][T14659] __should_failslab+0x121/0x190 [ 567.775748][T14659] should_failslab+0x9/0x14 [ 567.780261][T14659] kmem_cache_alloc_trace+0x4b/0x790 [ 567.785564][T14659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.791812][T14659] ? __ipv6_addr_type+0x219/0x32d [ 567.796846][T14659] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 567.802754][T14659] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 567.808491][T14659] sctp_add_bind_addr+0x9f/0x3a0 [ 567.813450][T14659] sctp_copy_local_addr_list+0x385/0x530 [ 567.819096][T14659] ? sctp_defaults_init+0xcb0/0xcb0 [ 567.824311][T14659] ? _get_random_bytes+0x1b2/0x430 [ 567.829436][T14659] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 567.835346][T14659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.841608][T14659] sctp_copy_one_addr+0x5f/0x170 [ 567.846655][T14659] ? sctp_copy_one_addr+0x5f/0x170 [ 567.851787][T14659] sctp_bind_addr_copy+0xfc/0x2c8 [ 567.856833][T14659] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 567.863097][T14659] sctp_connect_new_asoc+0x178/0x5a0 [ 567.868426][T14659] ? security_sctp_bind_connect+0x93/0xc0 [ 567.874172][T14659] sctp_sendmsg+0x13a0/0x1f10 [ 567.878884][T14659] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 567.884790][T14659] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 567.890701][T14659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.896956][T14659] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 567.903410][T14659] ? tomoyo_socket_bind_permission+0x360/0x360 [ 567.909594][T14659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.915855][T14659] inet_sendmsg+0x9e/0xe0 [ 567.920212][T14659] ? inet_send_prepare+0x4e0/0x4e0 [ 567.925339][T14659] sock_sendmsg+0xd7/0x130 [ 567.929773][T14659] ____sys_sendmsg+0x358/0x880 [ 567.934554][T14659] ? kernel_sendmsg+0x50/0x50 [ 567.939779][T14659] ? __fget+0x35d/0x550 [ 567.939797][T14659] ? find_held_lock+0x35/0x130 [ 567.939825][T14659] ___sys_sendmsg+0x100/0x170 [ 567.939847][T14659] ? sendmsg_copy_msghdr+0x70/0x70 [ 567.948850][T14659] ? __kasan_check_read+0x11/0x20 [ 567.948871][T14659] ? __fget+0x37f/0x550 [ 567.948893][T14659] ? ksys_dup3+0x3e0/0x3e0 [ 567.948913][T14659] ? find_held_lock+0x35/0x130 [ 567.977768][T14659] ? get_pid_task+0x11d/0x210 [ 567.977792][T14659] ? __fget_light+0x1a9/0x230 [ 567.977809][T14659] ? __fdget+0x1b/0x20 [ 567.977828][T14659] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.977845][T14659] ? sockfd_lookup_light+0xcb/0x180 [ 567.977866][T14659] __sys_sendmmsg+0x1bf/0x4d0 [ 567.977890][T14659] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 567.977929][T14659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.977945][T14659] ? fput_many+0x12c/0x1a0 [ 567.977962][T14659] ? fput+0x1b/0x20 [ 567.977978][T14659] ? ksys_write+0x1cf/0x290 [ 567.977999][T14659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.978016][T14659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.978032][T14659] ? do_syscall_64+0x26/0x790 [ 567.978050][T14659] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.978065][T14659] ? do_syscall_64+0x26/0x790 [ 567.978088][T14659] __x64_sys_sendmmsg+0x9d/0x100 [ 567.978107][T14659] do_syscall_64+0xfa/0x790 [ 567.978128][T14659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.978140][T14659] RIP: 0033:0x45a919 [ 567.978156][T14659] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.978165][T14659] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 567.978178][T14659] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 567.978196][T14659] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 567.978205][T14659] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 567.978215][T14659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 567.978224][T14659] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:45 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) setuid(r4) ioctl$GIO_FONT(r0, 0x5608, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2081, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) fsetxattr$security_capability(r5, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x1ff, 0x200}, {0x8, 0x2}], r7}, 0x18, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r8, 0x4b3b, 0x0) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f00000000c0)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:45 executing program 0 (fault-call:3 fault-nth:28): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x100) [ 569.298688][T14678] FAULT_INJECTION: forcing a failure. [ 569.298688][T14678] name failslab, interval 1, probability 0, space 0, times 0 [ 569.331573][T14678] CPU: 0 PID: 14678 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 569.340335][T14678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.350421][T14678] Call Trace: [ 569.353794][T14678] dump_stack+0x197/0x210 [ 569.358177][T14678] should_fail.cold+0xa/0x15 [ 569.362789][T14678] ? fault_create_debugfs_attr+0x180/0x180 [ 569.368611][T14678] ? sctp_add_bind_addr+0x9f/0x3a0 [ 569.373737][T14678] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 569.379826][T14678] __should_failslab+0x121/0x190 [ 569.384788][T14678] should_failslab+0x9/0x14 [ 569.389309][T14678] kmem_cache_alloc_trace+0x4b/0x790 [ 569.394614][T14678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.400881][T14678] ? __ipv6_addr_type+0x219/0x32d [ 569.405919][T14678] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 569.411822][T14678] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 569.417556][T14678] sctp_add_bind_addr+0x9f/0x3a0 [ 569.422519][T14678] sctp_copy_local_addr_list+0x385/0x530 [ 569.428168][T14678] ? sctp_defaults_init+0xcb0/0xcb0 [ 569.433380][T14678] ? _get_random_bytes+0x1b2/0x430 [ 569.438503][T14678] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 569.444411][T14678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.450670][T14678] sctp_copy_one_addr+0x5f/0x170 [ 569.455622][T14678] ? sctp_copy_one_addr+0x5f/0x170 [ 569.460746][T14678] sctp_bind_addr_copy+0xfc/0x2c8 [ 569.465793][T14678] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 569.472054][T14678] sctp_connect_new_asoc+0x178/0x5a0 [ 569.477356][T14678] ? security_sctp_bind_connect+0x93/0xc0 [ 569.483098][T14678] sctp_sendmsg+0x13a0/0x1f10 [ 569.487805][T14678] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 569.493714][T14678] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 569.499628][T14678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.505890][T14678] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 569.512323][T14678] ? tomoyo_socket_bind_permission+0x360/0x360 [ 569.518514][T14678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.524780][T14678] inet_sendmsg+0x9e/0xe0 [ 569.529128][T14678] ? inet_send_prepare+0x4e0/0x4e0 [ 569.534262][T14678] sock_sendmsg+0xd7/0x130 [ 569.538697][T14678] ____sys_sendmsg+0x358/0x880 [ 569.543486][T14678] ? kernel_sendmsg+0x50/0x50 [ 569.548174][T14678] ? __fget+0x35d/0x550 [ 569.552351][T14678] ? find_held_lock+0x35/0x130 [ 569.557146][T14678] ___sys_sendmsg+0x100/0x170 [ 569.561844][T14678] ? sendmsg_copy_msghdr+0x70/0x70 [ 569.566975][T14678] ? __kasan_check_read+0x11/0x20 [ 569.572017][T14678] ? __fget+0x37f/0x550 [ 569.576197][T14678] ? ksys_dup3+0x3e0/0x3e0 [ 569.580627][T14678] ? find_held_lock+0x35/0x130 [ 569.585410][T14678] ? get_pid_task+0x11d/0x210 [ 569.590135][T14678] ? __fget_light+0x1a9/0x230 [ 569.594826][T14678] ? __fdget+0x1b/0x20 [ 569.598910][T14678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.605166][T14678] ? sockfd_lookup_light+0xcb/0x180 [ 569.610382][T14678] __sys_sendmmsg+0x1bf/0x4d0 [ 569.615081][T14678] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 569.620145][T14678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.626400][T14678] ? fput_many+0x12c/0x1a0 [ 569.630842][T14678] ? fput+0x1b/0x20 [ 569.634665][T14678] ? ksys_write+0x1cf/0x290 [ 569.639187][T14678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.644688][T14678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.650164][T14678] ? do_syscall_64+0x26/0x790 [ 569.654853][T14678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.660929][T14678] ? do_syscall_64+0x26/0x790 [ 569.665624][T14678] __x64_sys_sendmmsg+0x9d/0x100 [ 569.670583][T14678] do_syscall_64+0xfa/0x790 [ 569.675107][T14678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.681005][T14678] RIP: 0033:0x45a919 [ 569.684910][T14678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.704522][T14678] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 569.713032][T14678] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 569.721018][T14678] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 569.729006][T14678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.736994][T14678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:25:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x40) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="09000f9b1f6c000000d2a7f2a95dad5a80b292c60fd927152ad7f6a8be16d61a0a8e526d4d1b2f375a7028f4091b6681952612a6"], 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000100), 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) 05:25:45 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x62, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1805, 0x0, 0x0, 0x7, 0x8}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, &(0x7f0000000000)=0x6) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x6, 0xa, 0x4, 0x40, 0x2, {0x77359400}, {0x4, 0xc, 0x6, 0x4, 0x7, 0x0, "6f842ef8"}, 0x100, 0x4, @userptr=0x400, 0x401, 0x0, r2}) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000180)={0x8c, "2b6afe5274d088da0bfa1c64d1b7cb6d2d05340004173f25dc2e57d8fefad01c86ca7b3ff2f4829affd49473ffb5e875f08adc7ff3e2ee425d662e61c8f0fe414065e96b7be9b8074fb29578a726f046f153fe216b410be9c9fed592e88927a4a52851bfb2da0c5dc60f13ba65cb07ba954e1673440361a584be0da699ecde6a4c22f79b5debbffc95e5d7de"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:45 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 569.745083][T14678] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:45 executing program 0 (fault-call:3 fault-nth:29): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:45 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 570.054083][T14698] FAULT_INJECTION: forcing a failure. [ 570.054083][T14698] name failslab, interval 1, probability 0, space 0, times 0 05:25:46 executing program 5: ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)={0xcf, 0x8, 0x7}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x18357a982566c345, 0x210) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x3, 0x3, 0x3, 0x2}, {0x2, 0x7f, 0xd5, 0x1}, {0x0, 0x0, 0x4, 0x9}]}, 0x10) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) [ 570.140027][T14698] CPU: 0 PID: 14698 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 570.148750][T14698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.158817][T14698] Call Trace: [ 570.162132][T14698] dump_stack+0x197/0x210 [ 570.166577][T14698] should_fail.cold+0xa/0x15 [ 570.171196][T14698] ? fault_create_debugfs_attr+0x180/0x180 [ 570.177030][T14698] ? sctp_add_bind_addr+0x9f/0x3a0 [ 570.182166][T14698] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 570.187741][T14698] __should_failslab+0x121/0x190 [ 570.192793][T14698] should_failslab+0x9/0x14 [ 570.197317][T14698] kmem_cache_alloc_trace+0x4b/0x790 [ 570.202775][T14698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.209036][T14698] ? __ipv6_addr_type+0x219/0x32d [ 570.214709][T14698] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 570.220624][T14698] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 570.226367][T14698] sctp_add_bind_addr+0x9f/0x3a0 [ 570.231330][T14698] sctp_copy_local_addr_list+0x385/0x530 [ 570.237015][T14698] ? sctp_defaults_init+0xcb0/0xcb0 [ 570.242243][T14698] ? _get_random_bytes+0x1b2/0x430 [ 570.247368][T14698] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 570.253276][T14698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.259539][T14698] sctp_copy_one_addr+0x5f/0x170 [ 570.264491][T14698] ? sctp_copy_one_addr+0x5f/0x170 [ 570.269625][T14698] sctp_bind_addr_copy+0xfc/0x2c8 [ 570.274677][T14698] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 570.280939][T14698] sctp_connect_new_asoc+0x178/0x5a0 [ 570.286240][T14698] ? security_sctp_bind_connect+0x93/0xc0 [ 570.291982][T14698] sctp_sendmsg+0x13a0/0x1f10 [ 570.296688][T14698] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 570.302780][T14698] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 570.308699][T14698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.314963][T14698] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 570.321398][T14698] ? tomoyo_socket_bind_permission+0x360/0x360 [ 570.327585][T14698] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.333840][T14698] inet_sendmsg+0x9e/0xe0 [ 570.338184][T14698] ? inet_send_prepare+0x4e0/0x4e0 [ 570.343315][T14698] sock_sendmsg+0xd7/0x130 [ 570.347745][T14698] ____sys_sendmsg+0x358/0x880 [ 570.352525][T14698] ? kernel_sendmsg+0x50/0x50 [ 570.357214][T14698] ? __fget+0x35d/0x550 [ 570.361383][T14698] ? find_held_lock+0x35/0x130 [ 570.366180][T14698] ___sys_sendmsg+0x100/0x170 [ 570.370872][T14698] ? sendmsg_copy_msghdr+0x70/0x70 [ 570.376011][T14698] ? __kasan_check_read+0x11/0x20 [ 570.381053][T14698] ? __fget+0x37f/0x550 [ 570.385224][T14698] ? ksys_dup3+0x3e0/0x3e0 [ 570.389760][T14698] ? find_held_lock+0x35/0x130 [ 570.394539][T14698] ? get_pid_task+0x11d/0x210 [ 570.399229][T14698] ? __fget_light+0x1a9/0x230 [ 570.404023][T14698] ? __fdget+0x1b/0x20 [ 570.408102][T14698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.414355][T14698] ? sockfd_lookup_light+0xcb/0x180 [ 570.419576][T14698] __sys_sendmmsg+0x1bf/0x4d0 [ 570.424272][T14698] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 570.429357][T14698] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.435624][T14698] ? fput_many+0x12c/0x1a0 [ 570.440058][T14698] ? fput+0x1b/0x20 [ 570.443874][T14698] ? ksys_write+0x1cf/0x290 [ 570.448392][T14698] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.453869][T14698] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.459359][T14698] ? do_syscall_64+0x26/0x790 [ 570.464050][T14698] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.470131][T14698] ? do_syscall_64+0x26/0x790 [ 570.474829][T14698] __x64_sys_sendmmsg+0x9d/0x100 [ 570.479781][T14698] do_syscall_64+0xfa/0x790 [ 570.484300][T14698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.490202][T14698] RIP: 0033:0x45a919 [ 570.494104][T14698] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.513714][T14698] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 570.522137][T14698] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 570.530126][T14698] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:46 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 570.538105][T14698] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.546519][T14698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 570.554511][T14698] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:46 executing program 0 (fault-call:3 fault-nth:30): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 570.775661][T14709] FAULT_INJECTION: forcing a failure. [ 570.775661][T14709] name failslab, interval 1, probability 0, space 0, times 0 [ 570.832397][T14709] CPU: 1 PID: 14709 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 570.841116][T14709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.851355][T14709] Call Trace: [ 570.854664][T14709] dump_stack+0x197/0x210 [ 570.859027][T14709] should_fail.cold+0xa/0x15 [ 570.863641][T14709] ? fault_create_debugfs_attr+0x180/0x180 [ 570.869468][T14709] ? sctp_add_bind_addr+0x9f/0x3a0 [ 570.874601][T14709] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 570.880176][T14709] __should_failslab+0x121/0x190 [ 570.885137][T14709] should_failslab+0x9/0x14 [ 570.889661][T14709] kmem_cache_alloc_trace+0x4b/0x790 [ 570.894961][T14709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.901217][T14709] ? __ipv6_addr_type+0x219/0x32d [ 570.906261][T14709] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 570.912176][T14709] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 570.917926][T14709] sctp_add_bind_addr+0x9f/0x3a0 [ 570.922890][T14709] sctp_copy_local_addr_list+0x385/0x530 [ 570.928542][T14709] ? sctp_defaults_init+0xcb0/0xcb0 [ 570.933761][T14709] ? _get_random_bytes+0x1b2/0x430 [ 570.938899][T14709] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 570.944815][T14709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.951080][T14709] sctp_copy_one_addr+0x5f/0x170 [ 570.956033][T14709] ? sctp_copy_one_addr+0x5f/0x170 [ 570.961165][T14709] sctp_bind_addr_copy+0xfc/0x2c8 [ 570.966210][T14709] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 570.972468][T14709] sctp_connect_new_asoc+0x178/0x5a0 [ 570.977765][T14709] ? security_sctp_bind_connect+0x93/0xc0 [ 570.983515][T14709] sctp_sendmsg+0x13a0/0x1f10 [ 570.988217][T14709] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 570.994123][T14709] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 571.000300][T14709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 571.006556][T14709] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 571.012999][T14709] ? tomoyo_socket_bind_permission+0x360/0x360 [ 571.019192][T14709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 571.025454][T14709] inet_sendmsg+0x9e/0xe0 [ 571.029804][T14709] ? inet_send_prepare+0x4e0/0x4e0 [ 571.034935][T14709] sock_sendmsg+0xd7/0x130 [ 571.039370][T14709] ____sys_sendmsg+0x358/0x880 [ 571.044163][T14709] ? kernel_sendmsg+0x50/0x50 [ 571.048873][T14709] ? __fget+0x35d/0x550 [ 571.053045][T14709] ? find_held_lock+0x35/0x130 [ 571.057841][T14709] ___sys_sendmsg+0x100/0x170 [ 571.062537][T14709] ? sendmsg_copy_msghdr+0x70/0x70 [ 571.067768][T14709] ? __kasan_check_read+0x11/0x20 [ 571.072845][T14709] ? __fget+0x37f/0x550 [ 571.077053][T14709] ? ksys_dup3+0x3e0/0x3e0 [ 571.081510][T14709] ? find_held_lock+0x35/0x130 [ 571.086769][T14709] ? get_pid_task+0x11d/0x210 [ 571.091466][T14709] ? __fget_light+0x1a9/0x230 [ 571.096163][T14709] ? __fdget+0x1b/0x20 [ 571.100248][T14709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 571.106503][T14709] ? sockfd_lookup_light+0xcb/0x180 [ 571.111728][T14709] __sys_sendmmsg+0x1bf/0x4d0 [ 571.116434][T14709] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 571.121492][T14709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 571.127741][T14709] ? fput_many+0x12c/0x1a0 [ 571.132170][T14709] ? fput+0x1b/0x20 [ 571.135990][T14709] ? ksys_write+0x1cf/0x290 [ 571.140510][T14709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.146006][T14709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.151574][T14709] ? do_syscall_64+0x26/0x790 [ 571.156266][T14709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.162346][T14709] ? do_syscall_64+0x26/0x790 [ 571.167044][T14709] __x64_sys_sendmmsg+0x9d/0x100 [ 571.172002][T14709] do_syscall_64+0xfa/0x790 [ 571.176525][T14709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.182424][T14709] RIP: 0033:0x45a919 [ 571.186326][T14709] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 571.205941][T14709] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 571.214376][T14709] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 571.222372][T14709] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 571.230363][T14709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.238359][T14709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 