48 [ 579.566794][T10879] RSP: 002b:00007fab90f740c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:42:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe4030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:02 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0xf202010f98a20bb1}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) (async, rerun: 64) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NL802154_CMD_GET_WPAN_PHY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, r4, 0xc4728cda14e1f7dd, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) (async, rerun: 64) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(r9, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) (async) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, r8, 0xc4728cda14e1f7dd, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}}, 0x0) r12 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r13, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) (async, rerun: 64) r15 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$NL802154_CMD_GET_WPAN_PHY(r15, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, r12, 0xc4728cda14e1f7dd, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r14}]}, 0x1c}}, 0x0) (async) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000600)={0x1b4, r4, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r14}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_KEY={0x180, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x44, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}]}, @NL802154_KEY_ATTR_ID={0x108, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x54, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x7}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xffff}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x38, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0x5555555555550281}}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x44, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x9}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_MODE={0x8}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x9b}, @NL802154_KEY_ATTR_ID={0x28, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}]}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044055}, 0x4) r16 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/603]}, 0x2d3) 03:42:02 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 14) [ 579.575219][T10879] RAX: ffffffffffffffda RBX: 00007fab91d10f80 RCX: 00007fab91bf1ae9 [ 579.583234][T10879] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 579.591269][T10879] RBP: 00007fab90f74120 R08: 0000000000000000 R09: 0000000000000000 [ 579.599263][T10879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 579.607289][T10879] R13: 000000000000000b R14: 00007fab91d10f80 R15: 00007ffece464c98 [ 579.615278][T10879] 03:42:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:02 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 1) 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 579.685845][T10901] macvtap7: entered allmulticast mode [ 579.693536][T10901] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 579.708170][T10901] team0: Device macvtap7 is already an upper device of the team interface [ 579.711742][T10908] FAULT_INJECTION: forcing a failure. [ 579.711742][T10908] name fail_usercopy, interval 1, probability 0, space 0, times 0 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000029000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 579.729792][T10908] CPU: 0 PID: 10908 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 579.740230][T10908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 579.750408][T10908] Call Trace: [ 579.753702][T10908] [ 579.756641][T10908] dump_stack_lvl+0xda/0x130 [ 579.761299][T10908] dump_stack+0x15/0x20 [ 579.765489][T10908] should_fail_ex+0x21f/0x230 [ 579.770212][T10908] should_fail+0xb/0x10 [ 579.774470][T10908] should_fail_usercopy+0x1a/0x20 [ 579.779557][T10908] _copy_from_user+0x1e/0xd0 03:42:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000088000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 579.784240][T10908] copy_msghdr_from_user+0x54/0x2a0 [ 579.789483][T10908] __sys_sendmsg+0x17d/0x270 [ 579.794142][T10908] __x64_sys_sendmsg+0x46/0x50 [ 579.798989][T10908] do_syscall_64+0x41/0xc0 [ 579.803442][T10908] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 579.809367][T10908] RIP: 0033:0x7f0cd1f70ae9 [ 579.813812][T10908] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 579.833519][T10908] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 579.841996][T10908] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 579.849995][T10908] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 579.858062][T10908] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 579.866039][T10908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.874057][T10908] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 579.882105][T10908] [ 579.900085][T10902] FAULT_INJECTION: forcing a failure. [ 579.900085][T10902] name failslab, interval 1, probability 0, space 0, times 0 [ 579.912850][T10902] CPU: 0 PID: 10902 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 579.923281][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 579.933439][T10902] Call Trace: [ 579.936718][T10902] [ 579.939649][T10902] dump_stack_lvl+0xda/0x130 [ 579.944301][T10902] dump_stack+0x15/0x20 [ 579.948492][T10902] should_fail_ex+0x21f/0x230 [ 579.953178][T10902] ? device_add+0x88/0x8b0 [ 579.957674][T10902] __should_failslab+0x92/0xa0 [ 579.962553][T10902] should_failslab+0x9/0x20 [ 579.967058][T10902] slab_pre_alloc_hook+0x38/0x180 [ 579.972154][T10902] ? device_add+0x88/0x8b0 [ 579.976584][T10902] __kmem_cache_alloc_node+0x48/0x1d0 [ 579.982018][T10902] ? device_add+0x88/0x8b0 [ 579.986450][T10902] kmalloc_trace+0x2a/0xa0 [ 579.990907][T10902] device_add+0x88/0x8b0 [ 579.995212][T10902] netdev_register_kobject+0xfc/0x230 [ 580.000621][T10902] register_netdevice+0x680/0xb40 [ 580.005714][T10902] ? rb_erase+0x117/0x6a0 [ 580.010175][T10902] ? validate_linkmsg+0x511/0x590 [ 580.015231][T10902] ipvlan_link_new+0x295/0x5c0 [ 580.020107][T10902] ? ipvlan_multicast_enqueue+0x270/0x270 [ 580.025940][T10902] rtnl_newlink+0xee5/0x1670 [ 580.030621][T10902] ? cgroup_rstat_updated+0x8c/0x1c0 [ 580.036063][T10902] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 580.042368][T10902] ? _raw_spin_unlock+0x26/0x40 [ 580.047223][T10902] ? __mutex_lock+0x21c/0x8d0 [ 580.051916][T10902] ? rtnl_setlink+0x300/0x300 [ 580.056748][T10902] rtnetlink_rcv_msg+0x807/0x8c0 [ 580.061711][T10902] ? __rcu_read_unlock+0x4d/0x70 [ 580.066666][T10902] ? __rcu_read_unlock+0x4d/0x70 [ 580.071644][T10902] ? __refill_stock+0x7f/0xb0 [ 580.076334][T10902] ? cgroup_rstat_updated+0x8c/0x1c0 [ 580.081652][T10902] ? cgroup_rstat_updated+0x8c/0x1c0 [ 580.086977][T10902] ? try_charge_memcg+0xaff/0xd30 [ 580.092144][T10902] ? page_counter_cancel+0xcc/0x1c0 [ 580.097355][T10902] ? xas_load+0x3ae/0x3c0 [ 580.101701][T10902] ? skb_release_data+0x53d/0x550 [ 580.106852][T10902] ? kmem_cache_free+0x1db/0x3a0 [ 580.111795][T10902] ? __kfree_skb+0x104/0x140 [ 580.116412][T10902] ? nlmon_xmit+0x4b/0x60 [ 580.120761][T10902] ? __kfree_skb+0x104/0x140 [ 580.125387][T10902] ? consume_skb+0x57/0x180 [ 580.129971][T10902] ? nlmon_xmit+0x4b/0x60 [ 580.134313][T10902] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 580.139632][T10902] ? __dev_queue_xmit+0xad9/0x1e20 [ 580.144778][T10902] ? ref_tracker_free+0x3a1/0x400 [ 580.150002][T10902] netlink_rcv_skb+0x126/0x220 [ 580.154891][T10902] ? rtnetlink_bind+0x60/0x60 [ 580.159590][T10902] rtnetlink_rcv+0x1c/0x20 [ 580.164044][T10902] netlink_unicast+0x589/0x650 [ 580.168939][T10902] netlink_sendmsg+0x66e/0x770 [ 580.173801][T10902] ? netlink_getsockopt+0x3e0/0x3e0 [ 580.179089][T10902] ____sys_sendmsg+0x37c/0x4d0 [ 580.183905][T10902] __sys_sendmsg+0x1e9/0x270 [ 580.188536][T10902] __x64_sys_sendmsg+0x46/0x50 [ 580.193414][T10902] do_syscall_64+0x41/0xc0 [ 580.197848][T10902] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 580.203873][T10902] RIP: 0033:0x7f205db7fae9 [ 580.208290][T10902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 580.227946][T10902] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 580.236427][T10902] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 03:42:03 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 2) 03:42:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x5, 0x20000100, 0x20000130, 0x20000280, 0x4], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) 03:42:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe5020000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:03 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 15) [ 580.244407][T10902] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 580.252497][T10902] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 580.260472][T10902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 580.268567][T10902] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 580.276586][T10902] [ 580.286248][T10904] macvtap17: entered allmulticast mode [ 580.294370][T10904] 8021q: adding VLAN 0 to HW filter on device macvtap17 [ 580.344162][T10924] FAULT_INJECTION: forcing a failure. [ 580.344162][T10924] name failslab, interval 1, probability 0, space 0, times 0 [ 580.349834][T10928] FAULT_INJECTION: forcing a failure. [ 580.349834][T10928] name failslab, interval 1, probability 0, space 0, times 0 [ 580.356840][T10924] CPU: 0 PID: 10924 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 580.380107][T10924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 580.390225][T10924] Call Trace: [ 580.393509][T10924] [ 580.396444][T10924] dump_stack_lvl+0xda/0x130 [ 580.401075][T10924] dump_stack+0x15/0x20 [ 580.405254][T10924] should_fail_ex+0x21f/0x230 [ 580.410014][T10924] __should_failslab+0x92/0xa0 [ 580.414812][T10924] should_failslab+0x9/0x20 [ 580.419341][T10924] slab_pre_alloc_hook+0x38/0x180 [ 580.424390][T10924] kmem_cache_alloc_node+0x54/0x240 [ 580.429765][T10924] ? __alloc_skb+0x109/0x2e0 [ 580.434380][T10924] __alloc_skb+0x109/0x2e0 [ 580.438866][T10924] netlink_sendmsg+0x483/0x770 [ 580.443661][T10924] ? netlink_getsockopt+0x3e0/0x3e0 [ 580.448885][T10924] ____sys_sendmsg+0x37c/0x4d0 [ 580.453674][T10924] __sys_sendmsg+0x1e9/0x270 [ 580.458305][T10924] __x64_sys_sendmsg+0x46/0x50 [ 580.463177][T10924] do_syscall_64+0x41/0xc0 [ 580.467688][T10924] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 580.473623][T10924] RIP: 0033:0x7f0cd1f70ae9 [ 580.478045][T10924] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 580.497665][T10924] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 580.506098][T10924] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 580.514079][T10924] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 580.522055][T10924] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 580.530076][T10924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.538053][T10924] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 580.546039][T10924] [ 580.549065][T10928] CPU: 1 PID: 10928 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 580.559513][T10928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 580.569595][T10928] Call Trace: [ 580.572893][T10928] [ 580.575842][T10928] dump_stack_lvl+0xda/0x130 [ 580.580500][T10928] dump_stack+0x15/0x20 [ 580.584842][T10928] should_fail_ex+0x21f/0x230 [ 580.589556][T10928] ? kstrdup_const+0x3e/0x50 [ 580.594185][T10928] __should_failslab+0x92/0xa0 [ 580.599081][T10928] should_failslab+0x9/0x20 [ 580.603612][T10928] slab_pre_alloc_hook+0x38/0x180 [ 580.608723][T10928] ? kstrdup_const+0x3e/0x50 [ 580.613349][T10928] __kmem_cache_alloc_node+0x48/0x1d0 [ 580.618789][T10928] ? kstrdup_const+0x3e/0x50 [ 580.623474][T10928] __kmalloc_node_track_caller+0x96/0x1a0 [ 580.629225][T10928] kstrdup+0x3a/0x70 [ 580.633150][T10928] kstrdup_const+0x3e/0x50 [ 580.637732][T10928] __kernfs_new_node+0x41/0x380 03:42:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:03 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 3) 03:42:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000110000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:03 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x5, 0x20000100, 0x20000130, 0x20000280, 0x4], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) 03:42:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:03 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 4) [ 580.642678][T10928] ? make_kgid+0x115/0x310 [ 580.647137][T10928] ? net_ns_get_ownership+0xae/0xd0 [ 580.652429][T10928] ? net_namespace+0x20/0x20 [ 580.657133][T10928] kernfs_create_dir_ns+0x62/0x150 [ 580.662405][T10928] sysfs_create_dir_ns+0xd7/0x1d0 [ 580.667489][T10928] kobject_add_internal+0x3eb/0x730 [ 580.672771][T10928] kobject_add+0xdc/0x150 [ 580.677136][T10928] ? kobject_get+0x95/0xc0 [ 580.681675][T10928] ? device_add+0x2ea/0x8b0 [ 580.686231][T10928] device_add+0x2f8/0x8b0 [ 580.687643][T10946] FAULT_INJECTION: forcing a failure. [ 580.687643][T10946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.690614][T10928] netdev_register_kobject+0xfc/0x230 [ 580.709161][T10928] register_netdevice+0x680/0xb40 [ 580.714237][T10928] ? rb_erase+0x117/0x6a0 [ 580.718650][T10928] ? validate_linkmsg+0x511/0x590 [ 580.723733][T10928] ipvlan_link_new+0x295/0x5c0 [ 580.728506][T10928] ? ipvlan_multicast_enqueue+0x270/0x270 [ 580.734234][T10928] rtnl_newlink+0xee5/0x1670 [ 580.738898][T10928] ? security_capable+0x5e/0x80 [ 580.743797][T10928] ? ns_capable+0x7c/0xb0 [ 580.748141][T10928] ? rtnl_setlink+0x300/0x300 [ 580.752907][T10928] rtnetlink_rcv_msg+0x807/0x8c0 [ 580.757913][T10928] ? put_dec_trunc8+0x10e/0x130 [ 580.762784][T10928] ? put_dec+0xcd/0xe0 [ 580.766880][T10928] ? number+0x98d/0xa90 [ 580.771056][T10928] ? xas_load+0x3ae/0x3c0 [ 580.775392][T10928] ? skb_release_data+0x53d/0x550 [ 580.780503][T10928] ? kmem_cache_free+0x1db/0x3a0 [ 580.785463][T10928] ? __kfree_skb+0x104/0x140 [ 580.790082][T10928] ? nlmon_xmit+0x4b/0x60 [ 580.794541][T10928] ? __kfree_skb+0x104/0x140 [ 580.799181][T10928] ? consume_skb+0x57/0x180 [ 580.803728][T10928] ? nlmon_xmit+0x4b/0x60 [ 580.808163][T10928] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 580.813466][T10928] ? __dev_queue_xmit+0xad9/0x1e20 [ 580.818589][T10928] ? ref_tracker_free+0x3a1/0x400 [ 580.823633][T10928] netlink_rcv_skb+0x126/0x220 [ 580.828416][T10928] ? rtnetlink_bind+0x60/0x60 [ 580.833195][T10928] rtnetlink_rcv+0x1c/0x20 [ 580.837713][T10928] netlink_unicast+0x589/0x650 [ 580.842509][T10928] netlink_sendmsg+0x66e/0x770 [ 580.847293][T10928] ? netlink_getsockopt+0x3e0/0x3e0 [ 580.852585][T10928] ____sys_sendmsg+0x37c/0x4d0 [ 580.857380][T10928] __sys_sendmsg+0x1e9/0x270 [ 580.862002][T10928] __x64_sys_sendmsg+0x46/0x50 [ 580.866839][T10928] do_syscall_64+0x41/0xc0 [ 580.871278][T10928] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 580.877195][T10928] RIP: 0033:0x7f205db7fae9 [ 580.881616][T10928] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 580.901356][T10928] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 580.909814][T10928] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 580.917838][T10928] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 580.925817][T10928] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 580.933808][T10928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 580.941784][T10928] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 580.949768][T10928] [ 580.952792][T10946] CPU: 0 PID: 10946 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 580.953146][T10928] kobject: kobject_add_internal failed for ipvlan12 (error: -12 parent: net) [ 580.963244][T10946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 580.963261][T10946] Call Trace: [ 580.963268][T10946] [ 580.963276][T10946] dump_stack_lvl+0xda/0x130 [ 580.963318][T10946] dump_stack+0x15/0x20 [ 580.963401][T10946] should_fail_ex+0x21f/0x230 [ 580.963429][T10946] should_fail+0xb/0x10 [ 580.963459][T10946] should_fail_usercopy+0x1a/0x20 [ 580.963486][T10946] _copy_from_iter+0xd8/0xa90 [ 580.963512][T10946] ? kmalloc_reserve+0xfb/0x190 [ 580.963565][T10946] ? __build_skb_around+0x196/0x1f0 [ 580.963602][T10946] ? __virt_addr_valid+0x16a/0x1b0 [ 580.997377][T10946] ? __check_object_size+0x364/0x510 [ 581.036496][T10946] netlink_sendmsg+0x53c/0x770 [ 581.038949][T10936] macvtap18: entered allmulticast mode 03:42:04 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x5, 0x20000100, 0x20000130, 0x20000280, 0x4], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000001100000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 581.041290][T10946] ? netlink_getsockopt+0x3e0/0x3e0 [ 581.049717][T10936] 8021q: adding VLAN 0 to HW filter on device macvtap18 [ 581.051945][T10946] ____sys_sendmsg+0x37c/0x4d0 [ 581.063693][T10946] __sys_sendmsg+0x1e9/0x270 [ 581.068337][T10946] __x64_sys_sendmsg+0x46/0x50 [ 581.073154][T10946] do_syscall_64+0x41/0xc0 [ 581.077661][T10946] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 581.083587][T10946] RIP: 0033:0x7f0cd1f70ae9 [ 581.088024][T10946] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 581.107661][T10946] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.116091][T10946] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 581.124154][T10946] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 581.132180][T10946] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 03:42:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe8020000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:04 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 16) 03:42:04 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 5) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000800000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000008000000800000000076657468305f090e5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000eff40000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c757374657200000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004492000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa00c5a962f3fe76579700000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/587]}, 0x2c3) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x7f, 0x4, 0x3, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback, 0x40, 0x700, 0x1000, 0x7ff00000}}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000007c0)=0x3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000180)=@bridge_getlink={0x1e4, 0x12, 0x300, 0x70bd29, 0x2310, {0x7, 0x0, 0x0, r2, 0x8000, 0x2}, [@IFLA_PHYS_SWITCH_ID={0x11, 0x24, "a442d34f7f68e4e31fd47ea65d"}, @IFLA_VF_PORTS={0x1b0, 0x18, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_PROFILE={0x7, 0x2, '!-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7fff}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3c4fbdd463bcb3442ad87208ed5f9773"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7193fe9c68c564fecc093fa30fd90c5a"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d826bb4c23928de74087f1f2bad60604"}]}, {0x88, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d9b4687cf766978cc82b63c1faeabcb8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "781376abafebd7fdc5c1dfda3b6833db"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a9ff3eb84d8a201148eb0cf3b3b7759c"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3718bb33960e5beb4fcb163f533059ba"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "298161e3b89d7b670007d6f73c288201"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "5826f52ae02da31d675a9955f967c870"}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7276bdbe243b6bd523b9031338a6e0c9"}, @IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1e23062f722d0ea9bcb3e75aca05cd55"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "4ec4d9c1e8ffc83768694b206a96323f"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b21cd347be233c9febe6f75d9bedb28c"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4032921c4f0cff6bc2ce240c2ac7ee9a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "5b5cd3e63407ae7d7a44555644fdb50f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x8d}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40}, 0x4044011) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x101400, 0x0) sendto$inet(r3, &(0x7f00000006c0)="10c69f1092c756e6903b3f028464bd7b5174371780a35e42a01a7216316e4906fcbc0bf4284dea8b3e17599c392e2bfe2beb1112b59e2fe8b22887ff719856d3dbd4bb882dcae67ff49e7e65501689c2cdeb38f003ced16ae73703d20daacc18b3fa906550be592738bd0b895e438fd6c35441b0e0b0e595f7b8f17d838751111e1729014983fe5c0f75e8cb35660449d8a6225962339c463f40b80ac730b3fea8c3", 0xa2, 0x4000000, &(0x7f0000000780)={0x2, 0x4e21, @remote}, 0x10) [ 581.140158][T10946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.148133][T10946] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 581.156143][T10946] 03:42:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/587]}, 0x2c3) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x7f, 0x4, 0x3, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback, 0x40, 0x700, 0x1000, 0x7ff00000}}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000007c0)=0x3, 0x4) (async) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000180)=@bridge_getlink={0x1e4, 0x12, 0x300, 0x70bd29, 0x2310, {0x7, 0x0, 0x0, r2, 0x8000, 0x2}, [@IFLA_PHYS_SWITCH_ID={0x11, 0x24, "a442d34f7f68e4e31fd47ea65d"}, @IFLA_VF_PORTS={0x1b0, 0x18, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_PROFILE={0x7, 0x2, '!-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7fff}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3c4fbdd463bcb3442ad87208ed5f9773"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7193fe9c68c564fecc093fa30fd90c5a"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d826bb4c23928de74087f1f2bad60604"}]}, {0x88, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d9b4687cf766978cc82b63c1faeabcb8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "781376abafebd7fdc5c1dfda3b6833db"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a9ff3eb84d8a201148eb0cf3b3b7759c"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3718bb33960e5beb4fcb163f533059ba"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "298161e3b89d7b670007d6f73c288201"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "5826f52ae02da31d675a9955f967c870"}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7276bdbe243b6bd523b9031338a6e0c9"}, @IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1e23062f722d0ea9bcb3e75aca05cd55"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "4ec4d9c1e8ffc83768694b206a96323f"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b21cd347be233c9febe6f75d9bedb28c"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4032921c4f0cff6bc2ce240c2ac7ee9a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "5b5cd3e63407ae7d7a44555644fdb50f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x8d}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40}, 0x4044011) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x101400, 0x0) sendto$inet(r3, &(0x7f00000006c0)="10c69f1092c756e6903b3f028464bd7b5174371780a35e42a01a7216316e4906fcbc0bf4284dea8b3e17599c392e2bfe2beb1112b59e2fe8b22887ff719856d3dbd4bb882dcae67ff49e7e65501689c2cdeb38f003ced16ae73703d20daacc18b3fa906550be592738bd0b895e438fd6c35441b0e0b0e595f7b8f17d838751111e1729014983fe5c0f75e8cb35660449d8a6225962339c463f40b80ac730b3fea8c3", 