571.246344][T14709] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:48 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000d00)=""/232, 0xe8) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x100) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) acct(&(0x7f0000000000)='./file0\x00') 05:25:48 executing program 0 (fault-call:3 fault-nth:31): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:48 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) fallocate(r0, 0x7, 0xff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xfffffde2) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000000)=0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$FBIOPUTCMAP(r3, 0x4605, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000040)=[0x6, 0x6, 0x0], &(0x7f0000000080)=[0x4], &(0x7f00000000c0)=[0x8, 0x2, 0x8, 0x1, 0x8, 0x3, 0xe515, 0x8], &(0x7f0000000100)=[0x4, 0x8]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 572.386368][T14727] FAULT_INJECTION: forcing a failure. [ 572.386368][T14727] name failslab, interval 1, probability 0, space 0, times 0 [ 572.401711][T14727] CPU: 0 PID: 14727 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 572.410422][T14727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.420484][T14727] Call Trace: [ 572.423793][T14727] dump_stack+0x197/0x210 [ 572.428144][T14727] should_fail.cold+0xa/0x15 [ 572.432756][T14727] ? fault_create_debugfs_attr+0x180/0x180 [ 572.438578][T14727] ? sctp_add_bind_addr+0x9f/0x3a0 [ 572.443698][T14727] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 572.449270][T14727] __should_failslab+0x121/0x190 [ 572.454229][T14727] should_failslab+0x9/0x14 [ 572.458746][T14727] kmem_cache_alloc_trace+0x4b/0x790 [ 572.464044][T14727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.470295][T14727] ? __ipv6_addr_type+0x219/0x32d [ 572.475341][T14727] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 572.481333][T14727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 572.487071][T14727] sctp_add_bind_addr+0x9f/0x3a0 [ 572.492044][T14727] sctp_copy_local_addr_list+0x385/0x530 [ 572.497699][T14727] ? sctp_defaults_init+0xcb0/0xcb0 [ 572.502916][T14727] ? _get_random_bytes+0x1b2/0x430 [ 572.508042][T14727] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 572.513948][T14727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.520206][T14727] sctp_copy_one_addr+0x5f/0x170 [ 572.525161][T14727] ? sctp_copy_one_addr+0x5f/0x170 [ 572.530461][T14727] sctp_bind_addr_copy+0xfc/0x2c8 [ 572.535536][T14727] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 572.541801][T14727] sctp_connect_new_asoc+0x178/0x5a0 [ 572.547106][T14727] ? security_sctp_bind_connect+0x93/0xc0 [ 572.552843][T14727] sctp_sendmsg+0x13a0/0x1f10 [ 572.557548][T14727] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 572.563458][T14727] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 572.569492][T14727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.575759][T14727] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 572.582194][T14727] ? tomoyo_socket_bind_permission+0x360/0x360 [ 572.588381][T14727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 572.594639][T14727] inet_sendmsg+0x9e/0xe0 [ 572.598979][T14727] ? inet_send_prepare+0x4e0/0x4e0 [ 572.604113][T14727] sock_sendmsg+0xd7/0x130 [ 572.608549][T14727] ____sys_sendmsg+0x358/0x880 [ 572.613330][T14727] ? kernel_sendmsg+0x50/0x50 [ 572.618021][T14727] ? __fget+0x35d/0x550 [ 572.622187][T14727] ? find_held_lock+0x35/0x130 [ 572.626978][T14727] ___sys_sendmsg+0x100/0x170 [ 572.631686][T14727] ? sendmsg_copy_msghdr+0x70/0x70 [ 572.636812][T14727] ? __kasan_check_read+0x11/0x20 [ 572.641858][T14727] ? __fget+0x37f/0x550 [ 572.646037][T14727] ? ksys_dup3+0x3e0/0x3e0 [ 572.650473][T14727] ? find_held_lock+0x35/0x130 [ 572.655258][T14727] ? get_pid_task+0x11d/0x210 [ 572.659952][T14727] ? __fget_light+0x1a9/0x230 [ 572.664642][T14727] ? __fdget+0x1b/0x20 [ 572.668735][T14727] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 572.675006][T14727] ? sockfd_lookup_light+0xcb/0x180 [ 572.680225][T14727] __sys_sendmmsg+0x1bf/0x4d0 05:25:48 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x40c840, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 572.684927][T14727] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 572.689990][T14727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 572.696253][T14727] ? fput_many+0x12c/0x1a0 [ 572.700793][T14727] ? fput+0x1b/0x20 [ 572.704610][T14727] ? ksys_write+0x1cf/0x290 [ 572.709134][T14727] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 572.714610][T14727] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 572.720083][T14727] ? do_syscall_64+0x26/0x790 [ 572.724863][T14727] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.730944][T14727] ? do_syscall_64+0x26/0x790 [ 572.735650][T14727] __x64_sys_sendmmsg+0x9d/0x100 [ 572.740602][T14727] do_syscall_64+0xfa/0x790 [ 572.745121][T14727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.751021][T14727] RIP: 0033:0x45a919 [ 572.754926][T14727] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.774540][T14727] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 572.782970][T14727] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 572.791080][T14727] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 572.799095][T14727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.807079][T14727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 572.815098][T14727] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:48 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:48 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f00000002c0)="e813fe02eae5dfc1990c379bc51ad01d1c204030bdcacf42", 0x18) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x20000000000004, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x3ea21ae9297ccae5, 0x0) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000040)={0xa0, 0x6, &(0x7f0000000300)="fa716bb493e5e6098ca9a75887c3b3dc8fc3880236e735daccc7e59056c7b3bdaf36a5054601346836011755a5b85231334a6038ae3d64cf357b2a3d39fa645c5bc3ec8423648dae78916f7300f9a0d1a1762576ac1fea488cf226a9e14d821cdb4ef0bfdbea898d2edb9c65c2121875e80b2977967b98ecff369d5b7b634a5767a8e219726854fc284551ab603c8fc24e878e50a3b97c65674409d87ee4e4c36d2915d918f6a89f38e323655be7c0ef055c8edd37de37b796c6d2fe9c0c1ad41444cf5e617c8404d9bb0217e1c2477ae611c004fc257ad0e53cbead7a42e9f3977be6332abe0db8cf720d1036e4968542eb2b02ce3b9d7e53d5fc71e6f6be999f1b996d5e550540c9ce3048c8cbe857bca058ef7f82a05155e0547a4b8764811dc22a96c545e6c7fb3801485992ee6dca4051f3489fb27a57fcebea58e5c68a973d87b742103d350d016a2b5702dfcec7c6619de57c59c94f33569eb807fd6ea06f7e8d1baadfbb596c809df3f596e12a82f024e214b839552574dcf1a01c3a2b2b465bdc9722cdde0415b711ce3549cf6c797c5af2117b773f49f505e76eabaaef40f62fc99f6361886f84c67b24d9475963b66b51a697e8af7a5ac0c950e87a77157ac53238e8802c01707a87b13792054c2a37d133bd979a56cef9d01a6e4e5d432c6ed2e75faa46243b8f20199d0efc2f8d3733aeb734e89f3544c35ecd4cf5f344ebe239a06838b5be0bf32e595eb9ebb7897f9536fe939e73f0ada51ebe6a7371d33e4d8d374d48286071181ff8ef305141f9b8c7f604a581a70a49c2c9f012d62dd911cc57400577d65e74177a0eaadf882a5e2484d4a88d704517d93f337af582cc85e673f68cdd626be48c312872b4745185ab823efcd765a6b34617cf873626177cef3b6d7b1a9544d14f858b63f4984166574908414fb1762b900dbbf09ce1e7a18a0ce6b34aefa5b81021cf65ed161a112c56873251d14898ff2837193ea0f5dfd57385143c6dd93e38f4a3eeabf65d1f371f1e877cd3c4df19e0751fbf928bce5b02e846b70b889268f6dcaee6e6eb384fa4b41ea31f73e486c723d54884e0d3e69a584efb1c04b36429dad22b22229ad0673b3651ca25c8439e2e174d340e836ff101ab803637278c307e6e6f974e0e33caf5fac36a4a64b09adf225a0f4eb288390414dc663d908cadf5f3e111cb5864a254b1ec6d95f81332147c08348e6b27f3b51d7059589cd47a9822fa78221ddac6c770d864c7ed014f5cbe37fa5b1880e38487566954137d8669c2d0d6d891d4eb2657d4ff5bce688c0c43a605d6767459b43499529144f3576f59d6183ab1f0be62856b51ed135980a05c8197f5d56b98d72526466829c282195cfb53582e35fbe76206dc8a146a643afecb43182bfe3b35d6994a080eae8559f27ab2a406459b4cdd4b9e79343d"}) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x4f8, 0x4f8, 0x398, 0x0, 0x0, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0x208, 0x250, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}, {0x842f273275260b72, 0x75}}, @common=@rt={{0x138, 'rt\x00'}, {0x600, [0xfffffffe, 0x9], 0x9, 0x10, 0x5, [@mcast2, @loopback, @empty, @empty, @remote, @mcast2, @local, @remote, @empty, @ipv4={[], [], @remote}, @rand_addr="2b84ea338e39eb6c05791ff23835ab84", @mcast1, @dev={0xfe, 0x80, [], 0xd}, @loopback, @dev={0xfe, 0x80, [], 0x20}, @loopback], 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id=0x66, @icmp_id=0x65}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@udp={{0x30, 'udp\x00'}, {[0x4e24, 0x4e24], [0x4e23, 0x4e22], 0x1}}, @common=@hl={{0x28, 'hl\x00'}, {0x0, 0x2f}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0xc, @ipv6=@rand_addr="5482c3546141ee285a5fe23a7d0092e5", @ipv6=@mcast1, @icmp_id=0x65, @gre_key=0x7d}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x27}, @local, [0xff, 0xffffffff, 0xffffff00, 0xffffff00], [0xff000000, 0x0, 0x0, 0xff000000], 'batadv0\x00', 'sit0\x00', {0x1fe}, {0xff}, 0x1d, 0x2, 0x2, 0x8}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv4=@local, [0xff0000ff, 0x0, 0x0, 0xffffff00], 0x4e23, 0x3a, 0x5, 0x4e21, 0x18, 0x7a}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x6c, 0x40, 0x1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x18, @ipv6=@dev={0xfe, 0x80, [], 0x11}, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, @gre_key=0x631f, @port=0x4e22}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x4, 0x80000001}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f8) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:49 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x110, 0x3ff, r0, 0x0, &(0x7f0000000000)={0xa20920, 0x100, [], @value=0x9}}) perf_event_open(&(0x7f000001d000)={0x1, 0x2, 0x0, 0xfd, 0x0, 0xfa, 0x0, 0x83, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x60100, 0x0, 0x1ffd, 0x8, 0x6, 0x3a}, 0x0, 0xfffffffffffffffd, r1, 0xb) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r3, 0x4b3b, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000000c0)={0x9, 0x4a80, 0xfff}) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r4, 0x4b3b, 0x0) ioctl$TCXONC(r4, 0x540a, 0x5) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VT_WAITACTIVE(r3, 0x5607) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r6, &(0x7f0000000d00)=""/232, 0xe8) ioctl$DRM_IOCTL_WAIT_VBLANK(r6, 0xc018643a, &(0x7f0000000080)={0x1000003e, 0xf0, 0x40}) 05:25:49 executing program 0 (fault-call:3 fault-nth:32): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x1d, 0xb, &(0x7f0000000580)="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"}) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x0) 05:25:49 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x14) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x3d2, 0x1ff, 0x157}) [ 573.330095][T14757] FAULT_INJECTION: forcing a failure. [ 573.330095][T14757] name failslab, interval 1, probability 0, space 0, times 0 [ 573.372636][T14757] CPU: 1 PID: 14757 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 573.381365][T14757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.391430][T14757] Call Trace: [ 573.394826][T14757] dump_stack+0x197/0x210 [ 573.399183][T14757] should_fail.cold+0xa/0x15 [ 573.403805][T14757] ? fault_create_debugfs_attr+0x180/0x180 [ 573.409636][T14757] ? sctp_add_bind_addr+0x9f/0x3a0 [ 573.414767][T14757] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 573.420342][T14757] __should_failslab+0x121/0x190 [ 573.425312][T14757] should_failslab+0x9/0x14 [ 573.429846][T14757] kmem_cache_alloc_trace+0x4b/0x790 [ 573.435156][T14757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.441427][T14757] ? __ipv6_addr_type+0x219/0x32d [ 573.446471][T14757] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 573.452382][T14757] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 573.458122][T14757] sctp_add_bind_addr+0x9f/0x3a0 [ 573.463086][T14757] sctp_copy_local_addr_list+0x385/0x530 [ 573.468739][T14757] ? sctp_defaults_init+0xcb0/0xcb0 [ 573.473968][T14757] ? _get_random_bytes+0x1b2/0x430 [ 573.479098][T14757] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 573.485012][T14757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.491279][T14757] sctp_copy_one_addr+0x5f/0x170 [ 573.496235][T14757] ? sctp_copy_one_addr+0x5f/0x170 [ 573.501369][T14757] sctp_bind_addr_copy+0xfc/0x2c8 [ 573.506426][T14757] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 573.512693][T14757] sctp_connect_new_asoc+0x178/0x5a0 [ 573.518001][T14757] ? security_sctp_bind_connect+0x93/0xc0 [ 573.523842][T14757] sctp_sendmsg+0x13a0/0x1f10 [ 573.528579][T14757] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 573.534496][T14757] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 573.540677][T14757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.546941][T14757] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 573.553383][T14757] ? tomoyo_socket_bind_permission+0x360/0x360 [ 573.559576][T14757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 573.565842][T14757] inet_sendmsg+0x9e/0xe0 [ 573.570196][T14757] ? inet_send_prepare+0x4e0/0x4e0 [ 573.575334][T14757] sock_sendmsg+0xd7/0x130 [ 573.579772][T14757] ____sys_sendmsg+0x358/0x880 [ 573.584642][T14757] ? kernel_sendmsg+0x50/0x50 [ 573.589336][T14757] ? __fget+0x35d/0x550 [ 573.593505][T14757] ? find_held_lock+0x35/0x130 [ 573.598321][T14757] ___sys_sendmsg+0x100/0x170 [ 573.603025][T14757] ? sendmsg_copy_msghdr+0x70/0x70 [ 573.608162][T14757] ? __kasan_check_read+0x11/0x20 [ 573.613208][T14757] ? __fget+0x37f/0x550 [ 573.617388][T14757] ? ksys_dup3+0x3e0/0x3e0 [ 573.621815][T14757] ? find_held_lock+0x35/0x130 [ 573.626597][T14757] ? get_pid_task+0x11d/0x210 [ 573.631380][T14757] ? __fget_light+0x1a9/0x230 [ 573.636069][T14757] ? __fdget+0x1b/0x20 [ 573.640152][T14757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 573.646410][T14757] ? sockfd_lookup_light+0xcb/0x180 [ 573.651636][T14757] __sys_sendmmsg+0x1bf/0x4d0 [ 573.656341][T14757] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 573.661403][T14757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 573.667670][T14757] ? fput_many+0x12c/0x1a0 [ 573.672107][T14757] ? fput+0x1b/0x20 [ 573.675148][ T27] audit: type=1400 audit(1577165149.338:86): avc: denied { create } for pid=14759 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 573.676446][T14757] ? ksys_write+0x1cf/0x290 [ 573.676470][T14757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.676487][T14757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.676507][T14757] ? do_syscall_64+0x26/0x790 [ 573.705886][T14757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.705905][T14757] ? do_syscall_64+0x26/0x790 [ 573.705930][T14757] __x64_sys_sendmmsg+0x9d/0x100 [ 573.705946][T14757] do_syscall_64+0xfa/0x790 [ 573.705968][T14757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.716871][T14757] RIP: 0033:0x45a919 [ 573.716889][T14757] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.716898][T14757] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 573.716913][T14757] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 573.716923][T14757] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 573.716931][T14757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.716946][T14757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 573.811697][T14757] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:51 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400021073797a6b616c6c65723100000000000008000100000000000800016c5113c3ea6307c3633cb2ae030000000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000100)={0x0}) r8 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r8, &(0x7f0000000d00)=""/232, 0xe8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000140)={r7, 0x180000, r8}) wait4(0x0, 0x0, 0x0, 0x0) 05:25:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x100) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB="01100300aaaaaa0200012f39ed87f37e000000000000367e0013c15c6b1f3b2f82b7ca1103c9ef07c41d383622d08d49a0acf36906116d3e188f08d01049693285eb6424e3c73c2f9e76317e86fb2631f2197843519f17be396b0f554ed54f11f5971d95ddb9fa3211dcba2d"]) 05:25:51 executing program 0 (fault-call:3 fault-nth:33): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 575.463955][T14777] FAULT_INJECTION: forcing a failure. [ 575.463955][T14777] name failslab, interval 1, probability 0, space 0, times 0 [ 575.489127][T14777] CPU: 0 PID: 14777 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 575.497843][T14777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.507908][T14777] Call Trace: [ 575.511215][T14777] dump_stack+0x197/0x210 [ 575.515570][T14777] should_fail.cold+0xa/0x15 [ 575.520183][T14777] ? fault_create_debugfs_attr+0x180/0x180 [ 575.526010][T14777] ? sctp_add_bind_addr+0x9f/0x3a0 [ 575.531137][T14777] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 575.536705][T14777] __should_failslab+0x121/0x190 [ 575.541663][T14777] should_failslab+0x9/0x14 [ 575.546182][T14777] kmem_cache_alloc_trace+0x4b/0x790 [ 575.551486][T14777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 575.557743][T14777] ? __ipv6_addr_type+0x219/0x32d [ 575.562784][T14777] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 575.568688][T14777] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 575.574861][T14777] sctp_add_bind_addr+0x9f/0x3a0 [ 575.579997][T14777] sctp_copy_local_addr_list+0x385/0x530 [ 575.585743][T14777] ? sctp_defaults_init+0xcb0/0xcb0 [ 575.590971][T14777] ? _get_random_bytes+0x1b2/0x430 [ 575.595065][T14787] ptrace attach of "/root/syz-executor.4"[14786] was attempted by "/root/syz-executor.4"[14787] [ 575.596087][T14777] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 575.596111][T14777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 575.618663][T14777] sctp_copy_one_addr+0x5f/0x170 [ 575.623619][T14777] ? sctp_copy_one_addr+0x5f/0x170 [ 575.628757][T14777] sctp_bind_addr_copy+0xfc/0x2c8 [ 575.633804][T14777] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 575.640064][T14777] sctp_connect_new_asoc+0x178/0x5a0 [ 575.645364][T14777] ? security_sctp_bind_connect+0x93/0xc0 [ 575.651097][T14777] sctp_sendmsg+0x13a0/0x1f10 [ 575.655789][T14777] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 575.655806][T14777] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 575.655822][T14777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 575.655838][T14777] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 575.655856][T14777] ? tomoyo_socket_bind_permission+0x360/0x360 [ 575.655887][T14777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 575.655910][T14777] inet_sendmsg+0x9e/0xe0 [ 575.697130][T14777] ? inet_send_prepare+0x4e0/0x4e0 [ 575.702262][T14777] sock_sendmsg+0xd7/0x130 [ 575.706700][T14777] ____sys_sendmsg+0x358/0x880 [ 575.711493][T14777] ? kernel_sendmsg+0x50/0x50 [ 575.716177][T14777] ? __fget+0x35d/0x550 [ 575.720340][T14777] ? find_held_lock+0x35/0x130 [ 575.725130][T14777] ___sys_sendmsg+0x100/0x170 [ 575.729913][T14777] ? sendmsg_copy_msghdr+0x70/0x70 [ 575.735047][T14777] ? __kasan_check_read+0x11/0x20 [ 575.740083][T14777] ? __fget+0x37f/0x550 [ 575.744258][T14777] ? ksys_dup3+0x3e0/0x3e0 [ 575.748681][T14777] ? find_held_lock+0x35/0x130 [ 575.753459][T14777] ? get_pid_task+0x11d/0x210 [ 575.753478][T14777] ? __fget_light+0x1a9/0x230 [ 575.753493][T14777] ? __fdget+0x1b/0x20 [ 575.753508][T14777] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 575.753523][T14777] ? sockfd_lookup_light+0xcb/0x180 [ 575.753543][T14777] __sys_sendmmsg+0x1bf/0x4d0 [ 575.753571][T14777] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 575.753603][T14777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 575.794601][T14777] ? fput_many+0x12c/0x1a0 [ 575.799039][T14777] ? fput+0x1b/0x20 [ 575.802950][T14777] ? ksys_write+0x1cf/0x290 [ 575.807464][T14777] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 575.813967][T14777] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 575.819438][T14777] ? do_syscall_64+0x26/0x790 [ 575.824138][T14777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 575.830221][T14777] ? do_syscall_64+0x26/0x790 [ 575.834923][T14777] __x64_sys_sendmmsg+0x9d/0x100 [ 575.839879][T14777] do_syscall_64+0xfa/0x790 [ 575.844495][T14777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 575.850370][T14777] RIP: 0033:0x45a919 [ 575.854262][T14777] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 575.873873][T14777] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 575.882429][T14777] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 575.890539][T14777] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 575.898516][T14777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 575.906599][T14777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:25:51 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:51 executing program 0 (fault-call:3 fault-nth:34): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:51 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x40, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x1a0) openat$cgroup(r0, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000180)=""/163) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f0000000080)={0x8e9, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000000c0)={r6, 0x10000}) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000000)={0x3, 0x68}) r7 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r7, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SIOCX25GDTEFACILITIES(r7, 0x89ea, &(0x7f0000000100)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c000000e158a973f6d224cc8962d2520e03323e2c2fe6ad9f3bb45caccae1a55abe2c8d1d177844988071521ab4d8e2477b8481114d131700009277d3d97f56ab83d45e54ba5f", @ANYRES16=r4, @ANYBLOB="3105000100000900000009f7ba053730e9b2fa74f39f0001ea7e4b21f3329eb00873793a6b616c6c657731000000000000080001004e00000008000300000000004a2093062c8471de7c8a3e742f4b6ee7cb9e261687fd58328afaffd9db3d67e144e97e7ba041ce3a7a6cd7b12bf218cf8bf4c06de663c358eb9df9cdb26e0ee1e19156d2830af73158d2494a8ef291661779d9cd054d510438641cc3f76e4582c245cd75261204560b1b8c8267addd9541e638f6fa0acfea8eeb52b5c211d387b984e5074f8e466d4ef096294103f3c6df"], 0x3}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0900000000516f6cf4d01f7f16774f6333819583277a970c192ad5c1873673fcd393acec9ebbb71ae8558cba1034c845a1259cd6d15b5afd649ce43db4beb5bb1ee8d285db06bcc5f257b4e8c3727b97062e5693016d3ee5646d64ff2d04e1a3e5de8fefa11281c2af9f25ad9c91c8c310471c26860dbf1e38855165ca83a7dde246f59134e7d132cd08247f99ab052b739887277251f55f0a211a1891f0081a4c8fd55ce1fc466d6bdffb2007131d7aa9721b367ac492235b9059af58ce3e905bee067d362ff292e5983a97a76902f4287ea4ad5b"], 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x5) r3 = getpgid(r2) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000040)='/dev//card\"\xff\xff\xfa\x00', 0x7ff, 0x140) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1, 0x81}) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000280)=0x1a0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000080)={r6, r0}) write$FUSE_LSEEK(r0, &(0x7f0000000180)={0x18, 0x0, 0x3, {0x5}}, 0x18) 05:25:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 575.914564][T14777] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x2, 0x1, 0x7}, 0xd8d7}}, 0x18) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='\f\x00') r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x616001, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f0000000100)=0x1f, 0x4) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x101000, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0xffffffffffffffd9, r3, 0x531, 0x70bd25, 0x0, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x6}]}, 0x14}}, 0x20008000) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r6, &(0x7f0000000d00)=""/232, 0xe8) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000140)={0xb5c448013879a94c, 0x103, 0x5, {0x0, 0x2, 0x381, 0x800}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 576.140208][T14809] FAULT_INJECTION: forcing a failure. [ 576.140208][T14809] name failslab, interval 1, probability 0, space 0, times 0 [ 576.171459][T14809] CPU: 1 PID: 14809 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 576.180174][T14809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.180182][T14809] Call Trace: [ 576.180203][T14809] dump_stack+0x197/0x210 [ 576.180226][T14809] should_fail.cold+0xa/0x15 [ 576.202713][T14809] ? fault_create_debugfs_attr+0x180/0x180 [ 576.208643][T14809] ? sctp_add_bind_addr+0x9f/0x3a0 [ 576.208660][T14809] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 576.208681][T14809] __should_failslab+0x121/0x190 [ 576.208698][T14809] should_failslab+0x9/0x14 [ 576.208717][T14809] kmem_cache_alloc_trace+0x4b/0x790 [ 576.234061][T14809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.240318][T14809] ? __ipv6_addr_type+0x219/0x32d [ 576.245358][T14809] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 576.251248][T14809] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 576.256995][T14809] sctp_add_bind_addr+0x9f/0x3a0 [ 576.261964][T14809] sctp_copy_local_addr_list+0x385/0x530 [ 576.267626][T14809] ? sctp_defaults_init+0xcb0/0xcb0 [ 576.272847][T14809] ? _get_random_bytes+0x1b2/0x430 [ 576.277979][T14809] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 576.283899][T14809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.290165][T14809] sctp_copy_one_addr+0x5f/0x170 [ 576.295118][T14809] ? sctp_copy_one_addr+0x5f/0x170 [ 576.300255][T14809] sctp_bind_addr_copy+0xfc/0x2c8 [ 576.305308][T14809] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 576.311573][T14809] sctp_connect_new_asoc+0x178/0x5a0 [ 576.316879][T14809] ? security_sctp_bind_connect+0x93/0xc0 [ 576.322624][T14809] sctp_sendmsg+0x13a0/0x1f10 [ 576.327345][T14809] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 576.333266][T14809] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 576.339186][T14809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.345449][T14809] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 576.351893][T14809] ? tomoyo_socket_bind_permission+0x360/0x360 [ 576.358087][T14809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 576.364354][T14809] inet_sendmsg+0x9e/0xe0 [ 576.368710][T14809] ? inet_send_prepare+0x4e0/0x4e0 [ 576.368953][T14818] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=627 sclass=netlink_route_socket pig=14818 comm=syz-executor.1 [ 576.373830][T14809] sock_sendmsg+0xd7/0x130 [ 576.373851][T14809] ____sys_sendmsg+0x358/0x880 [ 576.373871][T14809] ? kernel_sendmsg+0x50/0x50 [ 576.373886][T14809] ? __fget+0x35d/0x550 [ 576.373901][T14809] ? find_held_lock+0x35/0x130 [ 576.373925][T14809] ___sys_sendmsg+0x100/0x170 [ 576.414622][T14809] ? sendmsg_copy_msghdr+0x70/0x70 [ 576.419754][T14809] ? __kasan_check_read+0x11/0x20 [ 576.424794][T14809] ? __fget+0x37f/0x550 [ 576.428963][T14809] ? ksys_dup3+0x3e0/0x3e0 [ 576.433388][T14809] ? find_held_lock+0x35/0x130 [ 576.438170][T14809] ? get_pid_task+0x11d/0x210 [ 576.442867][T14809] ? __fget_light+0x1a9/0x230 [ 576.447563][T14809] ? __fdget+0x1b/0x20 [ 576.451631][T14809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 576.451647][T14809] ? sockfd_lookup_light+0xcb/0x180 [ 576.451666][T14809] __sys_sendmmsg+0x1bf/0x4d0 [ 576.451686][T14809] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 576.451718][T14809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 576.479029][T14809] ? fput_many+0x12c/0x1a0 [ 576.483476][T14809] ? fput+0x1b/0x20 [ 576.487306][T14809] ? ksys_write+0x1cf/0x290 [ 576.491827][T14809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.497300][T14809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 576.502779][T14809] ? do_syscall_64+0x26/0x790 [ 576.507476][T14809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.513559][T14809] ? do_syscall_64+0x26/0x790 [ 576.518267][T14809] __x64_sys_sendmmsg+0x9d/0x100 [ 576.523227][T14809] do_syscall_64+0xfa/0x790 [ 576.527749][T14809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.533659][T14809] RIP: 0033:0x45a919 05:25:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000000)={0x6, 0x0, 0x3, 0x7ff}, 0x10) 05:25:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000e2ffffff2009000000280003001400ecff73797a6b616c6c65723100000000000008000100000000000800030000000000c4435ef214d781cecfa11ced72393ac6dfaa1c8c2e401789b02dd0518024bd0e12db2de2ea266a6e042faf6056bcad70b5bd34da188a2c5a319c0ec6552729beb604fe09b9241e17ed02240c82434c06f6c83ddaaa8e5232bc426a8abef671006bd5a7c05bac3b401ef2919ade5ab319c24e6b"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() flistxattr(r1, &(0x7f0000000240)=""/116, 0x74) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)={0x14, r4, 0x531, 0x0, 0x0, {0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x4c14}, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4b3b, 0x0) r6 = fcntl$getown(r5, 0x9) ptrace$peeksig(0x4209, r2, &(0x7f0000000180)={0xfff, 0x0, 0xa}, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x4, 0xff, 0x9, 0x2, 0x0, 0x20, 0x1, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x11, 0xfd282791ad3ffbff, @perf_bp={&(0x7f0000000000), 0x5}, 0x8200, 0xfffffffffffffff8, 0x6, 0x7, 0x7fffffff, 0x7, 0x203}, r6, 0x8, r7, 0x2) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r8 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r8, &(0x7f0000000d00)=""/232, 0xe8) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r11, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r10, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f00000002c0)={r12, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r11, 0x84, 0x7c, &(0x7f0000000180)={r12, 0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f00000007c0)={0x7, 0x2, 0x8002, 0x9b, 0x81, 0x4, 0x4, 0x4, r12}, 0x20) ioctl$NBD_DO_IT(r7, 0xab03) [ 576.537600][T14809] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 576.557216][T14809] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 576.565671][T14809] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 576.573928][T14809] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 576.573938][T14809] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:25:52 executing program 0 (fault-call:3 fault-nth:35): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:52 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 576.573946][T14809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 576.573954][T14809] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 576.742923][T14828] QAT: Invalid ioctl [ 576.789332][T14837] FAULT_INJECTION: forcing a failure. [ 576.789332][T14837] name failslab, interval 1, probability 0, space 0, times 0 [ 576.834624][T14840] QAT: Invalid ioctl [ 576.854868][T14837] CPU: 1 PID: 14837 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 576.863603][T14837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.873761][T14837] Call Trace: [ 576.877186][T14837] dump_stack+0x197/0x210 [ 576.881538][T14837] should_fail.cold+0xa/0x15 [ 576.886154][T14837] ? fault_create_debugfs_attr+0x180/0x180 [ 576.891983][T14837] ? sctp_add_bind_addr+0x9f/0x3a0 [ 576.897113][T14837] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 576.902686][T14837] __should_failslab+0x121/0x190 [ 576.907821][T14837] should_failslab+0x9/0x14 [ 576.912344][T14837] kmem_cache_alloc_trace+0x4b/0x790 [ 576.917651][T14837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.923925][T14837] ? __ipv6_addr_type+0x219/0x32d [ 576.928954][T14837] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 576.934852][T14837] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 576.940587][T14837] sctp_add_bind_addr+0x9f/0x3a0 [ 576.945545][T14837] sctp_copy_local_addr_list+0x385/0x530 [ 576.951200][T14837] ? sctp_defaults_init+0xcb0/0xcb0 [ 576.956418][T14837] ? _get_random_bytes+0x1b2/0x430 [ 576.961538][T14837] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 576.961557][T14837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.961581][T14837] sctp_copy_one_addr+0x5f/0x170 [ 576.973687][T14837] ? sctp_copy_one_addr+0x5f/0x170 [ 576.973704][T14837] sctp_bind_addr_copy+0xfc/0x2c8 [ 576.973727][T14837] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 576.973753][T14837] sctp_connect_new_asoc+0x178/0x5a0 [ 577.000343][T14837] ? security_sctp_bind_connect+0x93/0xc0 [ 577.006189][T14837] sctp_sendmsg+0x13a0/0x1f10 [ 577.010897][T14837] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 577.016939][T14837] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 577.023038][T14837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 577.029277][T14837] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 577.035724][T14837] ? tomoyo_socket_bind_permission+0x360/0x360 [ 577.041887][T14837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 577.048176][T14837] inet_sendmsg+0x9e/0xe0 [ 577.052582][T14837] ? inet_send_prepare+0x4e0/0x4e0 [ 577.057679][T14837] sock_sendmsg+0xd7/0x130 [ 577.062097][T14837] ____sys_sendmsg+0x358/0x880 [ 577.066858][T14837] ? kernel_sendmsg+0x50/0x50 [ 577.071530][T14837] ? __fget+0x35d/0x550 [ 577.075693][T14837] ? find_held_lock+0x35/0x130 [ 577.080457][T14837] ___sys_sendmsg+0x100/0x170 [ 577.085137][T14837] ? sendmsg_copy_msghdr+0x70/0x70 [ 577.090245][T14837] ? __kasan_check_read+0x11/0x20 [ 577.095251][T14837] ? __fget+0x37f/0x550 [ 577.099477][T14837] ? ksys_dup3+0x3e0/0x3e0 [ 577.103947][T14837] ? find_held_lock+0x35/0x130 [ 577.108718][T14837] ? get_pid_task+0x11d/0x210 [ 577.113394][T14837] ? __fget_light+0x1a9/0x230 [ 577.118069][T14837] ? __fdget+0x1b/0x20 [ 577.122136][T14837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 577.128370][T14837] ? sockfd_lookup_light+0xcb/0x180 [ 577.133606][T14837] __sys_sendmmsg+0x1bf/0x4d0 [ 577.138274][T14837] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 577.143458][T14837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 577.149689][T14837] ? fput_many+0x12c/0x1a0 [ 577.154889][T14837] ? fput+0x1b/0x20 [ 577.158686][T14837] ? ksys_write+0x1cf/0x290 [ 577.163176][T14837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 577.168620][T14837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 577.174079][T14837] ? do_syscall_64+0x26/0x790 [ 577.178740][T14837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 577.184788][T14837] ? do_syscall_64+0x26/0x790 [ 577.189451][T14837] __x64_sys_sendmmsg+0x9d/0x100 [ 577.194377][T14837] do_syscall_64+0xfa/0x790 [ 577.198865][T14837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 577.204738][T14837] RIP: 0033:0x45a919 [ 577.208616][T14837] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 577.228214][T14837] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 577.236620][T14837] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 577.244594][T14837] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 577.252554][T14837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 577.260508][T14837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 577.268481][T14837] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:25:55 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8003, 0x0, &(0x7f0000000140), 0x0, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) open_by_handle_at(r1, &(0x7f0000000100)=ANY=[], 0x88a70bb16c98cf0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 05:25:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x1a, 0x6, 0x7) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0x4, 0x4) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c000002", @ANYRES16=r5, @ANYRES32=r1], 0x3}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:55 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x1, 0x5, 0xfff, 0x80, 0x7f, 0x7f, 0x3, 0xc3f, 0x40}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$cont(0x20, r1, 0x40000c8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, r0, 0x1, 0xffffffffffffffff, 0x3) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r2, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x5, 0x2, {"ba495f44fbed198fc5409383472fbde6"}, 0xfff, 0x20, 0x81a}}}, 0x90) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000040)={0x81, 0x3, {0x3, 0x3, 0xfffff000, 0x1, 0x8}, 0x6}) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:55 executing program 0 (fault-call:3 fault-nth:36): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 579.123131][T14856] FAT-fs (loop5): bogus number of reserved sectors [ 579.127262][T14857] FAULT_INJECTION: forcing a failure. [ 579.127262][T14857] name failslab, interval 1, probability 0, space 0, times 0 [ 579.129754][T14856] FAT-fs (loop5): Can't find a valid FAT filesystem 05:25:55 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x10000, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000100)={0x0, 0xfffffffffffffe69, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r2, 0x701, 0x0, 0x0, {0x12, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21001200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xa4, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffff81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x94}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="c18aabce63a20a03b6e75bd29489683f78dabd4ab0d473008a270356647432a4b72b88d90bb0f132cfa060e6f6bd975ec866e873edaf38cf33191c2a95bbc89eff42894bb17c136826aaaabe8f1a8529f7bfdf4488d0") r4 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x4, 0x21) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$VIDIOC_EXPBUF(r4, 0xc0405610, &(0x7f00000002c0)={0xa, 0x101, 0xb2a, 0xf872e62e11bc61f4, r5}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 579.229296][T14857] CPU: 1 PID: 14857 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 579.238123][T14857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.248188][T14857] Call Trace: [ 579.251502][T14857] dump_stack+0x197/0x210 [ 579.255862][T14857] should_fail.cold+0xa/0x15 [ 579.260477][T14857] ? fault_create_debugfs_attr+0x180/0x180 [ 579.266312][T14857] ? sctp_add_bind_addr+0x9f/0x3a0 [ 579.271550][T14857] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 579.277116][T14857] __should_failslab+0x121/0x190 [ 579.282071][T14857] should_failslab+0x9/0x14 [ 579.286578][T14857] kmem_cache_alloc_trace+0x4b/0x790 [ 579.291880][T14857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.298129][T14857] ? __ipv6_addr_type+0x219/0x32d [ 579.303161][T14857] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 579.309058][T14857] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 579.314801][T14857] sctp_add_bind_addr+0x9f/0x3a0 [ 579.319744][T14857] sctp_copy_local_addr_list+0x385/0x530 [ 579.325380][T14857] ? sctp_defaults_init+0xcb0/0xcb0 [ 579.330580][T14857] ? _get_random_bytes+0x1b2/0x430 [ 579.335676][T14857] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 579.341566][T14857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.347816][T14857] sctp_copy_one_addr+0x5f/0x170 [ 579.352769][T14857] ? sctp_copy_one_addr+0x5f/0x170 [ 579.357891][T14857] sctp_bind_addr_copy+0xfc/0x2c8 [ 579.362937][T14857] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 579.369178][T14857] sctp_connect_new_asoc+0x178/0x5a0 [ 579.374449][T14857] ? security_sctp_bind_connect+0x93/0xc0 [ 579.380158][T14857] sctp_sendmsg+0x13a0/0x1f10 [ 579.384853][T14857] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 579.390750][T14857] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 579.396652][T14857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.402890][T14857] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 579.409319][T14857] ? tomoyo_socket_bind_permission+0x360/0x360 [ 579.415472][T14857] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 579.421726][T14857] inet_sendmsg+0x9e/0xe0 [ 579.426074][T14857] ? inet_send_prepare+0x4e0/0x4e0 [ 579.431202][T14857] sock_sendmsg+0xd7/0x130 [ 579.435672][T14857] ____sys_sendmsg+0x358/0x880 [ 579.440475][T14857] ? kernel_sendmsg+0x50/0x50 [ 579.445148][T14857] ? __fget+0x35d/0x550 [ 579.449309][T14857] ? find_held_lock+0x35/0x130 [ 579.454194][T14857] ___sys_sendmsg+0x100/0x170 [ 579.458887][T14857] ? sendmsg_copy_msghdr+0x70/0x70 [ 579.463995][T14857] ? __kasan_check_read+0x11/0x20 [ 579.469032][T14857] ? __fget+0x37f/0x550 [ 579.473187][T14857] ? ksys_dup3+0x3e0/0x3e0 [ 579.477584][T14857] ? find_held_lock+0x35/0x130 [ 579.482341][T14857] ? get_pid_task+0x11d/0x210 [ 579.487024][T14857] ? __fget_light+0x1a9/0x230 [ 579.491708][T14857] ? __fdget+0x1b/0x20 [ 579.495765][T14857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 579.501997][T14857] ? sockfd_lookup_light+0xcb/0x180 [ 579.507199][T14857] __sys_sendmmsg+0x1bf/0x4d0 [ 579.511873][T14857] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 579.516914][T14857] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 579.523147][T14857] ? fput_many+0x12c/0x1a0 [ 579.527568][T14857] ? fput+0x1b/0x20 [ 579.531372][T14857] ? ksys_write+0x1cf/0x290 [ 579.535861][T14857] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 579.541310][T14857] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 579.547351][T14857] ? do_syscall_64+0x26/0x790 [ 579.552023][T14857] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.558072][T14857] ? do_syscall_64+0x26/0x790 [ 579.562755][T14857] __x64_sys_sendmmsg+0x9d/0x100 [ 579.567703][T14857] do_syscall_64+0xfa/0x790 [ 579.572211][T14857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.578086][T14857] RIP: 0033:0x45a919 [ 579.581973][T14857] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 579.601577][T14857] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 579.609990][T14857] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 579.618131][T14857] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:55 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYRESOCT=r3], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 579.626093][T14857] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 579.634070][T14857] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 579.642058][T14857] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 579.731442][T14856] FAT-fs (loop5): bogus number of reserved sectors [ 579.737998][T14856] FAT-fs (loop5): Can't find a valid FAT filesystem 05:25:55 executing program 0 (fault-call:3 fault-nth:37): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') futex(&(0x7f0000000000), 0x85, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000100)=0x2, 0x1) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000008c0)={0xfffffff, 0x7, 0xffffff9e, r3, 0x0, &(0x7f0000000880)={0x990968, 0x20, [], @string=&(0x7f0000000840)=0x2}}) r5 = accept$ax25(r4, &(0x7f0000000980)={{0x3, @default}, [@rose, @netrom, @null, @null, @default, @bcast, @default, @null]}, &(0x7f0000000000)=0x48) ioctl$SIOCAX25DELFWD(r5, 0x89eb, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="09f7ff0013be0000800000"], 0x0) 05:25:55 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) [ 579.961608][T14890] FAULT_INJECTION: forcing a failure. [ 579.961608][T14890] name failslab, interval 1, probability 0, space 0, times 0 [ 580.000876][T14890] CPU: 1 PID: 14890 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 580.009605][T14890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.019667][T14890] Call Trace: [ 580.022984][T14890] dump_stack+0x197/0x210 [ 580.027339][T14890] should_fail.cold+0xa/0x15 [ 580.032205][T14890] ? fault_create_debugfs_attr+0x180/0x180 [ 580.038035][T14890] ? sctp_add_bind_addr+0x9f/0x3a0 [ 580.038053][T14890] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 580.038076][T14890] __should_failslab+0x121/0x190 [ 580.053688][T14890] should_failslab+0x9/0x14 [ 580.058217][T14890] kmem_cache_alloc_trace+0x4b/0x790 [ 580.063522][T14890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.069793][T14890] ? __ipv6_addr_type+0x219/0x32d [ 580.074836][T14890] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 580.080771][T14890] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 580.086518][T14890] sctp_add_bind_addr+0x9f/0x3a0 [ 580.091598][T14890] sctp_copy_local_addr_list+0x385/0x530 [ 580.097252][T14890] ? sctp_defaults_init+0xcb0/0xcb0 [ 580.102479][T14890] ? _get_random_bytes+0x1b2/0x430 [ 580.107601][T14890] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 580.113517][T14890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.119775][T14890] sctp_copy_one_addr+0x5f/0x170 [ 580.124733][T14890] ? sctp_copy_one_addr+0x5f/0x170 [ 580.129859][T14890] sctp_bind_addr_copy+0xfc/0x2c8 [ 580.134902][T14890] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 580.141165][T14890] sctp_connect_new_asoc+0x178/0x5a0 [ 580.146463][T14890] ? security_sctp_bind_connect+0x93/0xc0 [ 580.149500][T14899] IPVS: Unknown mcast interface: syzkaller1 [ 580.152192][T14890] sctp_sendmsg+0x13a0/0x1f10 [ 580.152217][T14890] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 580.152234][T14890] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 580.152251][T14890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 580.152275][T14890] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 580.152293][T14890] ? tomoyo_socket_bind_permission+0x360/0x360 [ 580.152323][T14890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 580.152343][T14890] inet_sendmsg+0x9e/0xe0 [ 580.152358][T14890] ? inet_send_prepare+0x4e0/0x4e0 [ 580.152380][T14890] sock_sendmsg+0xd7/0x130 [ 580.172584][T14899] IPVS: Unknown mcast interface: syzkaller1 [ 580.174781][T14890] ____sys_sendmsg+0x358/0x880 [ 580.174807][T14890] ? kernel_sendmsg+0x50/0x50 [ 580.213882][T14890] ? __fget+0x35d/0x550 [ 580.213899][T14890] ? find_held_lock+0x35/0x130 [ 580.213925][T14890] ___sys_sendmsg+0x100/0x170 [ 580.213948][T14890] ? sendmsg_copy_msghdr+0x70/0x70 [ 580.233407][T14890] ? __kasan_check_read+0x11/0x20 [ 580.252945][T14890] ? __fget+0x37f/0x550 [ 580.257120][T14890] ? ksys_dup3+0x3e0/0x3e0 [ 580.261550][T14890] ? find_held_lock+0x35/0x130 [ 580.266332][T14890] ? get_pid_task+0x11d/0x210 [ 580.271027][T14890] ? __fget_light+0x1a9/0x230 [ 580.275720][T14890] ? __fdget+0x1b/0x20 [ 580.279804][T14890] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.286054][T14890] ? sockfd_lookup_light+0xcb/0x180 [ 580.291356][T14890] __sys_sendmmsg+0x1bf/0x4d0 [ 580.296055][T14890] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 580.301120][T14890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 580.307372][T14890] ? fput_many+0x12c/0x1a0 [ 580.311802][T14890] ? fput+0x1b/0x20 [ 580.315626][T14890] ? ksys_write+0x1cf/0x290 [ 580.320145][T14890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.325618][T14890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 580.331114][T14890] ? do_syscall_64+0x26/0x790 [ 580.335807][T14890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.341889][T14890] ? do_syscall_64+0x26/0x790 [ 580.346593][T14890] __x64_sys_sendmmsg+0x9d/0x100 [ 580.351554][T14890] do_syscall_64+0xfa/0x790 [ 580.356079][T14890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.361978][T14890] RIP: 0033:0x45a919 [ 580.365887][T14890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.385505][T14890] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 580.393935][T14890] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 580.402010][T14890] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 05:25:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0x49, "33c64340a18f8b419ce31d66a455e0526f87e0267438cae0b33f70c42b3d716ae506a357bcd4f13d0a8111ba44165d27556f3d311db6317fed1bbab23fcaea3998e5ec6c8e62b483cf"}, &(0x7f0000000000)=0x6d) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, r4, 0x531, 0x20, 0x25dfdbfc, {0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x204e840}, 0xa0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r5, 0x4b3b, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0xfffffff, 0x3, 0x9, r5, 0x0, &(0x7f0000000100)={0xa20929, 0x8, [], @string=&(0x7f00000000c0)=0xfd}}) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000180)) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f00000002c0)=""/4096) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:56 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0x980000, 0x6cd, 0xfffffffa, r0, 0x0, &(0x7f0000000040)={0x990a94, 0xff, [], @p_u8=&(0x7f0000000000)=0x4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200, 0x1, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000780)={0x5, [[0x4, 0x1, 0x8, 0x400, 0x1, 0xfff, 0x6, 0xa], [0x2e7, 0x7fffffff, 0x80000001, 0x4, 0x800, 0x6, 0xffffffff, 0x80000000], [0x4, 0x401, 0x80, 0x2, 0x5, 0xffffff62, 0x3, 0x1]], [], [{0x3f, 0x3ff, 0x0, 0x0, 0x1}, {0x4, 0x80, 0x0, 0x0, 0x1}, {0x0, 0x7, 0x0, 0x1, 0x1}, {0x7fffffff, 0x5, 0x1, 0x0, 0x1}, {0xfff, 0x2, 0x0, 0x1, 0x1, 0x1}, {0x400, 0xa, 0x1, 0x1, 0x0, 0x1}, {0x200002, 0x10001, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}, {0x9, 0xfffffffe, 0x1, 0x1}, {0x200, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x2, 0x6, 0x0, 0x1, 0x0, 0x1}, {0x615, 0x6, 0x1, 0x0, 0x1, 0x1}], [], 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000240)=""/231, 0xe7}, {&(0x7f0000000000)=""/116, 0x74}, {&(0x7f0000000340)=""/231, 0xe7}, {&(0x7f0000000440)=""/199, 0xc7}, {&(0x7f0000000100)=""/180, 0xb4}, {&(0x7f0000000540)=""/109, 0x6d}, {&(0x7f00000005c0)=""/249, 0xf9}, {&(0x7f00000006c0)=""/49, 0x31}], 0x8, 0x2) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800030000000000f957287afd930562b0713c81242eb4311ee4a75e040c7b2830c9eab9344ec08c70df879faebba8621522b29f877b5ab4148e75dbfabf2cd40f008e85f03116dfa0ebf6a5d26fe47572e14085c841d60890fc9c1e97683e2a4b583302999e49c9c47e5fad76"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000280)=0x1a0) io_uring_register$IORING_REGISTER_BUFFERS(r6, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000200)=""/35, 0x23}, {&(0x7f0000000ac0)=""/81, 0x51}, {&(0x7f0000000b40)=""/44, 0x2c}], 0x3) [ 580.410261][T14890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 580.418246][T14890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 580.426237][T14890] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 580.456538][T14915] IPVS: Unknown mcast interface: syzkaller1 [ 580.466983][T14917] IPVS: Unknown mcast interface: syzkaller1 05:25:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:25:58 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x400000) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x2000, 0x0) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000240)=0xffffffffffffff01, 0x400, 0x430ed2b0d92e5cd3) r2 = socket(0x1, 0x18000a, 0x4) fstatfs(r2, &(0x7f0000000000)=""/161) close(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x1, 0xfffffffffffffeb2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8001}, 0x0, 0xb16}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000300)={0x0, 0x1, 0x1, 0x0, 0x7}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:58 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:25:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f0000000240)) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) statx(r3, &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x60, &(0x7f0000000680)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,sq=0x0000000000000800,sq=0x0000000000000001,obj_user=eth0eth1cpuset,euid<', @ANYRESDEC=r2, @ANYBLOB="2c6d61736b3d4d41595f524541442c7375626a5f757365723de273656375726974795b707070316574683173656c696e757876626f786e65743123657468317b657468312d2b626465762c61756469742c666f776e65723d", @ANYRESDEC=r4, @ANYBLOB="2c6f626a5f747970653d49505653002c7569643d93989d95056df2a3e801e5e0fb8ea11262226056488aab060d1b9ec19288db21c8f3d9c774f3806f5b18eebeb2072642dbc92102079449afba15fe60549e925c7c8e8d1caf6520097cad7b6e54a5937a80cc1bc4606a73b1676965548e8f42bf03b67289edd1429613f8ad020e5c9809caee349d59b21f30da125bf8f472be74f287af2987d4e143fbe7afb423cc93adaf671cbf19cbe061ea2fce6068312066c63b157c71f7", @ANYRESDEC=r5, @ANYBLOB=',fscontext=root,\x00']) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r8, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:25:58 executing program 0 (fault-call:3 fault-nth:38): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000180)={@remote}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r3}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vxcan0\x00', r3}) connect$can_bcm(r0, &(0x7f0000000380)={0x1d, r4}, 0x10) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r7, 0x101, 0x0, 0x0, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)={0x1e8, r7, 0xd3418f9084f3a33c, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x1}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x3}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x1}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x1}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x10}, 0x40001) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) geteuid() open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:25:58 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) fremovexattr(r1, &(0x7f0000000000)=@random={'user.', 'vboxnet0-cpusetposix_acl_access\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 582.758759][T14943] FAULT_INJECTION: forcing a failure. [ 582.758759][T14943] name failslab, interval 1, probability 0, space 0, times 0 [ 582.811932][T14945] IPVS: Unknown mcast interface: syzkaller1 [ 582.811984][T14943] CPU: 1 PID: 14943 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 582.826564][T14943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.834968][T14953] IPVS: Unknown mcast interface: syzkaller1 [ 582.836645][T14943] Call Trace: [ 582.836672][T14943] dump_stack+0x197/0x210 [ 582.836699][T14943] should_fail.cold+0xa/0x15 [ 582.856295][T14943] ? fault_create_debugfs_attr+0x180/0x180 [ 582.862119][T14943] ? sctp_add_bind_addr+0x9f/0x3a0 [ 582.867250][T14943] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 582.872820][T14943] __should_failslab+0x121/0x190 [ 582.877777][T14943] should_failslab+0x9/0x14 [ 582.882376][T14943] kmem_cache_alloc_trace+0x4b/0x790 [ 582.882396][T14943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.882411][T14943] ? __ipv6_addr_type+0x219/0x32d [ 582.882424][T14943] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 582.882446][T14943] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 582.882462][T14943] sctp_add_bind_addr+0x9f/0x3a0 [ 582.905034][T14943] sctp_copy_local_addr_list+0x385/0x530 [ 582.905055][T14943] ? sctp_defaults_init+0xcb0/0xcb0 [ 582.905077][T14943] ? _get_random_bytes+0x1b2/0x430 [ 582.915728][T14943] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 582.915746][T14943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.915768][T14943] sctp_copy_one_addr+0x5f/0x170 [ 582.937589][T14943] ? sctp_copy_one_addr+0x5f/0x170 [ 582.953834][T14943] sctp_bind_addr_copy+0xfc/0x2c8 [ 582.953859][T14943] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 582.953879][T14943] sctp_connect_new_asoc+0x178/0x5a0 [ 582.953901][T14943] ? security_sctp_bind_connect+0x93/0xc0 [ 582.976130][T14943] sctp_sendmsg+0x13a0/0x1f10 [ 582.980835][T14943] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 582.986747][T14943] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 582.992661][T14943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 582.998921][T14943] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 583.005376][T14943] ? tomoyo_socket_bind_permission+0x360/0x360 [ 583.005416][T14943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 583.017795][T14943] inet_sendmsg+0x9e/0xe0 [ 583.022141][T14943] ? inet_send_prepare+0x4e0/0x4e0 [ 583.027260][T14943] sock_sendmsg+0xd7/0x130 [ 583.027280][T14943] ____sys_sendmsg+0x358/0x880 [ 583.027298][T14943] ? kernel_sendmsg+0x50/0x50 [ 583.027318][T14943] ? __fget+0x35d/0x550 [ 583.036474][T14943] ? find_held_lock+0x35/0x130 [ 583.036502][T14943] ___sys_sendmsg+0x100/0x170 [ 583.036527][T14943] ? sendmsg_copy_msghdr+0x70/0x70 05:25:59 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 583.045339][T14943] ? __kasan_check_read+0x11/0x20 [ 583.045359][T14943] ? __fget+0x37f/0x550 [ 583.045381][T14943] ? ksys_dup3+0x3e0/0x3e0 [ 583.045395][T14943] ? find_held_lock+0x35/0x130 [ 583.045416][T14943] ? get_pid_task+0x11d/0x210 [ 583.054828][T14943] ? __fget_light+0x1a9/0x230 [ 583.054846][T14943] ? __fdget+0x1b/0x20 [ 583.054861][T14943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.054877][T14943] ? sockfd_lookup_light+0xcb/0x180 [ 583.054900][T14943] __sys_sendmmsg+0x1bf/0x4d0 [ 583.065007][T14943] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 583.065044][T14943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 583.065060][T14943] ? fput_many+0x12c/0x1a0 [ 583.065078][T14943] ? fput+0x1b/0x20 [ 583.073718][T14943] ? ksys_write+0x1cf/0x290 [ 583.073740][T14943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.073756][T14943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.073770][T14943] ? do_syscall_64+0x26/0x790 [ 583.073792][T14943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.083485][T14943] ? do_syscall_64+0x26/0x790 05:25:59 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:25:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800030000000000faed63a2c5ddbb3f20eaa144999512d5567bf2dec2980adb737f4a7ef413dd9685dd2c3c95"], 0x3}}, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U-', 0x100}, 0x16, 0x2) r5 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='IPVS\x00', r4) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r1, 0xc0884123, &(0x7f0000000340)={0x1, "173228ee13c5bf0a18edf29250333c17de9a0d2c3e81d79a65047ae2e533372fee91751e6ddc299229c0600a4e1696bba5e1d5553e0e223af64d568206ae0ab2", {0x1, 0x2}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)=@secondary='builtin_and_secondary_trusted\x00') eventfd(0x11) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 583.083513][T14943] __x64_sys_sendmmsg+0x9d/0x100 [ 583.083532][T14943] do_syscall_64+0xfa/0x790 [ 583.083550][T14943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.083566][T14943] RIP: 0033:0x45a919 [ 583.092371][T14943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.092380][T14943] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 583.092393][T14943] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 583.092401][T14943] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 583.092410][T14943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 583.092420][T14943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 583.092428][T14943] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 583.103230][T14948] FAT-fs (loop5): bogus number of reserved sectors [ 583.194382][T14948] FAT-fs (loop5): Can't find a valid FAT filesystem 05:25:59 executing program 0 (fault-call:3 