0xa2, 0x4000000, &(0x7f0000000780)={0x2, 0x4e21, @remote}, 0x10) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 581.202652][T10958] macvtap7: entered allmulticast mode [ 581.209384][T10958] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 581.219839][T10958] team0: Device macvtap7 is already an upper device of the team interface [ 581.228052][T10966] FAULT_INJECTION: forcing a failure. [ 581.228052][T10966] name failslab, interval 1, probability 0, space 0, times 0 [ 581.241054][T10966] CPU: 1 PID: 10966 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/587]}, 0x2c3) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x7f, 0x4, 0x3, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback, 0x40, 0x700, 0x1000, 0x7ff00000}}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000007c0)=0x3, 0x4) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000180)=@bridge_getlink={0x1e4, 0x12, 0x300, 0x70bd29, 0x2310, {0x7, 0x0, 0x0, r2, 0x8000, 0x2}, [@IFLA_PHYS_SWITCH_ID={0x11, 0x24, "a442d34f7f68e4e31fd47ea65d"}, @IFLA_VF_PORTS={0x1b0, 0x18, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_PROFILE={0x7, 0x2, '!-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7fff}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3c4fbdd463bcb3442ad87208ed5f9773"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7193fe9c68c564fecc093fa30fd90c5a"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d826bb4c23928de74087f1f2bad60604"}]}, {0x88, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d9b4687cf766978cc82b63c1faeabcb8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "781376abafebd7fdc5c1dfda3b6833db"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a9ff3eb84d8a201148eb0cf3b3b7759c"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3718bb33960e5beb4fcb163f533059ba"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "298161e3b89d7b670007d6f73c288201"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "5826f52ae02da31d675a9955f967c870"}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7276bdbe243b6bd523b9031338a6e0c9"}, @IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1e23062f722d0ea9bcb3e75aca05cd55"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "4ec4d9c1e8ffc83768694b206a96323f"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b21cd347be233c9febe6f75d9bedb28c"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4032921c4f0cff6bc2ce240c2ac7ee9a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "5b5cd3e63407ae7d7a44555644fdb50f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x8d}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40}, 0x4044011) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x101400, 0x0) sendto$inet(r3, &(0x7f00000006c0)="10c69f1092c756e6903b3f028464bd7b5174371780a35e42a01a7216316e4906fcbc0bf4284dea8b3e17599c392e2bfe2beb1112b59e2fe8b22887ff719856d3dbd4bb882dcae67ff49e7e65501689c2cdeb38f003ced16ae73703d20daacc18b3fa906550be592738bd0b895e438fd6c35441b0e0b0e595f7b8f17d838751111e1729014983fe5c0f75e8cb35660449d8a6225962339c463f40b80ac730b3fea8c3", 0xa2, 0x4000000, &(0x7f0000000780)={0x2, 0x4e21, @remote}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/587]}, 0x2c3) (async) socket$nl_route(0x10, 0x3, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x7f, 0x4, 0x3, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback, 0x40, 0x700, 0x1000, 0x7ff00000}}) (async) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f00000007c0)=0x3, 0x4) (async) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000600)={&(0x7f0000000180)=@bridge_getlink={0x1e4, 0x12, 0x300, 0x70bd29, 0x2310, {0x7, 0x0, 0x0, r2, 0x8000, 0x2}, [@IFLA_PHYS_SWITCH_ID={0x11, 0x24, "a442d34f7f68e4e31fd47ea65d"}, @IFLA_VF_PORTS={0x1b0, 0x18, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_PROFILE={0x7, 0x2, '!-\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7fff}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "3c4fbdd463bcb3442ad87208ed5f9773"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7193fe9c68c564fecc093fa30fd90c5a"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d826bb4c23928de74087f1f2bad60604"}]}, {0x88, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d9b4687cf766978cc82b63c1faeabcb8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "781376abafebd7fdc5c1dfda3b6833db"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a9ff3eb84d8a201148eb0cf3b3b7759c"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "3718bb33960e5beb4fcb163f533059ba"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "298161e3b89d7b670007d6f73c288201"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "5826f52ae02da31d675a9955f967c870"}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7276bdbe243b6bd523b9031338a6e0c9"}, @IFLA_PORT_PROFILE={0xb, 0x2, 'filter\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1e23062f722d0ea9bcb3e75aca05cd55"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}]}, {0x34, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "4ec4d9c1e8ffc83768694b206a96323f"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b21cd347be233c9febe6f75d9bedb28c"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4032921c4f0cff6bc2ce240c2ac7ee9a"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "5b5cd3e63407ae7d7a44555644fdb50f"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_VF={0x8, 0x1, 0x8d}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}]}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x40}, 0x4044011) (async) openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x101400, 0x0) (async) sendto$inet(r3, &(0x7f00000006c0)="10c69f1092c756e6903b3f028464bd7b5174371780a35e42a01a7216316e4906fcbc0bf4284dea8b3e17599c392e2bfe2beb1112b59e2fe8b22887ff719856d3dbd4bb882dcae67ff49e7e65501689c2cdeb38f003ced16ae73703d20daacc18b3fa906550be592738bd0b895e438fd6c35441b0e0b0e595f7b8f17d838751111e1729014983fe5c0f75e8cb35660449d8a6225962339c463f40b80ac730b3fea8c3", 0xa2, 0x4000000, &(0x7f0000000780)={0x2, 0x4e21, @remote}, 0x10) (async) [ 581.251508][T10966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 581.261576][T10966] Call Trace: [ 581.264871][T10966] [ 581.267831][T10966] dump_stack_lvl+0xda/0x130 [ 581.272477][T10966] dump_stack+0x15/0x20 [ 581.276684][T10966] should_fail_ex+0x21f/0x230 [ 581.281454][T10966] __should_failslab+0x92/0xa0 [ 581.286260][T10966] should_failslab+0x9/0x20 [ 581.290790][T10966] slab_pre_alloc_hook+0x38/0x180 [ 581.295840][T10966] kmem_cache_alloc+0x52/0x220 [ 581.300626][T10966] ? skb_clone+0x154/0x1e0 [ 581.305080][T10966] skb_clone+0x154/0x1e0 [ 581.309520][T10966] __netlink_deliver_tap+0x2c0/0x4c0 [ 581.314920][T10966] netlink_unicast+0x62f/0x650 [ 581.319728][T10966] netlink_sendmsg+0x66e/0x770 [ 581.324548][T10966] ? netlink_getsockopt+0x3e0/0x3e0 [ 581.329801][T10966] ____sys_sendmsg+0x37c/0x4d0 [ 581.334640][T10966] __sys_sendmsg+0x1e9/0x270 [ 581.339290][T10966] __x64_sys_sendmsg+0x46/0x50 [ 581.344188][T10966] do_syscall_64+0x41/0xc0 [ 581.348742][T10966] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 581.354665][T10966] RIP: 0033:0x7f0cd1f70ae9 [ 581.359163][T10966] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 581.378838][T10966] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.387277][T10966] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 581.395267][T10966] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000020000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 581.403272][T10966] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 581.411335][T10966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.419308][T10966] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 581.427293][T10966] [ 581.445266][T10965] FAULT_INJECTION: forcing a failure. [ 581.445266][T10965] name failslab, interval 1, probability 0, space 0, times 0 [ 581.457951][T10965] CPU: 1 PID: 10965 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 581.468432][T10965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 581.478493][T10965] Call Trace: [ 581.481770][T10965] [ 581.484710][T10965] dump_stack_lvl+0xda/0x130 [ 581.489384][T10965] dump_stack+0x15/0x20 [ 581.493562][T10965] should_fail_ex+0x21f/0x230 [ 581.498266][T10965] __should_failslab+0x92/0xa0 [ 581.503048][T10965] should_failslab+0x9/0x20 [ 581.507619][T10965] slab_pre_alloc_hook+0x38/0x180 [ 581.512667][T10965] kmem_cache_alloc+0x52/0x220 [ 581.517531][T10965] ? __kernfs_new_node+0x6a/0x380 [ 581.522628][T10965] __kernfs_new_node+0x6a/0x380 [ 581.527626][T10965] ? make_kgid+0x115/0x310 [ 581.532084][T10965] ? net_ns_get_ownership+0xae/0xd0 [ 581.537339][T10965] ? net_namespace+0x20/0x20 [ 581.542030][T10965] kernfs_create_dir_ns+0x62/0x150 [ 581.547243][T10965] sysfs_create_dir_ns+0xd7/0x1d0 [ 581.552274][T10965] kobject_add_internal+0x3eb/0x730 [ 581.557499][T10965] kobject_add+0xdc/0x150 [ 581.561844][T10965] ? kobject_get+0x95/0xc0 [ 581.566352][T10965] ? device_add+0x2ea/0x8b0 [ 581.570878][T10965] device_add+0x2f8/0x8b0 [ 581.575351][T10965] netdev_register_kobject+0xfc/0x230 [ 581.580775][T10965] register_netdevice+0x680/0xb40 [ 581.585855][T10965] ? rb_erase+0x117/0x6a0 [ 581.590287][T10965] ? validate_linkmsg+0x511/0x590 [ 581.595356][T10965] ipvlan_link_new+0x295/0x5c0 [ 581.600130][T10965] ? ipvlan_multicast_enqueue+0x270/0x270 [ 581.605856][T10965] rtnl_newlink+0xee5/0x1670 [ 581.610536][T10965] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 581.616794][T10965] ? _raw_spin_unlock+0x26/0x40 [ 581.621656][T10965] ? __mutex_lock+0x21c/0x8d0 [ 581.626448][T10965] ? rtnl_setlink+0x300/0x300 [ 581.631212][T10965] rtnetlink_rcv_msg+0x807/0x8c0 [ 581.636191][T10965] ? put_dec_trunc8+0x10e/0x130 [ 581.641080][T10965] ? put_dec+0xcd/0xe0 [ 581.645256][T10965] ? number+0x98d/0xa90 [ 581.649430][T10965] ? xas_load+0x3ae/0x3c0 [ 581.653757][T10965] ? skb_release_data+0x53d/0x550 [ 581.658870][T10965] ? kmem_cache_free+0x1db/0x3a0 [ 581.663867][T10965] ? __kfree_skb+0x104/0x140 [ 581.668476][T10965] ? nlmon_xmit+0x4b/0x60 [ 581.672814][T10965] ? __kfree_skb+0x104/0x140 [ 581.677584][T10965] ? consume_skb+0x57/0x180 [ 581.682119][T10965] ? nlmon_xmit+0x4b/0x60 [ 581.686452][T10965] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 581.691797][T10965] ? __dev_queue_xmit+0xad9/0x1e20 [ 581.697032][T10965] ? ref_tracker_free+0x3a1/0x400 [ 581.702118][T10965] netlink_rcv_skb+0x126/0x220 [ 581.706921][T10965] ? rtnetlink_bind+0x60/0x60 [ 581.711644][T10965] rtnetlink_rcv+0x1c/0x20 [ 581.716089][T10965] netlink_unicast+0x589/0x650 [ 581.720992][T10965] netlink_sendmsg+0x66e/0x770 [ 581.725793][T10965] ? netlink_getsockopt+0x3e0/0x3e0 [ 581.731094][T10965] ____sys_sendmsg+0x37c/0x4d0 [ 581.735975][T10965] __sys_sendmsg+0x1e9/0x270 [ 581.740589][T10965] __x64_sys_sendmsg+0x46/0x50 [ 581.745385][T10965] do_syscall_64+0x41/0xc0 [ 581.749902][T10965] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 581.755840][T10965] RIP: 0033:0x7f205db7fae9 [ 581.760252][T10965] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 581.779883][T10965] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.788298][T10965] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 581.796272][T10965] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 581.804263][T10965] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 581.812299][T10965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 581.820282][T10965] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 581.828317][T10965] [ 581.831504][T10965] kobject: kobject_add_internal failed for ipvlan12 (error: -12 parent: net) [ 