fault-nth:39): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:25:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'veth1_to_bridge\x00', @broadcast}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000240)=""/235) r4 = gettid() r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x30, r6, 0x800, 0x70bd2c, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0xffffffffffffffba, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x0, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xfffffffffffffd6a}}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) wait4(0x0, 0x0, 0x3, 0x0) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r7) add_key(&(0x7f0000000140)='rxrpc_s\x00', 0x0, &(0x7f00000001c0)="0e58a260a37b2e67", 0x8, r8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, 0x0, &(0x7f0000000000)=@secondary='builtin_and_secondary_trusted\x00') r9 = gettid() tkill(r9, 0x3c) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r9, 0x0, 0x0) ptrace$cont(0x9, r9, 0x0, 0xffffffff) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvram\x00', 0x42000, 0x0) ioctl$USBDEVFS_CONTROL(r10, 0xc0185500, &(0x7f00000003c0)={0x0, 0x7, 0x3, 0x1, 0x24, 0x4, &(0x7f0000000380)="de5796b295c9e85ea6baf7f0655c193070757610b60f0f11961bd4e0cbc13e5a96e06787"}) [ 583.443601][T14975] FAULT_INJECTION: forcing a failure. [ 583.443601][T14975] name failslab, interval 1, probability 0, space 0, times 0 [ 583.461981][T14948] FAT-fs (loop5): bogus number of reserved sectors [ 583.468545][T14948] FAT-fs (loop5): Can't find a valid FAT filesystem [ 583.530498][T14975] CPU: 1 PID: 14975 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 583.539210][T14975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.539217][T14975] Call Trace: [ 583.539237][T14975] dump_stack+0x197/0x210 [ 583.539261][T14975] should_fail.cold+0xa/0x15 [ 583.561539][T14975] ? fault_create_debugfs_attr+0x180/0x180 [ 583.567383][T14975] ? sctp_add_bind_addr+0x9f/0x3a0 [ 583.567402][T14975] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 583.567424][T14975] __should_failslab+0x121/0x190 [ 583.567444][T14975] should_failslab+0x9/0x14 [ 583.567464][T14975] kmem_cache_alloc_trace+0x4b/0x790 [ 583.592809][T14975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.592827][T14975] ? __ipv6_addr_type+0x219/0x32d [ 583.592843][T14975] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 583.592859][T14975] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 583.592877][T14975] sctp_add_bind_addr+0x9f/0x3a0 [ 583.592898][T14975] sctp_copy_local_addr_list+0x385/0x530 [ 583.592916][T14975] ? sctp_defaults_init+0xcb0/0xcb0 [ 583.592939][T14975] ? _get_random_bytes+0x1b2/0x430 [ 583.604202][T14975] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 583.604222][T14975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.604244][T14975] sctp_copy_one_addr+0x5f/0x170 [ 583.604259][T14975] ? sctp_copy_one_addr+0x5f/0x170 [ 583.604277][T14975] sctp_bind_addr_copy+0xfc/0x2c8 [ 583.604301][T14975] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 583.604320][T14975] sctp_connect_new_asoc+0x178/0x5a0 [ 583.604341][T14975] ? security_sctp_bind_connect+0x93/0xc0 [ 583.621288][T14975] sctp_sendmsg+0x13a0/0x1f10 [ 583.621319][T14975] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 583.621337][T14975] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 583.621353][T14975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 583.621370][T14975] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 583.621386][T14975] ? tomoyo_socket_bind_permission+0x360/0x360 [ 583.621415][T14975] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 583.723006][T14975] inet_sendmsg+0x9e/0xe0 [ 583.727334][T14975] ? inet_send_prepare+0x4e0/0x4e0 [ 583.732460][T14975] sock_sendmsg+0xd7/0x130 [ 583.736873][T14975] ____sys_sendmsg+0x358/0x880 [ 583.741737][T14975] ? kernel_sendmsg+0x50/0x50 [ 583.746423][T14975] ? __fget+0x35d/0x550 [ 583.750578][T14975] ? find_held_lock+0x35/0x130 [ 583.755338][T14975] ___sys_sendmsg+0x100/0x170 [ 583.760010][T14975] ? sendmsg_copy_msghdr+0x70/0x70 [ 583.765107][T14975] ? __kasan_check_read+0x11/0x20 [ 583.770120][T14975] ? __fget+0x37f/0x550 [ 583.774267][T14975] ? ksys_dup3+0x3e0/0x3e0 [ 583.778668][T14975] ? find_held_lock+0x35/0x130 [ 583.783419][T14975] ? get_pid_task+0x11d/0x210 [ 583.788082][T14975] ? __fget_light+0x1a9/0x230 [ 583.792756][T14975] ? __fdget+0x1b/0x20 [ 583.796808][T14975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 583.803029][T14975] ? sockfd_lookup_light+0xcb/0x180 [ 583.808214][T14975] __sys_sendmmsg+0x1bf/0x4d0 [ 583.812885][T14975] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 583.817925][T14975] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 583.824163][T14975] ? fput_many+0x12c/0x1a0 [ 583.828570][T14975] ? fput+0x1b/0x20 [ 583.832368][T14975] ? ksys_write+0x1cf/0x290 [ 583.836864][T14975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.842309][T14975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 583.847753][T14975] ? do_syscall_64+0x26/0x790 [ 583.852427][T14975] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.858476][T14975] ? do_syscall_64+0x26/0x790 [ 583.863151][T14975] __x64_sys_sendmmsg+0x9d/0x100 [ 583.868074][T14975] do_syscall_64+0xfa/0x790 [ 583.873002][T14975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.878879][T14975] RIP: 0033:0x45a919 [ 583.882759][T14975] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.903041][T14975] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 583.911436][T14975] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 583.919403][T14975] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 583.927358][T14975] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 583.935313][T14975] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 583.943268][T14975] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:26:01 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) vmsplice(r1, &(0x7f00000015c0)=[{&(0x7f0000000000)="40cd580dd2265133d6615b01b0c7864326a3d9cbd89584323a733a2ecd1102d8f8d06ee6182ad7f8d5076cd30c2d96519339b6cb534c5f1c33f0e575006113c42487be34936cf3cb6dc95af34b902da5821d23737f14718ae2675be3713e6cedb4596c9d582ec8507f306b9dfc5e5742433cd77ffafed8412031164f5b5aedd1042232e7613fad357e203cfe001762b3be5706fa6dbc1173c2f3a3e7908e646363f77db04da4dbe2", 0xa8}, {&(0x7f0000000180)="ec88f9703a618edcde2346845d2f92cfe0df8b55f3e74fe8dbb2dbcc8805f19082d8e8c1b5eac342bebffefd9678b86e7adb4275fe6639230d41d7f8901a7efbc4cb1d1f5d148aeab145e622cf77a505dab06b4284a4596038ad323c5d8752537dc0f597cf1f21fe6a2a6bddf18276bfe7fec406a0f1b2a862f9c875b1518fc9f3263a085b2555b55c1ce70783b6f5ed1bd87f21d7e8b80f7c89285c3b02a912dd8af236a90d65416971532bcfcccfa4dcc453902febd6240d77983890ff", 0xbe}, {&(0x7f00000002c0)="6e1f10169a920cd79f473e4ddac7dd961996d8917154819495fdb812e9d52505471cf4bf715c91510f8b13e771a2c21404acf81998a3bd22d1f08edaece424670074d5638168a7cf2455cd3da9ba699b2dbe86f182923f0ce3dc1021e69559e3a94d137a38295cb78cc55536a8fef7729e7c9f7c67de524e5b5293ee159081a0afe8ef5f6cc16a75d404b29514922e0e1295330bed007d66c404204ecf82ace5c7dd45c8d401cf77e264d85c17c2ee140a309493facdd42917d0e2af46ca70f23f49288eed23c73cdfc49d2fbfc0ac6c3f495487ea", 0xd5}, {&(0x7f00000003c0)="726770053b8a5d207d170f921f1489d05dccc8e8e41bae30d6749b767765731490c387023027d055a44a96b7d2c5a2fda2fcca73033a0cd0e670f709e60979250176401354479ae9c4afe86bca281fd4e1f41aec03cf4b26665ae01947309124bd025680b1cb950da431527a37bb173c36437a704147c795a56d618abced05fffeeca54c6d145865fa8401c92e5a123a0bbc1d3053fce5b43d971e179d6b11bdf63afad456e5fdf889002f5dd36ed8bf0a6dc555e2b878122e144b5256ea71b819b0e6b8c6d27fb70783cf949ac9dfa0ac486250e19f638b701dd12c17bcdd8153aeecde4ea844c6fccce67f563d8b942814675b", 0xf4}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000000c0)="3f39b91d2c156596078669f73a6404dd37e7f76b1531d53a7100e2e931350fc031c9cc699dcc3311cd0eb7333c2bfaaafac8da7c8791758e1778ae0bd47fd6d7167f4cf4fbc854af92aa42b32c115d4c6f12a4313a4167eb7105c6253459e59ead1fb84294a5c9d269b2ee45631e19a073c5d0c908e1a04f", 0x78}, {&(0x7f00000014c0)="baf59f6a0be8c07db61fac2c1a54615605a25303fbb367af67aca4fca75d958336ad66255fa528df2c78ccf72d6713e02bf68850cfb9795d9a000b924c32760651d626abf7594f7eb1eba4ae1cd007d53751a53b4d9168d07a3f3f5660e4a7372856a0f76f53a612244c75755cf0faf2a1f9b24947b87dd8078f26c1529f298223092390dfedb1cf82d207f82ce47c0b92588ab2339d75eff158f5a5b57ab3584bce60516f7ed44972402313f2c53b0245cbbf8cb8ec2801e9b6d314216e797c8f645f2d951678181b4476e3d17aa07cf45debeffe84185f36c5a4cb035d", 0xde}], 0x7, 0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:01 executing program 0 (fault-call:3 fault-nth:40): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='?\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800030000000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7ffd, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x5, 0x8}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[], 0x2) [ 585.183264][T15001] FAULT_INJECTION: forcing a failure. [ 585.183264][T15001] name failslab, interval 1, probability 0, space 0, times 0 [ 585.197368][T14999] FAT-fs (loop5): bogus number of reserved sectors [ 585.210775][T15001] CPU: 0 PID: 15001 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 585.219484][T15001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.229549][T15001] Call Trace: [ 585.232867][T15001] dump_stack+0x197/0x210 [ 585.237233][T15001] should_fail.cold+0xa/0x15 [ 585.241852][T15001] ? fault_create_debugfs_attr+0x180/0x180 [ 585.247680][T15001] ? sctp_add_bind_addr+0x9f/0x3a0 [ 585.252806][T15001] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 585.258424][T15001] __should_failslab+0x121/0x190 [ 585.263391][T15001] should_failslab+0x9/0x14 [ 585.265748][T14999] FAT-fs (loop5): Can't find a valid FAT filesystem [ 585.267901][T15001] kmem_cache_alloc_trace+0x4b/0x790 [ 585.267922][T15001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.267944][T15001] ? __ipv6_addr_type+0x219/0x32d [ 585.291083][T15001] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 585.297176][T15001] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 585.297198][T15001] sctp_add_bind_addr+0x9f/0x3a0 [ 585.297220][T15001] sctp_copy_local_addr_list+0x385/0x530 [ 585.297244][T15001] ? sctp_defaults_init+0xcb0/0xcb0 [ 585.318750][T15001] ? _get_random_bytes+0x1b2/0x430 [ 585.323884][T15001] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 585.329870][T15001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.336135][T15001] sctp_copy_one_addr+0x5f/0x170 [ 585.341089][T15001] ? sctp_copy_one_addr+0x5f/0x170 [ 585.346219][T15001] sctp_bind_addr_copy+0xfc/0x2c8 [ 585.351267][T15001] sctp_assoc_set_bind_addr_from_ep+0x168/0x1c0 [ 585.357523][T15001] sctp_connect_new_asoc+0x178/0x5a0 [ 585.362819][T15001] ? security_sctp_bind_connect+0x93/0xc0 [ 585.368556][T15001] sctp_sendmsg+0x13a0/0x1f10 [ 585.373287][T15001] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 585.379200][T15001] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 585.385109][T15001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 585.391366][T15001] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 585.397809][T15001] ? tomoyo_socket_bind_permission+0x360/0x360 [ 585.403988][T15001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 585.410235][T15001] inet_sendmsg+0x9e/0xe0 [ 585.414565][T15001] ? inet_send_prepare+0x4e0/0x4e0 [ 585.419689][T15001] sock_sendmsg+0xd7/0x130 [ 585.424113][T15001] ____sys_sendmsg+0x358/0x880 [ 585.428894][T15001] ? kernel_sendmsg+0x50/0x50 [ 585.433570][T15001] ? __fget+0x35d/0x550 [ 585.437738][T15001] ? find_held_lock+0x35/0x130 [ 585.442513][T15001] ___sys_sendmsg+0x100/0x170 [ 585.447201][T15001] ? sendmsg_copy_msghdr+0x70/0x70 [ 585.452309][T15001] ? __kasan_check_read+0x11/0x20 [ 585.457421][T15001] ? __fget+0x37f/0x550 [ 585.461578][T15001] ? ksys_dup3+0x3e0/0x3e0 [ 585.465984][T15001] ? find_held_lock+0x35/0x130 [ 585.470740][T15001] ? get_pid_task+0x11d/0x210 [ 585.475413][T15001] ? __fget_light+0x1a9/0x230 [ 585.480097][T15001] ? __fdget+0x1b/0x20 [ 585.484160][T15001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 585.490390][T15001] ? sockfd_lookup_light+0xcb/0x180 [ 585.495599][T15001] __sys_sendmmsg+0x1bf/0x4d0 [ 585.500286][T15001] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 585.505348][T15001] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 585.511578][T15001] ? fput_many+0x12c/0x1a0 [ 585.515984][T15001] ? fput+0x1b/0x20 [ 585.519791][T15001] ? ksys_write+0x1cf/0x290 [ 585.524302][T15001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 585.529767][T15001] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 585.535223][T15001] ? do_syscall_64+0x26/0x790 [ 585.539903][T15001] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.545969][T15001] ? do_syscall_64+0x26/0x790 [ 585.550643][T15001] __x64_sys_sendmmsg+0x9d/0x100 [ 585.555742][T15001] do_syscall_64+0xfa/0x790 [ 585.560256][T15001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.566158][T15001] RIP: 0033:0x45a919 [ 585.570061][T15001] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 585.589771][T15001] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 585.598296][T15001] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 585.606290][T15001] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 585.614284][T15001] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 585.622376][T15001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:26:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x8b, 0xc0) r2 = dup3(r1, r0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r3, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r4, &(0x7f0000000d00)=""/232, 0xe8) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) r6 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r6, &(0x7f0000000d00)=""/232, 0xe8) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r7, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$KVM_GET_XSAVE(r7, 0x9000aea4, &(0x7f0000002440)) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000000)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 05:26:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fcntl$getown(r5, 0x9) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) getpgrp(r2) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) getpgrp(r7) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) r9 = syz_open_procfs(0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r9, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r9, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$inet6_dccp_buf(r9, 0x21, 0xc, &(0x7f0000000100)="77b793092c453f79a7e1cee6280f4ec2a4ac329f949d64832770c944930119d56f3f63325b732b7a828f0bb959fca04830600a6723ba1662791e211af603ea57a5b4a106cfec10f5fd78801415a0e06d8c47ae033b13651fd54a257ede6becdd1528369b3d8e5753b83f8e59724f1feedb5f246def3ec3e4923e01d823297ce77532b34614cfb17b47af", 0x8a) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 585.630353][T15001] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:02 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:26:02 executing program 5: mq_unlink(&(0x7f00000000c0)='system.') syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8040000000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0x101400) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'system.', '\x00'}) 05:26:02 executing program 0 (fault-call:3 fault-nth:41): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r4, &(0x7f0000000d00)=""/232, 0xe8) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r3, 0x481d7d1d09fb8ecc, 0x0, 0x25dfdbfc, {0x9}}, 0x3c}, 0x1, 0x0, 0x0, 0x4c810}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:02 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) write$fb(r1, &(0x7f0000000000)="04c6d7c2c8834cfbe983f393963d20a70f1467fff9c8c23c2ce59135320ee7ed975a42ed34", 0x25) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 586.199404][T15028] FAULT_INJECTION: forcing a failure. [ 586.199404][T15028] name failslab, interval 1, probability 0, space 0, times 0 [ 586.261684][T15028] CPU: 0 PID: 15028 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 586.270405][T15028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.280479][T15028] Call Trace: [ 586.283790][T15028] dump_stack+0x197/0x210 [ 586.288139][T15028] should_fail.cold+0xa/0x15 [ 586.292747][T15028] ? fault_create_debugfs_attr+0x180/0x180 [ 586.298586][T15028] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 586.304765][T15028] __should_failslab+0x121/0x190 [ 586.309724][T15028] should_failslab+0x9/0x14 [ 586.314253][T15028] kmem_cache_alloc+0x47/0x710 [ 586.319114][T15028] dst_alloc+0x10e/0x200 [ 586.323442][T15028] rt_dst_alloc+0x83/0x440 [ 586.327932][T15028] ip_route_output_key_hash_rcu+0x8d7/0x2d60 [ 586.333927][T15028] ? ip_route_input_noref+0x270/0x270 [ 586.339436][T15028] ? ip_route_output_key_hash+0x161/0x360 [ 586.345171][T15028] ? __kasan_check_read+0x11/0x20 [ 586.350217][T15028] ip_route_output_key_hash+0x1ef/0x360 [ 586.355788][T15028] ? ip_route_output_key_hash_rcu+0x2d60/0x2d60 [ 586.362043][T15028] ? mark_held_locks+0xa4/0xf0 [ 586.366832][T15028] ? trace_hardirqs_on+0x67/0x240 [ 586.371886][T15028] ip_route_output_flow+0x28/0xc0 [ 586.376951][T15028] sctp_v4_get_dst+0x568/0x1470 [ 586.381814][T15028] ? memset+0x32/0x40 [ 586.385821][T15028] ? sctp_v4_copy_addrlist+0x6c0/0x6c0 [ 586.391297][T15028] ? lockdep_init_map+0x1be/0x6d0 [ 586.396344][T15028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 586.402610][T15028] sctp_transport_route+0x12d/0x360 [ 586.407819][T15028] ? sctp_transport_route+0x12d/0x360 [ 586.413225][T15028] sctp_assoc_add_peer+0x5b4/0x1050 [ 586.418453][T15028] sctp_connect_new_asoc+0x1a7/0x5a0 [ 586.423865][T15028] ? security_sctp_bind_connect+0x93/0xc0 [ 586.429612][T15028] sctp_sendmsg+0x13a0/0x1f10 [ 586.434324][T15028] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 586.440361][T15028] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 586.446275][T15028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 586.452535][T15028] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 586.458984][T15028] ? tomoyo_socket_bind_permission+0x360/0x360 [ 586.465171][T15028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 586.471433][T15028] inet_sendmsg+0x9e/0xe0 [ 586.475774][T15028] ? inet_send_prepare+0x4e0/0x4e0 [ 586.480898][T15028] sock_sendmsg+0xd7/0x130 [ 586.485326][T15028] ____sys_sendmsg+0x358/0x880 [ 586.490109][T15028] ? kernel_sendmsg+0x50/0x50 [ 586.494920][T15028] ? __fget+0x35d/0x550 [ 586.494936][T15028] ? find_held_lock+0x35/0x130 [ 586.494961][T15028] ___sys_sendmsg+0x100/0x170 [ 586.494980][T15028] ? sendmsg_copy_msghdr+0x70/0x70 [ 586.494997][T15028] ? __kasan_check_read+0x11/0x20 [ 586.495016][T15028] ? __fget+0x37f/0x550 [ 586.495035][T15028] ? ksys_dup3+0x3e0/0x3e0 [ 586.495047][T15028] ? find_held_lock+0x35/0x130 [ 586.495063][T15028] ? get_pid_task+0x11d/0x210 [ 586.495080][T15028] ? __fget_light+0x1a9/0x230 [ 586.495094][T15028] ? __fdget+0x1b/0x20 [ 586.495109][T15028] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 586.495122][T15028] ? sockfd_lookup_light+0xcb/0x180 [ 586.495142][T15028] __sys_sendmmsg+0x1bf/0x4d0 [ 586.504045][T15028] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 586.504081][T15028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 586.504097][T15028] ? fput_many+0x12c/0x1a0 [ 586.504111][T15028] ? fput+0x1b/0x20 [ 586.504130][T15028] ? ksys_write+0x1cf/0x290 [ 586.585652][T15028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 586.591114][T15028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 586.596630][T15028] ? do_syscall_64+0x26/0x790 [ 586.601287][T15028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.607441][T15028] ? do_syscall_64+0x26/0x790 [ 586.612218][T15028] __x64_sys_sendmmsg+0x9d/0x100 [ 586.617345][T15028] do_syscall_64+0xfa/0x790 [ 586.621855][T15028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.627743][T15028] RIP: 0033:0x45a919 [ 586.631633][T15028] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 586.651415][T15028] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 586.659923][T15028] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 586.667891][T15028] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 586.675859][T15028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 586.683829][T15028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 586.691817][T15028] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:26:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x8e, &(0x7f0000000100)="f784a3e74d1f27758243ef294b41b878a6a7997f6ccc6d5fb82d50bcf38daae3b89d73cb7e5ddc01221dda9ecabcfa5c922c5e1a6fdb821be34705a24d545453bf9ca961e05d6fe5238a8e2e2895402a5ff28e79580e72cd1c0efe05bb9a06c63cdf4a6dbbc3041daaa902afd80b1fbbc53887847243b17ad2696afa8fe05e5a30b18adfa1c3acf4e0ae18d624be"}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x16, @ipv6=@ipv4={[], [], @loopback}}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x111400, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x306a4753ba2af374, &(0x7f00000006c0)={@local, @remote, 0x0}, &(0x7f0000000700)=0xc) sendto$packet(r2, &(0x7f00000005c0)="c651f554b315222a1a6e279319864ba1dcf12f2530d81b9e7d546d365772f461ef4bd91a7cde6e837b6b7b63df32359ac75583f5a8ac0c6087b0b2a99de901215db381025cdb52e83f66a9f529afe5a24bf4bf81257ab92b29f72dfdd8a87ee94f2f3c99d068622a7899e2aeb681ab79200c2a64feb18616652482c8be71a07cbe27c4bfbff0d29845872354138eb1f691ece1b7847f31b166e1b438e75b50daa7c45f9dd39deb895d34fc72c32447ec7c19e040b7525cde57bc497623b5cb1cfcf204100a02fdeda89e31bfec00ee824cef9d7b4c3d4c8e6969db8548be0dcce969", 0xe2, 0x22049842, &(0x7f0000000740)={0x11, 0x17, r5, 0x1, 0x1, 0x6, @random="f0dd89311fd5"}, 0x14) setuid(r4) r6 = getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000240)="d591b43dca4b300a92bbfed2ac3f1218a460b762a4bc45ecd89a54fac8ae45a787d330842f3f2c5fcb8fed15f075cac7a79fb8fe236f8aad0d02b5b3067f", 0x3e}, {&(0x7f0000000500)="3ae8885da68889f9deec2fd6fcc4d3f9439b1cc38e1a042cffe4ab1dbbd973e29c1b3162cf9863ec18dbacd254cd5ffb8f68dc69befdc95122a5509ce1da3a7c563b7180bc76ba91f5f80ec842037de3dd4eb37b78878dd1758e966b608d7b677e696858ed7d3a9ed36e68dce7f116f82be87a40e577fa7a5f4e3d40935b17368208d0ddfe58b5b8966007d353abd79039d7bb17082287afc9ab432ad3f88df78cb06a83c121eca040aae003f9318a149a01c632dd8f29bb2d145a49", 0xbc}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)}, {&(0x7f0000000440)}], 0x7, &(0x7f0000000a00), 0xd6, 0x4800c}, 0x80) r7 = getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000780), 0x0, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}], 0x20, 0x4800c}, 0x80) r8 = getegid() getgroups(0xa, &(0x7f0000000080)=[0x0, 0x0, 0xee01, 0xee00, 0xee00, r6, 0xee01, r7, r8, 0xffffffffffffffff]) geteuid() r9 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r9, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r9, 0x5418, &(0x7f0000000280)=0x1a0) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) 05:26:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000080)="70da6a13ec8e02755d9ba3a7dc20a1913b94cacc4fa3cc7579f642347c180dd9864ca9ba2064e5b3f6e347161f0246b42d671a169af9e42be7d0731a82a18c97261bbcf58d129b3d3838d10ff6c6a1f87e5698082bb27376ccba3bbe1262865835e182166fb03b6022c506774de83d4299a5a340cd82d07423", 0x79}, {&(0x7f0000000180)="44e93ec709972d8210dba0782d0e3341365a17744a3fa47199cfe6b9d1a803a4e0f510ddf065423736bdd2938259002c60d100e6bc1592f4e89905d9fea03d5b7b12fa89317a4f", 0x47}], 0x3, 0x2) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:26:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 05:26:04 executing program 0 (fault-call:3 fault-nth:42): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 588.248570][T15059] FAULT_INJECTION: forcing a failure. [ 588.248570][T15059] name failslab, interval 1, probability 0, space 0, times 0 [ 588.273422][T15059] CPU: 0 PID: 15059 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 588.282264][T15059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.292328][T15059] Call Trace: [ 588.295636][T15059] dump_stack+0x197/0x210 [ 588.299989][T15059] should_fail.cold+0xa/0x15 [ 588.304603][T15059] ? fault_create_debugfs_attr+0x180/0x180 [ 588.310427][T15059] ? ___might_sleep+0x163/0x2c0 [ 588.315301][T15059] __should_failslab+0x121/0x190 [ 588.320257][T15059] should_failslab+0x9/0x14 [ 588.322231][T15064] IPVS: Unknown mcast interface: syzkaller1 [ 588.324768][T15059] kmem_cache_alloc_trace+0x2d3/0x790 [ 588.324786][T15059] ? sctp_copy_one_addr+0x5f/0x170 [ 588.324806][T15059] ? sctp_copy_one_addr+0x67/0x170 [ 588.346294][T15059] sctp_transport_new+0x91/0x680 [ 588.351251][T15059] sctp_assoc_add_peer+0x223/0x1050 [ 588.356474][T15059] sctp_connect_new_asoc+0x1a7/0x5a0 [ 588.361778][T15059] ? security_sctp_bind_connect+0x93/0xc0 [ 588.364133][T15064] IPVS: Unknown mcast interface: syzkaller1 [ 588.367512][T15059] sctp_sendmsg+0x13a0/0x1f10 [ 588.367538][T15059] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 588.367561][T15059] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 588.389919][T15059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 588.396177][T15059] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 588.402640][T15059] ? tomoyo_socket_bind_permission+0x360/0x360 [ 588.408820][T15059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 588.415082][T15059] inet_sendmsg+0x9e/0xe0 [ 588.419430][T15059] ? inet_send_prepare+0x4e0/0x4e0 [ 588.424589][T15059] sock_sendmsg+0xd7/0x130 [ 588.429017][T15059] ____sys_sendmsg+0x358/0x880 [ 588.433796][T15059] ? kernel_sendmsg+0x50/0x50 [ 588.438484][T15059] ? __fget+0x35d/0x550 [ 588.442644][T15059] ? find_held_lock+0x35/0x130 05:26:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000000000d337ff440000280003001400020073797a6b616c6c657231000008000300"/54], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:04 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000000)=""/63) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 588.447440][T15059] ___sys_sendmsg+0x100/0x170 [ 588.452136][T15059] ? sendmsg_copy_msghdr+0x70/0x70 [ 588.457263][T15059] ? __kasan_check_read+0x11/0x20 [ 588.462302][T15059] ? __fget+0x37f/0x550 [ 588.466495][T15059] ? ksys_dup3+0x3e0/0x3e0 [ 588.470913][T15059] ? find_held_lock+0x35/0x130 [ 588.475689][T15059] ? get_pid_task+0x11d/0x210 [ 588.480409][T15059] ? __fget_light+0x1a9/0x230 [ 588.485101][T15059] ? __fdget+0x1b/0x20 [ 588.489189][T15059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 588.495444][T15059] ? sockfd_lookup_light+0xcb/0x180 [ 588.500655][T15059] __sys_sendmmsg+0x1bf/0x4d0 [ 588.505349][T15059] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 588.510412][T15059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 588.516670][T15059] ? fput_many+0x12c/0x1a0 [ 588.521101][T15059] ? fput+0x1b/0x20 [ 588.524950][T15059] ? ksys_write+0x1cf/0x290 [ 588.529474][T15059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 588.534951][T15059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 588.540433][T15059] ? do_syscall_64+0x26/0x790 05:26:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000cf4b47dbe5f420354d64a48c0cc257000008"], 0x3c}}, 0x0) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000d00)=""/232, 0xe8) ioctl$VIDIOC_QBUF(r5, 0xc058560f, &(0x7f0000000000)={0xfff, 0x7, 0x4, 0x800, 0x9, {}, {0x4, 0xc, 0xeb, 0x4, 0x3, 0x8, "a7e34fb8"}, 0xc75, 0x3, @offset=0x1, 0x5, 0x0, 0xffffffffffffffff}) write$cgroup_type(r6, &(0x7f0000000100)='threaded\x00', 0x9) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000140)={[{0x20, 0x8, 0x8, 0x4, 0x0, 0x9, 0x40, 0x7, 0x4, 0x2, 0x2, 0x2, 0x8e}, {0x5, 0xfff, 0xf9, 0x7, 0x2, 0x1, 0x81, 0x2, 0x2, 0x80, 0x0, 0x65, 0xf0}, {0x7fffffff, 0xfff, 0xf9, 0x1f, 0x1, 0x1, 0x6, 0x1f, 0x7f, 0x3, 0x3, 0x89, 0x3}], 0x13a}) wait4(0x0, 0x0, 0x0, 0x0) [ 588.545122][T15059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 588.551202][T15059] ? do_syscall_64+0x26/0x790 [ 588.555915][T15059] __x64_sys_sendmmsg+0x9d/0x100 [ 588.560870][T15059] do_syscall_64+0xfa/0x790 [ 588.565412][T15059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 588.571312][T15059] RIP: 0033:0x45a919 [ 588.575219][T15059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:26:04 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 588.594828][T15059] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 588.603246][T15059] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 588.611232][T15059] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 588.619215][T15059] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 588.627201][T15059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 588.635181][T15059] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x0, &(0x7f0000000000), 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="5153770000000080000000"], 0x0) 05:26:04 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$packet_int(r2, 0x107, 0x3, &(0x7f0000000000)=0x2, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 588.896980][T15097] FAT-fs (loop5): bogus number of reserved sectors [ 588.903714][T15097] FAT-fs (loop5): Can't find a valid FAT filesystem [ 588.980777][T15097] FAT-fs (loop5): bogus number of reserved sectors [ 588.994434][T15097] FAT-fs (loop5): Can't find a valid FAT filesystem 05:26:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:26:07 executing program 0 (fault-call:3 fault-nth:43): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:07 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x7, 0x1, 0x1, 'queue1\x00', 0x80000000}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4000000000000000, 0x484000) getsockname$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x185000, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000200)) 05:26:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x18, r4, 0x531, 0xfffffffe, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x94, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x0, 0x8, 0x4}]}]}, 0x18}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x5) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:26:07 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0x32b) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 591.346674][T15114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 591.361753][T15121] FAULT_INJECTION: forcing a failure. [ 591.361753][T15121] name failslab, interval 1, probability 0, space 0, times 0 [ 591.374750][T15121] CPU: 0 PID: 15121 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 591.383446][T15121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.393793][T15121] Call Trace: [ 591.397105][T15121] dump_stack+0x197/0x210 [ 591.401461][T15121] should_fail.cold+0xa/0x15 [ 591.406081][T15121] ? fault_create_debugfs_attr+0x180/0x180 [ 591.411937][T15121] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 591.418119][T15121] __should_failslab+0x121/0x190 [ 591.423081][T15121] should_failslab+0x9/0x14 [ 591.427689][T15121] kmem_cache_alloc+0x47/0x710 [ 591.432488][T15121] dst_alloc+0x10e/0x200 [ 591.435383][T15111] cgroup: fork rejected by pids controller in /syz1 [ 591.436747][T15121] rt_dst_alloc+0x83/0x440 [ 591.436770][T15121] ip_route_output_key_hash_rcu+0x8d7/0x2d60 [ 591.436786][T15121] ? mark_held_locks+0xa4/0xf0 [ 591.436809][T15121] ? assoc_array_insert+0x12f3/0x2de0 [ 591.464928][T15121] ? ip_route_input_noref+0x270/0x270 [ 591.470323][T15121] ? ip_route_output_key_hash+0x161/0x360 [ 591.476058][T15121] ? __kasan_check_read+0x11/0x20 [ 591.481102][T15121] ip_route_output_key_hash+0x1ef/0x360 [ 591.484125][T15128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 05:26:07 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r4 = dup2(r2, r3) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f00000000c0)={0x9, 0x0, 0xffffffff}, 0xc) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000040)=0x6, &(0x7f0000000080)=0x4) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x9d0000, 0x3ff, 0x3, r3, 0x0, &(0x7f0000000040)={0x990a68, 0x20, [], @p_u16=&(0x7f0000000000)=0x4}}) readlinkat(r5, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=""/171, 0xab) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="7423d089ec6b64b6e742ff139bcda5379c854a59d993d0fedaf58562d9bbc831c3573bd6d1455ea25e97c1c81a8453455f31ceaa486371ffe13ed6392548622524b6f6a4e0b938fc039d8b319c99d109e8ad4c62191c0f9a21e7690e57649495ac39c83f15196b99905a39ea87d323472be63567b3648e915aff2405599e34b394f32b13cf34d0b40e0b434d8dc9422fe77a81255cbcb508b4c1384109a1729106f9e15517faf2339800000000000000008f926c9671249e480e2e1ae536ec3f6effd0472cec623e65c28bd0bf36cdc7c9788b9cfacaddae341ece9b2c86df4ea9d8e13d6448f5e003576a36a301bf", @ANYRES16=r4, @ANYBLOB="310500000000000000000900008d349dd5d4a5117a0073647867b611e397461a797a6b616c6c65723100"/54], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r6, 0x6df94a67, &(0x7f0000000300)="c9fcbb53f7522a6f2ebc3a6ed51ad54de16ca8e725671b8d4a89e6b8f6fb5b9af1db71f9df73a356cc9d957e240273b4b8f07ec701ef2c2e98793a4b24be4f349d8982aa95e955e049de63dfaaa9f0f36d360f0e77de0e0c78bfecbcad83486995fcc9f1b48969b9353bb8f3de6fef6cf6e0d03a492de7f4729414dd7d2343a371210bcf69d6fe01ca3f602ae500575c77ea4b48b0132c1da1ca65425ca759b7a90827ae93ee57f76da140817895a92bed1534a0e7a3334aabf692e6fa934ccc140dfaa84123df7e9e3c90fe199a51176b1e3cfbfc60641d9417edf782b5f68bbb8ad05f7897e82d78") [ 591.486657][T15121] ? ip_route_output_key_hash_rcu+0x2d60/0x2d60 [ 591.486674][T15121] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 591.486696][T15121] ? debug_object_active_state+0x28a/0x350 [ 591.513745][T15121] ? trace_hardirqs_on+0x67/0x240 [ 591.518795][T15121] ip_route_output_flow+0x28/0xc0 [ 591.523932][T15121] sctp_v4_get_dst+0x568/0x1470 [ 591.528796][T15121] ? mark_held_locks+0xa4/0xf0 [ 591.533672][T15121] ? __call_rcu+0x2c9/0x740 [ 591.538183][T15121] ? call_rcu+0xb/0x10 [ 591.542258][T15121] ? lockdep_hardirqs_on+0x421/0x5e0 [ 591.547557][T15121] ? sctp_v4_copy_addrlist+0x6c0/0x6c0 [ 591.553050][T15121] sctp_transport_pmtu+0x254/0x480 [ 591.558174][T15121] ? sctp_transport_pmtu+0x254/0x480 [ 591.563479][T15121] sctp_transport_route+0x163/0x360 [ 591.568692][T15121] sctp_assoc_add_peer+0x5b4/0x1050 [ 591.573899][T15121] sctp_connect_new_asoc+0x1a7/0x5a0 [ 591.573917][T15121] ? security_sctp_bind_connect+0x93/0xc0 [ 591.573935][T15121] sctp_sendmsg+0x13a0/0x1f10 [ 591.573958][T15121] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 591.573974][T15121] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 591.573993][T15121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.574009][T15121] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 591.574030][T15121] ? tomoyo_socket_bind_permission+0x360/0x360 [ 591.620276][T15121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 591.626551][T15121] inet_sendmsg+0x9e/0xe0 [ 591.630884][T15121] ? inet_send_prepare+0x4e0/0x4e0 [ 591.630903][T15121] sock_sendmsg+0xd7/0x130 [ 591.630928][T15121] ____sys_sendmsg+0x358/0x880 [ 591.645197][T15121] ? kernel_sendmsg+0x50/0x50 [ 591.649890][T15121] ? __fget+0x35d/0x550 [ 591.654162][T15121] ? find_held_lock+0x35/0x130 [ 591.658955][T15121] ___sys_sendmsg+0x100/0x170 [ 591.663681][T15121] ? sendmsg_copy_msghdr+0x70/0x70 [ 591.668817][T15121] ? __kasan_check_read+0x11/0x20 [ 591.673864][T15121] ? __fget+0x37f/0x550 [ 591.678058][T15121] ? ksys_dup3+0x3e0/0x3e0 [ 591.682484][T15121] ? find_held_lock+0x35/0x130 [ 591.682503][T15121] ? get_pid_task+0x11d/0x210 [ 591.682524][T15121] ? __fget_light+0x1a9/0x230 [ 591.682543][T15121] ? __fdget+0x1b/0x20 [ 591.682559][T15121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 591.682575][T15121] ? sockfd_lookup_light+0xcb/0x180 [ 591.682595][T15121] __sys_sendmmsg+0x1bf/0x4d0 [ 591.682617][T15121] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 591.682651][T15121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 591.728584][T15121] ? fput_many+0x12c/0x1a0 [ 591.733013][T15121] ? fput+0x1b/0x20 [ 591.736837][T15121] ? ksys_write+0x1cf/0x290 [ 591.741361][T15121] ? trace_hardirqs_on_thunk+0x1a/0x1c 05:26:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c657231000000000000080001000000000008000300000000007f9e89f0324d8a1dc08405b8814479357fe535189743c9da7cfbbb897b9c8a0a002d26c81ffb775e3a2e93"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 591.746836][T15121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 591.752314][T15121] ? do_syscall_64+0x26/0x790 [ 591.757041][T15121] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.763116][T15121] ? do_syscall_64+0x26/0x790 [ 591.767830][T15121] __x64_sys_sendmmsg+0x9d/0x100 [ 591.772798][T15121] do_syscall_64+0xfa/0x790 [ 591.777326][T15121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.783365][T15121] RIP: 0033:0x45a919 [ 591.787274][T15121] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.806973][T15121] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 591.806988][T15121] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 591.806996][T15121] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 591.807003][T15121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 591.807011][T15121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 05:26:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'vfat\x00'}, {0x20, 'selinux\\GPL'}, {0x20, 'vfat\x00'}, {0x20, 'vfat\x00'}, {0x20, 'vmnet1.'}, {0x20, 'vfat\x00'}], 0xa, "b6b3d91cf6477ca2cc063f5afe99694d2c6862eccaf0d519d793871facee9ac18860f311200e55d6612c0d09d5910c51c3963ba0c89031ba4cd25acc5d429ae29bb7828791e157418b50577f47e361d0fd33af0f6baa228e1751bc4b7e7bff5ad91166f72b7cbda9247a551e280ef8d80dd06bce82f2d7cf3b6397e1704371507883ea52983bf62e4577a151874cca93b056fa4014a2cac6b3dce9cec952739a26443ab84063daeec4fd63fab1e6849f78fcbb6d21da0ba6a13c6708e836d50065188465c050a4fd5a3622197ad2331a411ae8786362da34e3bfd9c15f50ebacaf0daaa9abc9734fe38ebd3b86cca5d78e8db2f4474b"}, 0x12d) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) 05:26:07 executing program 0 (fault-call:3 fault-nth:44): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) [ 591.807019][T15121] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 591.902414][T15141] FAULT_INJECTION: forcing a failure. [ 591.902414][T15141] name failslab, interval 1, probability 0, space 0, times 0 [ 591.915428][T15141] CPU: 1 PID: 15141 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 591.924114][T15141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.934181][T15141] Call Trace: [ 591.937501][T15141] dump_stack+0x197/0x210 [ 591.941687][T15143] IPVS: Unknown mcast interface: syzkaller1 [ 591.941859][T15141] should_fail.cold+0xa/0x15 [ 591.952329][T15141] ? find_held_lock+0x35/0x130 [ 591.957109][T15141] ? fault_create_debugfs_attr+0x180/0x180 [ 591.962929][T15141] ? __kasan_check_read+0x11/0x20 [ 591.967980][T15141] __should_failslab+0x121/0x190 [ 591.972938][T15141] should_failslab+0x9/0x14 [ 591.977453][T15141] kmem_cache_alloc_node_trace+0x5a/0x750 [ 591.977472][T15141] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 591.977486][T15141] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 591.977507][T15141] __kmalloc_node_track_caller+0x3d/0x70 [ 592.000617][T15141] __kmalloc_reserve.isra.0+0x40/0xf0 [ 592.006003][T15141] __alloc_skb+0x10b/0x5e0 [ 592.006025][T15141] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 592.015967][T15141] ? lockdep_hardirqs_on+0x421/0x5e0 [ 592.015986][T15141] ? sctp_hash_transport+0x179d/0x1db0 [ 592.016011][T15141] sctp_ulpevent_new.constprop.0+0x26/0xa0 [ 592.032532][T15141] sctp_ulpevent_nofity_peer_addr_change+0x166/0xaf0 [ 592.039226][T15141] ? sctp_ulpevent_make_assoc_change+0x970/0x970 [ 592.045582][T15141] ? sctp_v4_to_sk_saddr+0x12/0x90 [ 592.050705][T15141] ? sctp_do_sm.cold+0xdf/0xdf [ 592.055489][T15141] sctp_assoc_add_peer+0xb25/0x1050 [ 592.060721][T15141] sctp_connect_new_asoc+0x1a7/0x5a0 [ 592.066020][T15141] ? security_sctp_bind_connect+0x93/0xc0 [ 592.071760][T15141] sctp_sendmsg+0x13a0/0x1f10 [ 592.076472][T15141] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 592.082642][T15141] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 592.088553][T15141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.094816][T15141] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 592.101249][T15141] ? tomoyo_socket_bind_permission+0x360/0x360 [ 592.107434][T15141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 592.113783][T15141] inet_sendmsg+0x9e/0xe0 [ 592.118129][T15141] ? inet_send_prepare+0x4e0/0x4e0 [ 592.123255][T15141] sock_sendmsg+0xd7/0x130 [ 592.127688][T15141] ____sys_sendmsg+0x358/0x880 [ 592.132462][T15141] ? kernel_sendmsg+0x50/0x50 [ 592.137146][T15141] ? __fget+0x35d/0x550 [ 592.141322][T15141] ? find_held_lock+0x35/0x130 [ 592.146111][T15141] ___sys_sendmsg+0x100/0x170 [ 592.150809][T15141] ? sendmsg_copy_msghdr+0x70/0x70 [ 592.155965][T15141] ? __kasan_check_read+0x11/0x20 [ 592.161009][T15141] ? __fget+0x37f/0x550 [ 592.165196][T15141] ? ksys_dup3+0x3e0/0x3e0 [ 592.169625][T15141] ? find_held_lock+0x35/0x130 [ 592.174412][T15141] ? get_pid_task+0x11d/0x210 [ 592.179234][T15141] ? __fget_light+0x1a9/0x230 [ 592.184025][T15141] ? __fdget+0x1b/0x20 [ 592.188110][T15141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 592.194366][T15141] ? sockfd_lookup_light+0xcb/0x180 [ 592.199574][T15141] __sys_sendmmsg+0x1bf/0x4d0 [ 592.199596][T15141] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 592.199632][T15141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 592.215521][T15141] ? fput_many+0x12c/0x1a0 [ 592.215539][T15141] ? fput+0x1b/0x20 [ 592.215552][T15141] ? ksys_write+0x1cf/0x290 [ 592.215576][T15141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 592.233726][T15141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 592.239204][T15141] ? do_syscall_64+0x26/0x790 [ 592.243892][T15141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:26:07 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(r1, &(0x7f0000000000)={0x2}, 0x8, 0x100800) [ 592.249975][T15141] ? do_syscall_64+0x26/0x790 [ 592.254672][T15141] __x64_sys_sendmmsg+0x9d/0x100 [ 592.259632][T15141] do_syscall_64+0xfa/0x790 [ 592.264962][T15141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.264975][T15141] RIP: 0033:0x45a919 [ 592.264992][T15141] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.265000][T15141] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 592.265015][T15141] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 592.265024][T15141] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 592.265033][T15141] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.265042][T15141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 592.265051][T15141] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:26:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000000)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000240)) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c0000bb941dbd782875c599465d0e7f85c8e7", @ANYRES16=r4, @ANYBLOB="3105000000000000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800030000000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:10 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) getpgrp(0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, r0, 0xd, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000040)=""/112, &(0x7f00000000c0)=0x70) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) clone3(&(0x7f0000000440)={0x2000000, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x35}, &(0x7f00000004c0)=""/148, 0x94, &(0x7f0000000380)=""/186, &(0x7f0000000200)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r0], 0x5}, 0x50) setpriority(0x0, r5, 0x7) 05:26:10 executing program 0 (fault-call:3 fault-nth:45): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="079b307db2ec843769393fe5626cbc1ef82a1d72e614b1b85db0fa968690fc9c48a23782a28482a24006808dde5e60f221e89d2a85526407f19bc1ba666634caabf714af964b46ee44c50b45ac26d1221ec0d8a929f39ac492bf50f2497fc21f6fcbca24498455dc7e28e568d7b47b36c650af4cbe", 0x75, 0x9}, {&(0x7f0000000180)="6c5947b38ad45843dced2acb56ff71b1832d8a541485b0fc610bcade5e47cb9c1534d2c721ec22cc608db67e55b8135ce4c22f24f2f4f0543c494b9e90211a7639", 0xfffffffffffffda8, 0x7}, {&(0x7f0000000200)="7adaa63beea2aef3182e50d8c3424cf5f6ab2b18f632cadc495f9012f903afa8c772723ae5176bcd1ea8266e08060e8918dcc0b72382271899d0385df00e79a97657337f621404bc5deba7aa4966c7a7c259a77a4e7aeb83e0fd33d778c8833a64aa40391d44cedf1e63a1b91c9aac46b021bbf7552147e5a3bd07e0b39238cc41c8d16354e7527493835c7c474ec31beef04adf5892f273a899f1c1f738986c3148a0885f5347b0e55aa0d074452df6325359e7e8d0ec7c", 0xb8, 0xff}, {&(0x7f0000000300)="8a2d412b6b6a87c4f4eb290bcb60a89a5b350e2c26fca56193983477a29d02b8ac8a45ddb920dc020d5f4f84ca119d227fb6c4762dc6e4c7b34522fbc12f53eb1eb98e0fe1999d608b3f54660438e35acc61f205815205ed5842f2a28af628dec4757d8b91590e1601a0f3ede7c8ac0bc12458bf849068898bc9017aaea74af121c5f78c24e8409cff918901ee68afcb90d106b27d551fa5d64f0a847d49878184b9f865fa2a", 0xa6}], 0x810000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000002}, 0x10) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$SNDRV_PCM_IOCTL_FORWARD(0xffffffffffffffff, 0x40084149, &(0x7f0000000000)=0x80000001) ioctl$TCSBRK(r1, 0x5409, 0x3) 05:26:10 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 594.427796][T15271] FAULT_INJECTION: forcing a failure. [ 594.427796][T15271] name failslab, interval 1, probability 0, space 0, times 0 [ 594.481105][T15271] CPU: 0 PID: 15271 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 594.489837][T15271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.499941][T15271] Call Trace: [ 594.503382][T15271] dump_stack+0x197/0x210 [ 594.507740][T15271] should_fail.cold+0xa/0x15 [ 594.512346][T15271] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 594.518284][T15271] ? fault_create_debugfs_attr+0x180/0x180 [ 594.524477][T15271] ? trace_hardirqs_on+0x67/0x240 [ 594.529551][T15271] __should_failslab+0x121/0x190 [ 594.534509][T15271] should_failslab+0x9/0x14 [ 594.539027][T15271] kmem_cache_alloc_node+0x56/0x740 [ 594.544242][T15271] ? sctp_ulpq_tail_event+0x11d/0xb90 [ 594.549640][T15271] ? lockdep_init_map+0x1be/0x6d0 [ 594.554680][T15271] __alloc_skb+0xd5/0x5e0 [ 594.559025][T15271] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 594.564596][T15271] sctp_ulpevent_new.constprop.0+0x26/0xa0 [ 594.570427][T15271] sctp_ulpevent_nofity_peer_addr_change+0x166/0xaf0 [ 594.577119][T15271] ? sctp_ulpevent_nofity_peer_addr_change+0x83a/0xaf0 [ 594.583986][T15271] ? sctp_ulpevent_make_assoc_change+0x970/0x970 [ 594.590350][T15271] sctp_assoc_set_primary+0x74/0x320 [ 594.595739][T15271] sctp_assoc_add_peer+0xdd9/0x1050 [ 594.600958][T15271] sctp_connect_new_asoc+0x1a7/0x5a0 [ 594.606263][T15271] ? security_sctp_bind_connect+0x93/0xc0 [ 594.612002][T15271] sctp_sendmsg+0x13a0/0x1f10 [ 594.616961][T15271] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 594.623227][T15271] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 594.629140][T15271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 594.635405][T15271] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 594.641835][T15271] ? tomoyo_socket_bind_permission+0x360/0x360 [ 594.641872][T15271] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.641892][T15271] inet_sendmsg+0x9e/0xe0 [ 594.641906][T15271] ? inet_send_prepare+0x4e0/0x4e0 [ 594.641921][T15271] sock_sendmsg+0xd7/0x130 [ 594.641942][T15271] ____sys_sendmsg+0x358/0x880 [ 594.654594][T15271] ? kernel_sendmsg+0x50/0x50 [ 594.654612][T15271] ? __fget+0x35d/0x550 05:26:10 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000000)="aa92d72c2ad0fbd52d2a171770dea7225259b26f221d4768c06c7a0fd73cc3837fd9bb9a0972da1be9b74667c87f3f1b9de8b0df5dec704c1c98c65f118299b8e8918471abd8b9ac15d5c7e6", 0x4c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 594.654629][T15271] ? find_held_lock+0x35/0x130 [ 594.654653][T15271] ___sys_sendmsg+0x100/0x170 [ 594.654672][T15271] ? sendmsg_copy_msghdr+0x70/0x70 [ 594.654687][T15271] ? __kasan_check_read+0x11/0x20 [ 594.654705][T15271] ? __fget+0x37f/0x550 [ 594.669574][T15265] FAT-fs (loop5): bogus logical sector size 51979 [ 594.673288][T15271] ? ksys_dup3+0x3e0/0x3e0 [ 594.673306][T15271] ? find_held_lock+0x35/0x130 [ 594.673325][T15271] ? get_pid_task+0x11d/0x210 [ 594.673342][T15271] ? __fget_light+0x1a9/0x230 05:26:10 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000000d00)=""/232, 0xe8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/104], 0x68) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 594.673357][T15271] ? __fdget+0x1b/0x20 [ 594.673379][T15271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 594.678192][T15265] FAT-fs (loop5): Can't find a valid FAT filesystem [ 594.682201][T15271] ? sockfd_lookup_light+0xcb/0x180 [ 594.682223][T15271] __sys_sendmmsg+0x1bf/0x4d0 [ 594.682248][T15271] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 594.682283][T15271] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.682304][T15271] ? fput_many+0x12c/0x1a0 [ 594.773284][T15271] ? fput+0x1b/0x20 [ 594.777125][T15271] ? ksys_write+0x1cf/0x290 [ 594.781691][T15271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 594.787157][T15271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 594.792660][T15271] ? do_syscall_64+0x26/0x790 [ 594.797326][T15271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.803505][T15271] ? do_syscall_64+0x26/0x790 [ 594.808291][T15271] __x64_sys_sendmmsg+0x9d/0x100 [ 594.813226][T15271] do_syscall_64+0xfa/0x790 [ 594.817724][T15271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.823620][T15271] RIP: 0033:0x45a919 [ 594.828060][T15271] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.847665][T15271] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 594.856095][T15271] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 594.864067][T15271] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 594.872023][T15271] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 594.879997][T15271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 594.887973][T15271] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:10 executing program 0 (fault-call:3 fault-nth:46): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RRENAME(r1, &(0x7f0000000100)={0x7, 0x15, 0x2}, 0x7) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x4, 0x0, 0x0, 0x7ff}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000180)={0x7, r5}) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="310500000000ee1da3070d3e425239190000000009000000280003001400020073797a6b616c6c65723100000000000008000100000000000800070000000000cf5985798df533941d36d60a1c8e71f86e00000000"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r6 = dup3(r0, 0xffffffffffffffff, 0x40000) ioctl$EVIOCGSND(r6, 0x8040451a, &(0x7f0000000200)=""/176) 05:26:11 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 595.108093][T15391] FAULT_INJECTION: forcing a failure. [ 595.108093][T15391] name failslab, interval 1, probability 0, space 0, times 0 [ 595.143966][T15392] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 595.145462][T15391] CPU: 1 PID: 15391 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 595.162101][T15391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.172201][T15391] Call Trace: [ 595.175531][T15391] dump_stack+0x197/0x210 [ 595.179898][T15391] should_fail.cold+0xa/0x15 [ 595.185124][T15391] ? fault_create_debugfs_attr+0x180/0x180 [ 595.190949][T15391] ? __kasan_check_read+0x11/0x20 [ 595.196003][T15391] __should_failslab+0x121/0x190 [ 595.200965][T15391] should_failslab+0x9/0x14 [ 595.205492][T15391] kmem_cache_alloc_node_trace+0x5a/0x750 [ 595.211235][T15391] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 595.217240][T15391] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 595.223070][T15391] __kmalloc_node_track_caller+0x3d/0x70 [ 595.228754][T15391] __kmalloc_reserve.isra.0+0x40/0xf0 [ 595.234161][T15391] __alloc_skb+0x10b/0x5e0 [ 595.238595][T15391] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 595.244183][T15391] sctp_ulpevent_new.constprop.0+0x26/0xa0 [ 595.250136][T15391] sctp_ulpevent_nofity_peer_addr_change+0x166/0xaf0 05:26:11 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 595.256832][T15391] ? sctp_ulpevent_nofity_peer_addr_change+0x83a/0xaf0 [ 595.263818][T15391] ? sctp_ulpevent_make_assoc_change+0x970/0x970 [ 595.270189][T15391] sctp_assoc_set_primary+0x74/0x320 [ 595.275499][T15391] sctp_assoc_add_peer+0xdd9/0x1050 [ 595.280831][T15391] sctp_connect_new_asoc+0x1a7/0x5a0 [ 595.286141][T15391] ? security_sctp_bind_connect+0x93/0xc0 [ 595.291881][T15391] sctp_sendmsg+0x13a0/0x1f10 [ 595.296583][T15391] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 595.302496][T15391] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 595.308416][T15391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 595.314704][T15391] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 595.321149][T15391] ? tomoyo_socket_bind_permission+0x360/0x360 [ 595.327339][T15391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 595.333602][T15391] inet_sendmsg+0x9e/0xe0 [ 595.337950][T15391] ? inet_send_prepare+0x4e0/0x4e0 [ 595.343083][T15391] sock_sendmsg+0xd7/0x130 [ 595.347580][T15391] ____sys_sendmsg+0x358/0x880 [ 595.352379][T15391] ? kernel_sendmsg+0x50/0x50 [ 595.357071][T15391] ? __fget+0x35d/0x550 [ 595.361241][T15391] ? find_held_lock+0x35/0x130 [ 595.366030][T15391] ___sys_sendmsg+0x100/0x170 [ 595.370730][T15391] ? sendmsg_copy_msghdr+0x70/0x70 [ 595.375852][T15391] ? __kasan_check_read+0x11/0x20 [ 595.380892][T15391] ? __fget+0x37f/0x550 [ 595.385062][T15391] ? ksys_dup3+0x3e0/0x3e0 [ 595.389489][T15391] ? find_held_lock+0x35/0x130 [ 595.394268][T15391] ? get_pid_task+0x11d/0x210 [ 595.398961][T15391] ? __fget_light+0x1a9/0x230 [ 595.403657][T15391] ? __fdget+0x1b/0x20 [ 595.407922][T15391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 595.414210][T15391] ? sockfd_lookup_light+0xcb/0x180 [ 595.419451][T15391] __sys_sendmmsg+0x1bf/0x4d0 [ 595.424165][T15391] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 595.429213][T15391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 595.435612][T15391] ? fput_many+0x12c/0x1a0 [ 595.440018][T15391] ? fput+0x1b/0x20 [ 595.443815][T15391] ? ksys_write+0x1cf/0x290 [ 595.448309][T15391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 595.453761][T15391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 595.459224][T15391] ? do_syscall_64+0x26/0x790 [ 595.463938][T15391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.470016][T15391] ? do_syscall_64+0x26/0x790 [ 595.474712][T15391] __x64_sys_sendmmsg+0x9d/0x100 [ 595.479667][T15391] do_syscall_64+0xfa/0x790 [ 595.484193][T15391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.490096][T15391] RIP: 0033:0x45a919 [ 595.494005][T15391] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 595.513732][T15391] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 595.513747][T15391] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 595.513756][T15391] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 595.513764][T15391] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 595.513773][T15391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 595.513781][T15391] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:26:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000240)={0x2, &(0x7f0000000180)=[{}, {}]}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r5, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x3c}}, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r6, 0x5418, &(0x7f0000000280)=0x1a0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r6, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{r7, r8/1000+10000}, {0x0, 0x7530}}) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:13 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x28200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:13 executing program 5: socket(0xa, 0xb, 0x80) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x204200, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x18}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000180)={{r2, r3/1000+10000}, 0x11, 0x3, 0x80}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) open_by_handle_at(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="09000c000100000051"], 0x0) 05:26:13 executing program 0 (fault-call:3 fault-nth:47): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:13 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 597.533975][T15515] FAULT_INJECTION: forcing a failure. [ 597.533975][T15515] name failslab, interval 1, probability 0, space 0, times 0 [ 597.570592][T15516] IPVS: Unknown mcast interface: syzkaller1 [ 597.601158][T15515] CPU: 1 PID: 15515 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 597.609915][T15515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.619985][T15515] Call Trace: [ 597.623292][T15515] dump_stack+0x197/0x210 [ 597.627643][T15515] should_fail.cold+0xa/0x15 [ 597.632259][T15515] ? fault_create_debugfs_attr+0x180/0x180 [ 597.638087][T15515] ? __kasan_check_read+0x11/0x20 [ 597.643163][T15515] __should_failslab+0x121/0x190 05:26:13 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f0000000d00)=""/232, 0xe8) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000000)={@null=' \x00', 0xb, 'hwsim0\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 597.648124][T15515] should_failslab+0x9/0x14 [ 597.652643][T15515] kmem_cache_alloc_node_trace+0x5a/0x750 [ 597.658376][T15515] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 597.664370][T15515] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 597.670201][T15515] __kmalloc_node_track_caller+0x3d/0x70 [ 597.675852][T15515] __kmalloc_reserve.isra.0+0x40/0xf0 [ 597.681244][T15515] __alloc_skb+0x10b/0x5e0 [ 597.685682][T15515] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 597.691258][T15515] sctp_ulpevent_new.constprop.0+0x26/0xa0 05:26:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000280)=0x1a0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x6, 0x1, 0x20, 0x5263292c}, 0x14) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r6, 0x4b3b, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r6, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @adiantum, 0x3, [], "84a0d7d3eff53df34fa622acf60b6776"}) sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="31050003000100008000092100002800c261f4847c557c000f007367f2dd38d15efec7adef48fb000000080001000010000008000300"], 0x3c}}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 597.697089][T15515] sctp_ulpevent_nofity_peer_addr_change+0x166/0xaf0 [ 597.703785][T15515] ? sctp_ulpevent_nofity_peer_addr_change+0x83a/0xaf0 [ 597.710656][T15515] ? sctp_ulpevent_make_assoc_change+0x970/0x970 [ 597.717039][T15515] sctp_assoc_set_primary+0x74/0x320 [ 597.722344][T15515] sctp_assoc_add_peer+0xdd9/0x1050 [ 597.727569][T15515] sctp_connect_new_asoc+0x1a7/0x5a0 [ 597.732872][T15515] ? security_sctp_bind_connect+0x93/0xc0 [ 597.738612][T15515] sctp_sendmsg+0x13a0/0x1f10 [ 597.743319][T15515] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 597.749229][T15515] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 597.755143][T15515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 597.761407][T15515] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 597.767847][T15515] ? tomoyo_socket_bind_permission+0x360/0x360 [ 597.774029][T15515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 597.774048][T15515] inet_sendmsg+0x9e/0xe0 [ 597.774069][T15515] ? inet_send_prepare+0x4e0/0x4e0 [ 597.789745][T15515] sock_sendmsg+0xd7/0x130 [ 597.794189][T15515] ____sys_sendmsg+0x358/0x880 [ 597.798981][T15515] ? kernel_sendmsg+0x50/0x50 [ 597.803677][T15515] ? __fget+0x35d/0x550 [ 597.807847][T15515] ? find_held_lock+0x35/0x130 [ 597.812642][T15515] ___sys_sendmsg+0x100/0x170 [ 597.817362][T15515] ? sendmsg_copy_msghdr+0x70/0x70 [ 597.822516][T15515] ? __kasan_check_read+0x11/0x20 [ 597.827552][T15515] ? __fget+0x37f/0x550 [ 597.831715][T15515] ? ksys_dup3+0x3e0/0x3e0 [ 597.836138][T15515] ? find_held_lock+0x35/0x130 [ 597.840916][T15515] ? get_pid_task+0x11d/0x210 [ 597.845613][T15515] ? __fget_light+0x1a9/0x230 [ 597.850304][T15515] ? __fdget+0x1b/0x20 [ 597.854388][T15515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 597.860647][T15515] ? sockfd_lookup_light+0xcb/0x180 [ 597.865868][T15515] __sys_sendmmsg+0x1bf/0x4d0 [ 597.870567][T15515] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 597.875628][T15515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 597.881912][T15515] ? fput_many+0x12c/0x1a0 [ 597.886348][T15515] ? fput+0x1b/0x20 [ 597.890168][T15515] ? ksys_write+0x1cf/0x290 [ 597.894684][T15515] ? trace_hardirqs_on_thunk+0x1a/0x1c 05:26:13 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x90b481, 0x0) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000007c0)=ANY=[@ANYBLOB="02009dae3d0f1f0000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000002c0)={r3, 0x1}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000780)={r3, 0x800}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r7, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000280)=0x1a0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r7, 0x12, 0x2, &(0x7f0000000180)=""/116, &(0x7f0000000100)=0x74) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@ipv4={[], [], @loopback}, @in6=@empty, 0x4e23, 0x6321, 0x4e20, 0xc01, 0xa, 0x60, 0x84b5d798b2ff0336, 0x16, 0x0, r8}, {0x9, 0x3ff, 0x2, 0x0, 0x4, 0x1, 0x1, 0xff}, {0x3, 0x1, 0x8, 0x8}, 0x8000, 0x6e6bb6, 0x0, 0xe0ab1c30b1c9ac64, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0xff}, 0xa, @in6=@empty, 0x3506, 0x0, 0x3, 0x4, 0x9, 0x75e, 0x4}}, 0xe8) ioctl$KIOCSOUND(r7, 0x4b2f, 0x65eee541) ioctl$GIO_FONT(r4, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x202000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r9, 0x0, 0x60, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000070000000400000010040000e8000000e8000000f801000028030000280300002803000004000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"/1040], 0x460) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 597.900155][T15515] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 597.905633][T15515] ? do_syscall_64+0x26/0x790 [ 597.910329][T15515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.916423][T15515] ? do_syscall_64+0x26/0x790 [ 597.921124][T15515] __x64_sys_sendmmsg+0x9d/0x100 [ 597.926082][T15515] do_syscall_64+0xfa/0x790 [ 597.930606][T15515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.936508][T15515] RIP: 0033:0x45a919 05:26:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="310500000000000000000900000028000300140098020073797a00011300000000080003000000002000"/54], 0x3c}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 597.940419][T15515] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.960126][T15515] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 597.968558][T15515] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 597.976540][T15515] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 597.984551][T15515] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 597.992565][T15515] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 598.000544][T15515] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 05:26:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r1, &(0x7f0000000d00)=""/232, 0xe8) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}) [ 598.084169][T15739] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 05:26:14 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000000)={0xffff0001, 0xe8, @name="235f11b541fe88f91f064b7921314590f3299b59265c9a31af91d48a36d497e4"}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000280)=0x1a0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 05:26:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0xaca56700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x3c, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0xfffffe3d}]}]}, 0x3c}}, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000280)=0x1a0) ioctl$EVIOCRMFF(r5, 0x40044581, &(0x7f0000000040)=0x75c) rt_sigsuspend(&(0x7f0000000000)={0xb7}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 05:26:16 executing program 0 (fault-call:3 fault-nth:48): r0 = socket$inet6(0xa, 0x80003, 0x7e) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="a0", 0x1}], 0x1, &(0x7f0000000540)=[@dstaddrv4={0x18, 0x84, 0x7, @dev}, @init={0x18, 0x84, 0x0, {0x2003}}], 0x30}], 0x1, 0x0) 05:26:16 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100)=0x5, 0x4) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) r5 = socket$can_bcm(0x1d, 0x2, 0x2) r6 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x1800) poll(&(0x7f00000000c0)=[{r3, 0x2000}, {r4, 0x400}, {r5, 0x8000}, {r6, 0x8000}, {r2, 0x8005}, {r1, 0x4000}, {r1}], 0x7, 0x6) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x9, 0x1, 'Q'}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 05:26:16 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf"], 0x4) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) fchdir(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) pipe(&(0x7f00000001c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r2, 0x4b3b, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), 0x0) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r3, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 600.536866][T15862] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 600.589779][T15865] FAULT_INJECTION: forcing a failure. [ 600.589779][T15865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 600.661585][T15865] CPU: 0 PID: 15865 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 600.670310][T15865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.680391][T15865] Call Trace: [ 600.683711][T15865] dump_stack+0x197/0x210 [ 600.688067][T15865] should_fail.cold+0xa/0x15 [ 600.692711][T15865] ? fault_create_debugfs_attr+0x180/0x180 [ 600.698629][T15865] ? ___might_sleep+0x163/0x2c0 [ 600.703614][T15865] should_fail_alloc_page+0x50/0x60 [ 600.708833][T15865] __alloc_pages_nodemask+0x1a1/0x910 [ 600.714234][T15865] ? __alloc_pages_slowpath+0x2920/0x2920 [ 600.720000][T15865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 600.726270][T15865] alloc_pages_current+0x107/0x210 [ 600.731410][T15865] __get_free_pages+0xc/0x40 [ 600.736035][T15865] __genradix_ptr_alloc+0x218/0x3a0 [ 600.741381][T15865] __genradix_prealloc+0x5b/0x80 [ 600.746342][T15865] sctp_stream_alloc_out.part.0+0x55/0xd0 [ 600.752084][T15865] sctp_stream_init+0x27d/0x3d0 [ 600.756962][T15865] sctp_connect_new_asoc+0x4bd/0x5a0 [ 600.762275][T15865] ? security_sctp_bind_connect+0x93/0xc0 [ 600.768112][T15865] sctp_sendmsg+0x13a0/0x1f10 [ 600.772830][T15865] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 600.778770][T15865] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 600.784682][T15865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 600.790948][T15865] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 600.797386][T15865] ? tomoyo_socket_bind_permission+0x360/0x360 [ 600.803588][T15865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 600.809857][T15865] inet_sendmsg+0x9e/0xe0 [ 600.814216][T15865] ? inet_send_prepare+0x4e0/0x4e0 [ 600.819352][T15865] sock_sendmsg+0xd7/0x130 [ 600.823840][T15865] ____sys_sendmsg+0x358/0x880 [ 600.828624][T15865] ? kernel_sendmsg+0x50/0x50 [ 600.833460][T15865] ? __fget+0x35d/0x550 [ 600.837628][T15865] ? find_held_lock+0x35/0x130 [ 600.842420][T15865] ___sys_sendmsg+0x100/0x170 [ 600.847118][T15865] ? sendmsg_copy_msghdr+0x70/0x70 [ 600.852241][T15865] ? __kasan_check_read+0x11/0x20 [ 600.857282][T15865] ? __fget+0x37f/0x550 [ 600.861469][T15865] ? ksys_dup3+0x3e0/0x3e0 [ 600.865903][T15865] ? find_held_lock+0x35/0x130 [ 600.870692][T15865] ? get_pid_task+0x11d/0x210 [ 600.875392][T15865] ? __fget_light+0x1a9/0x230 [ 600.880081][T15865] ? __fdget+0x1b/0x20 [ 600.884169][T15865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 600.890462][T15865] ? sockfd_lookup_light+0xcb/0x180 [ 600.895687][T15865] __sys_sendmmsg+0x1bf/0x4d0 [ 600.900402][T15865] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 600.905474][T15865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 600.911741][T15865] ? fput_many+0x12c/0x1a0 [ 600.916182][T15865] ? fput+0x1b/0x20 [ 600.920009][T15865] ? ksys_write+0x1cf/0x290 [ 600.924537][T15865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.930017][T15865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 600.935498][T15865] ? do_syscall_64+0x26/0x790 [ 600.940196][T15865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.946289][T15865] ? do_syscall_64+0x26/0x790 [ 600.951078][T15865] __x64_sys_sendmmsg+0x9d/0x100 [ 600.956039][T15865] do_syscall_64+0xfa/0x790 05:26:16 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r1, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) 05:26:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}]}) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) inotify_init1(0x80000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000280)=0x1a0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x10}, @in6=@mcast2, 0x4e21, 0x3f, 0x4e23, 0x0, 0xa, 0x0, 0x874934ec0a938f71, 0x21, 0x0, r6}, {0x3, 0x1, 0x9, 0x1000, 0x4, 0x2, 0x200, 0x1}, {0x8001, 0x2, 0x0, 0x1}, 0x4, 0x6e6bbb, 0x0, 0x1, 0x1}, {{@in=@remote, 0x4d6, 0x33}, 0x0, @in6=@ipv4={[], [], @empty}, 0x3505, 0x4, 0x1, 0x9, 0xfffffffc, 0x8, 0xfffffffe}}, 0xe8) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000280)=0x1a0) r7 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r7, 0xc0145401, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x1}) ioctl$TIOCMSET(r7, 0x5418, &(0x7f0000000280)=0x1a0) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGETMODE(r8, 0x4b3b, 0x0) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000440)={0x6, 0xb, 0x4, 0x80000000, 0x80000001, {}, {0xb, 0x0, 0x0, 0x0, 0x1, 0xa2, "849d12c0"}, 0x1000, 0x4, @planes=&(0x7f0000000400)={0x1, 0x4, @userptr=0x8, 0xff}, 0xffff, 0x0, r8}) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000000c0)={0xa20000, 0x6, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9909cc, 0x80000001, [], @value64=0x1c3}}) ioctl$LOOP_GET_STATUS64(r9, 0x4c05, &(0x7f0000000180)) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) 05:26:16 executing program 2: openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setuid(0x0) ioctl$GIO_FONT(r0, 0x5608, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r2, 0x700, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8000004) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r3, &(0x7f0000000d00)=""/232, 0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000200)={0x5, 0x0, 0x1, {0x6}, 0x59eb, 0x10000}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 600.960566][T15865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.966474][T15865] RIP: 0033:0x45a919 [ 600.970394][T15865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.990014][T15865] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 600.998702][T15865] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 601.006688][T15865] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 601.014775][T15865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 601.022761][T15865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 601.030757][T15865] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 601.042074][T15865] kasan: CONFIG_KASAN_INLINE enabled [ 601.047473][T15865] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 601.055883][T15865] general protection fault: 0000 [#1] PREEMPT SMP KASAN 05:26:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffffffffffef7}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) bind$isdn(r0, &(0x7f0000000200)={0x22, 0xff, 0x83, 0x0, 0x7f}, 0x6) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0900db000100000051"], 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='\x00'], &(0x7f00000001c0)=[&(0x7f0000000180)='{&*@.)eth0mime_type\\\xf6\x00']) 05:26:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x28, r4, 0x531, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x4bacc8612413810c}]}]}, 0x28}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 601.062834][T15865] CPU: 0 PID: 15865 Comm: syz-executor.0 Not tainted 5.5.0-rc3-syzkaller #0 [ 601.071532][T15865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.081610][T15865] RIP: 0010:sctp_stream_free+0xe4/0x180 [ 601.087175][T15865] Code: 07 48 89 d1 48 69 d2 aa 00 00 00 48 c1 e1 0c 48 29 d0 48 8d 04 40 48 8d 34 c1 e8 77 fd 53 fc 48 8d 78 08 48 89 fa 48 c1 ea 03 <42> 80 3c 32 00 75 6f 48 8b 78 08 e8 4c e8 76 fa 41 0f b6 45 00 84 [ 601.106786][T15865] RSP: 0018:ffffc900089ef698 EFLAGS: 00010202 [ 601.113817][T15865] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90001f71000 [ 601.121799][T15865] RDX: 0000000000000001 RSI: ffffffff838fad60 RDI: 0000000000000008 [ 601.129784][T15865] RBP: ffffc900089ef6d0 R08: ffff888060c78080 R09: ffffed1015d0703d [ 601.137771][T15865] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: ffff88805268c6e8 [ 601.145752][T15865] R13: ffffed100a4d18df R14: dffffc0000000000 R15: ffff88808742c040 [ 601.153732][T15865] FS: 00007fba54624700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 601.162692][T15865] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 601.165720][ T4282] kobject: 'loop1' (00000000f9bbca9b): kobject_uevent_env [ 601.169373][T15865] CR2: 0000000000000000 CR3: 00000000913b2000 CR4: 00000000001406f0 [ 601.176989][ T4282] kobject: 'loop1' (00000000f9bbca9b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 601.184548][T15865] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 601.184556][T15865] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 601.184562][T15865] Call Trace: [ 601.184587][T15865] sctp_association_free+0x235/0x7e0 [ 601.184606][T15865] sctp_connect_new_asoc+0x3cd/0x5a0 [ 601.184620][T15865] ? security_sctp_bind_connect+0x93/0xc0 [ 601.184640][T15865] sctp_sendmsg+0x13a0/0x1f10 [ 601.234925][T15865] ? __sctp_setsockopt_connectx+0x1a0/0x1a0 [ 601.240840][T15865] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 601.246757][T15865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 601.253017][T15865] ? tomoyo_socket_sendmsg_permission+0x147/0x3cb [ 601.259447][T15865] ? tomoyo_socket_bind_permission+0x360/0x360 [ 601.265636][T15865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 601.271367][ T4282] kobject: 'loop1' (00000000f9bbca9b): kobject_uevent_env [ 601.271913][T15865] inet_sendmsg+0x9e/0xe0 [ 601.283865][T15865] ? inet_send_prepare+0x4e0/0x4e0 [ 601.286328][ T4282] kobject: 'loop1' (00000000f9bbca9b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 601.289949][T15865] sock_sendmsg+0xd7/0x130 [ 601.289968][T15865] ____sys_sendmsg+0x358/0x880 [ 601.289982][T15865] ? kernel_sendmsg+0x50/0x50 [ 601.290003][T15865] ? __fget+0x35d/0x550 [ 601.318737][T15865] ? find_held_lock+0x35/0x130 [ 601.323520][T15865] ___sys_sendmsg+0x100/0x170 [ 601.328215][T15865] ? sendmsg_copy_msghdr+0x70/0x70 [ 601.333343][T15865] ? __kasan_check_read+0x11/0x20 [ 601.338369][T15865] ? __fget+0x37f/0x550 [ 601.342521][T15865] ? ksys_dup3+0x3e0/0x3e0 [ 601.347352][T15865] ? find_held_lock+0x35/0x130 [ 601.352100][T15865] ? get_pid_task+0x11d/0x210 [ 601.356803][T15865] ? __fget_light+0x1a9/0x230 [ 601.361639][T15865] ? __fdget+0x1b/0x20 [ 601.365710][T15865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 601.372074][T15865] ? sockfd_lookup_light+0xcb/0x180 [ 601.377326][T15865] __sys_sendmmsg+0x1bf/0x4d0 [ 601.381994][T15865] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 601.387010][T15865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 601.393236][T15865] ? fput_many+0x12c/0x1a0 [ 601.397648][T15865] ? fput+0x1b/0x20 [ 601.401440][T15865] ? ksys_write+0x1cf/0x290 [ 601.405928][T15865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.411368][T15865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 601.416807][T15865] ? do_syscall_64+0x26/0x790 [ 601.421466][T15865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.427512][T15865] ? do_syscall_64+0x26/0x790 [ 601.432172][T15865] __x64_sys_sendmmsg+0x9d/0x100 [ 601.437093][T15865] do_syscall_64+0xfa/0x790 [ 601.441593][T15865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 601.447464][T15865] RIP: 0033:0x45a919 [ 601.451345][T15865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 601.470934][T15865] RSP: 002b:00007fba54623c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 601.479336][T15865] RAX: ffffffffffffffda RBX: 00007fba54623c90 RCX: 000000000045a919 [ 601.487296][T15865] RDX: 0000000000000001 RSI: 0000000020000700 RDI: 0000000000000004 [ 601.495310][T15865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 601.503309][T15865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba546246d4 [ 601.511271][T15865] R13: 00000000004c929a R14: 00000000004e1000 R15: 0000000000000005 [ 601.519231][T15865] Modules linked in: [ 601.526698][T15865] ---[ end trace c2c77b944df6bef0 ]--- [ 601.532240][T15865] RIP: 0010:sctp_stream_free+0xe4/0x180 [ 601.537788][T15865] Code: 07 48 89 d1 48 69 d2 aa 00 00 00 48 c1 e1 0c 48 29 d0 48 8d 04 40 48 8d 34 c1 e8 77 fd 53 fc 48 8d 78 08 48 89 fa 48 c1 ea 03 <42> 80 3c 32 00 75 6f 48 8b 78 08 e8 4c e8 76 fa 41 0f b6 45 00 84 [ 601.557432][T15865] RSP: 0018:ffffc900089ef698 EFLAGS: 00010202 [ 601.563548][T15865] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90001f71000 [ 601.571586][T15865] RDX: 0000000000000001 RSI: ffffffff838fad60 RDI: 0000000000000008 [ 601.579624][T15865] RBP: ffffc900089ef6d0 R08: ffff888060c78080 R09: ffffed1015d0703d [ 601.587689][T15865] R10: ffffed1015d0703c R11: ffff8880ae8381e3 R12: ffff88805268c6e8 [ 601.595781][T15865] R13: ffffed100a4d18df R14: dffffc0000000000 R15: ffff88808742c040 [ 601.603797][T15865] FS: 00007fba54624700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 601.612942][T15865] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 601.615613][ T9964] kobject: 'loop5' (0000000090ab71ed): kobject_uevent_env [ 601.619539][T15865] CR2: 0000001b31925000 CR3: 00000000913b2000 CR4: 00000000001406f0 [ 601.630183][ T9964] kobject: 'loop5' (0000000090ab71ed): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 601.635781][T15865] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 601.653414][T15865] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 601.661468][T15865] Kernel panic - not syncing: Fatal exception [ 601.669082][T15865] Kernel Offset: disabled [ 601.673416][T15865] Rebooting in 86400 seconds..