581.845773][T10968] macvtap19: entered allmulticast mode 03:42:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 581.858707][T10968] 8021q: adding VLAN 0 to HW filter on device macvtap19 [ 581.872781][T10966] ipvlan8: entered promiscuous mode 03:42:04 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 6) 03:42:04 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 17) 03:42:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe8030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) 03:42:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 581.920413][T10989] macvtap20: entered allmulticast mode [ 581.927673][T10989] 8021q: adding VLAN 0 to HW filter on device macvtap20 03:42:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000feffff070000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan1\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 581.976371][T10996] macvtap7: entered allmulticast mode [ 581.985183][T10996] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 582.006972][T10996] team0: Device macvtap7 is already an upper device of the team interface 03:42:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000110000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000001ed5240000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 582.036507][T11004] macvtap21: entered allmulticast mode [ 582.044075][T11004] 8021q: adding VLAN 0 to HW filter on device macvtap21 [ 582.054101][T11005] FAULT_INJECTION: forcing a failure. [ 582.054101][T11005] name failslab, interval 1, probability 0, space 0, times 0 [ 582.066860][T11005] CPU: 0 PID: 11005 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 582.077325][T11005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 582.087405][T11005] Call Trace: [ 582.090701][T11005] [ 582.093686][T11005] dump_stack_lvl+0xda/0x130 [ 582.098338][T11005] dump_stack+0x15/0x20 [ 582.102539][T11005] should_fail_ex+0x21f/0x230 [ 582.107247][T11005] ? rtnl_newlink+0x5d/0x1670 [ 582.111965][T11005] __should_failslab+0x92/0xa0 [ 582.116775][T11005] should_failslab+0x9/0x20 [ 582.121382][T11005] slab_pre_alloc_hook+0x38/0x180 [ 582.126459][T11005] ? rtnl_newlink+0x5d/0x1670 [ 582.131241][T11005] __kmem_cache_alloc_node+0x48/0x1d0 [ 582.136623][T11005] ? rtnl_newlink+0x5d/0x1670 [ 582.141374][T11005] kmalloc_trace+0x2a/0xa0 [ 582.145810][T11005] rtnl_newlink+0x5d/0x1670 [ 582.150453][T11005] ? cgroup_rstat_updated+0x8c/0x1c0 [ 582.155749][T11005] ? __rcu_read_unlock+0x4d/0x70 [ 582.160735][T11005] ? __perf_event_task_sched_in+0x769/0x790 [ 582.166661][T11005] ? __perf_event_task_sched_out+0x111/0xe50 [ 582.172715][T11005] ? _raw_spin_unlock+0x26/0x40 [ 582.177579][T11005] ? finish_task_switch+0xac/0x280 [ 582.182734][T11005] ? __schedule+0x63b/0x8c0 [ 582.187247][T11005] ? selinux_capable+0x1ec/0x250 [ 582.192348][T11005] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 582.198611][T11005] ? _raw_spin_unlock+0x26/0x40 [ 582.203471][T11005] ? __mutex_lock+0x21c/0x8d0 [ 582.208167][T11005] ? rtnl_setlink+0x300/0x300 [ 582.212866][T11005] rtnetlink_rcv_msg+0x807/0x8c0 [ 582.217892][T11005] ? put_dec_trunc8+0x10e/0x130 [ 582.222769][T11005] ? put_dec+0xcd/0xe0 [ 582.226851][T11005] ? number+0x98d/0xa90 [ 582.231123][T11005] ? xas_load+0x3ae/0x3c0 [ 582.235468][T11005] ? skb_release_data+0x53d/0x550 [ 582.240579][T11005] ? kmem_cache_free+0x1db/0x3a0 [ 582.245604][T11005] ? __kfree_skb+0x104/0x140 [ 582.250217][T11005] ? nlmon_xmit+0x4b/0x60 [ 582.254610][T11005] ? __kfree_skb+0x104/0x140 [ 582.259211][T11005] ? consume_skb+0x57/0x180 [ 582.263726][T11005] ? nlmon_xmit+0x4b/0x60 [ 582.268059][T11005] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 582.273357][T11005] ? __dev_queue_xmit+0xad9/0x1e20 [ 582.278512][T11005] ? ref_tracker_free+0x3a1/0x400 [ 582.283572][T11005] netlink_rcv_skb+0x126/0x220 [ 582.288401][T11005] ? rtnetlink_bind+0x60/0x60 [ 582.293170][T11005] rtnetlink_rcv+0x1c/0x20 [ 582.297599][T11005] netlink_unicast+0x589/0x650 [ 582.302406][T11005] netlink_sendmsg+0x66e/0x770 [ 582.307196][T11005] ? netlink_getsockopt+0x3e0/0x3e0 [ 582.312408][T11005] ____sys_sendmsg+0x37c/0x4d0 [ 582.317281][T11005] __sys_sendmsg+0x1e9/0x270 [ 582.321934][T11005] __x64_sys_sendmsg+0x46/0x50 [ 582.326808][T11005] do_syscall_64+0x41/0xc0 [ 582.331252][T11005] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 582.337151][T11005] RIP: 0033:0x7f0cd1f70ae9 [ 582.341574][T11005] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 582.361307][T11005] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.369772][T11005] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 582.377776][T11005] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 03:42:05 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 7) [ 582.385803][T11005] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 582.393784][T11005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 582.401756][T11005] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 582.409811][T11005] [ 582.417542][T10998] FAULT_INJECTION: forcing a failure. [ 582.417542][T10998] name failslab, interval 1, probability 0, space 0, times 0 [ 582.430275][T10998] CPU: 0 PID: 10998 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 582.440740][T10998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 582.450820][T10998] Call Trace: [ 582.454114][T10998] [ 582.457057][T10998] dump_stack_lvl+0xda/0x130 [ 582.461831][T10998] dump_stack+0x15/0x20 [ 582.466011][T10998] should_fail_ex+0x21f/0x230 [ 582.470726][T10998] __should_failslab+0x92/0xa0 [ 582.475544][T10998] should_failslab+0x9/0x20 [ 582.480051][T10998] slab_pre_alloc_hook+0x38/0x180 [ 582.485144][T10998] kmem_cache_alloc+0x52/0x220 [ 582.489974][T10998] ? __kernfs_new_node+0x6a/0x380 [ 582.495110][T10998] __kernfs_new_node+0x6a/0x380 [ 582.500051][T10998] ? kernfs_add_one+0x330/0x390 [ 582.504935][T10998] kernfs_new_node+0x5f/0xd0 [ 582.509593][T10998] __kernfs_create_file+0x49/0x180 [ 582.514734][T10998] ? dev_attr_show+0x90/0x90 [ 582.519324][T10998] sysfs_add_file_mode_ns+0x136/0x1b0 [ 582.524837][T10998] sysfs_create_file_ns+0xd0/0x110 [ 582.530030][T10998] device_add+0x3ef/0x8b0 [ 582.534403][T10998] netdev_register_kobject+0xfc/0x230 [ 582.539858][T10998] register_netdevice+0x680/0xb40 [ 582.544902][T10998] ? rb_erase+0x117/0x6a0 [ 582.549314][T10998] ? validate_linkmsg+0x511/0x590 [ 582.554354][T10998] ipvlan_link_new+0x295/0x5c0 [ 582.559205][T10998] ? ipvlan_multicast_enqueue+0x270/0x270 [ 582.564953][T10998] rtnl_newlink+0xee5/0x1670 [ 582.569568][T10998] ? cgroup_rstat_updated+0x8c/0x1c0 [ 582.574873][T10998] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 582.581129][T10998] ? _raw_spin_unlock+0x26/0x40 [ 582.586098][T10998] ? __mutex_lock+0x21c/0x8d0 [ 582.590832][T10998] ? rtnl_setlink+0x300/0x300 [ 582.595565][T10998] rtnetlink_rcv_msg+0x807/0x8c0 [ 582.600515][T10998] ? put_dec_trunc8+0x10e/0x130 [ 582.605473][T10998] ? put_dec+0xcd/0xe0 [ 582.609574][T10998] ? number+0x98d/0xa90 [ 582.613755][T10998] ? try_charge_memcg+0xb49/0xd30 [ 582.618832][T10998] ? xas_load+0x3ae/0x3c0 [ 582.623161][T10998] ? skb_release_data+0x53d/0x550 [ 582.628277][T10998] ? kmem_cache_free+0x1db/0x3a0 [ 582.633265][T10998] ? __kfree_skb+0x104/0x140 [ 582.637942][T10998] ? nlmon_xmit+0x4b/0x60 [ 582.642278][T10998] ? __kfree_skb+0x104/0x140 [ 582.647023][T10998] ? consume_skb+0x57/0x180 [ 582.651562][T10998] ? nlmon_xmit+0x4b/0x60 [ 582.655911][T10998] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 582.661284][T10998] ? __dev_queue_xmit+0xad9/0x1e20 [ 582.666516][T10998] ? ref_tracker_free+0x3a1/0x400 [ 582.671569][T10998] netlink_rcv_skb+0x126/0x220 [ 582.676352][T10998] ? rtnetlink_bind+0x60/0x60 [ 582.681108][T10998] rtnetlink_rcv+0x1c/0x20 [ 582.685667][T10998] netlink_unicast+0x589/0x650 [ 582.690460][T10998] netlink_sendmsg+0x66e/0x770 [ 582.695240][T10998] ? netlink_getsockopt+0x3e0/0x3e0 [ 582.700482][T10998] ____sys_sendmsg+0x37c/0x4d0 [ 582.705272][T10998] __sys_sendmsg+0x1e9/0x270 [ 582.709985][T10998] __x64_sys_sendmsg+0x46/0x50 [ 582.714843][T10998] do_syscall_64+0x41/0xc0 [ 582.719337][T10998] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 582.725251][T10998] RIP: 0033:0x7f205db7fae9 [ 582.729678][T10998] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 582.749321][T10998] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.757747][T10998] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 582.765727][T10998] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 582.773708][T10998] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 582.781680][T10998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 582.789649][T10998] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 582.797624][T10998] [ 582.804453][T11019] FAULT_INJECTION: forcing a failure. [ 582.804453][T11019] name failslab, interval 1, probability 0, space 0, times 0 [ 582.817120][T11019] CPU: 1 PID: 11019 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 582.827588][T11019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 582.827606][T11019] Call Trace: [ 582.827613][T11019] [ 582.827622][T11019] dump_stack_lvl+0xda/0x130 [ 582.848540][T11019] dump_stack+0x15/0x20 [ 582.852716][T11019] should_fail_ex+0x21f/0x230 [ 582.857510][T11019] ? kvmalloc_node+0x72/0x160 [ 582.862358][T11019] __should_failslab+0x92/0xa0 [ 582.867175][T11019] should_failslab+0x9/0x20 [ 582.871743][T11019] slab_pre_alloc_hook+0x38/0x180 [ 582.876793][T11019] ? kvmalloc_node+0x72/0x160 [ 582.881484][T11019] __kmem_cache_alloc_node+0x48/0x1d0 [ 582.886982][T11019] ? kvmalloc_node+0x72/0x160 [ 582.891725][T11019] __kmalloc_node+0x98/0x1a0 [ 582.896325][T11019] kvmalloc_node+0x72/0x160 [ 582.900969][T11019] alloc_netdev_mqs+0x89/0x8a0 [ 582.905769][T11019] ? ipvlan_link_delete+0x210/0x210 [ 582.911054][T11019] rtnl_create_link+0x23b/0x810 [ 582.915980][T11019] rtnl_newlink+0xdff/0x1670 [ 582.920674][T11019] ? cgroup_rstat_updated+0x8c/0x1c0 [ 582.926015][T11019] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 582.932319][T11019] ? _raw_spin_unlock+0x26/0x40 [ 582.937225][T11019] ? __mutex_lock+0x21c/0x8d0 [ 582.941932][T11019] ? rtnl_setlink+0x300/0x300 [ 582.946640][T11019] rtnetlink_rcv_msg+0x807/0x8c0 [ 582.951593][T11019] ? put_dec_trunc8+0x10e/0x130 [ 582.956455][T11019] ? put_dec+0xcd/0xe0 [ 582.960537][T11019] ? number+0x98d/0xa90 [ 582.964763][T11019] ? xas_load+0x3ae/0x3c0 [ 582.969108][T11019] ? skb_release_data+0x53d/0x550 [ 582.974229][T11019] ? kmem_cache_free+0x1db/0x3a0 [ 582.979239][T11019] ? __kfree_skb+0x104/0x140 [ 582.983907][T11019] ? nlmon_xmit+0x4b/0x60 [ 582.988239][T11019] ? __kfree_skb+0x104/0x140 [ 582.992889][T11019] ? consume_skb+0x57/0x180 [ 582.997479][T11019] ? nlmon_xmit+0x4b/0x60 [ 583.001873][T11019] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 583.007206][T11019] ? __dev_queue_xmit+0xad9/0x1e20 [ 583.012321][T11019] ? ref_tracker_free+0x3a1/0x400 [ 583.017355][T11019] netlink_rcv_skb+0x126/0x220 [ 583.022206][T11019] ? rtnetlink_bind+0x60/0x60 [ 583.026970][T11019] rtnetlink_rcv+0x1c/0x20 [ 583.031410][T11019] netlink_unicast+0x589/0x650 [ 583.036204][T11019] netlink_sendmsg+0x66e/0x770 [ 583.041018][T11019] ? netlink_getsockopt+0x3e0/0x3e0 [ 583.046255][T11019] ____sys_sendmsg+0x37c/0x4d0 [ 583.051048][T11019] __sys_sendmsg+0x1e9/0x270 [ 583.055661][T11019] __x64_sys_sendmsg+0x46/0x50 [ 583.060454][T11019] do_syscall_64+0x41/0xc0 [ 583.064978][T11019] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 583.070909][T11019] RIP: 0033:0x7f0cd1f70ae9 [ 583.075336][T11019] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 583.095025][T11019] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.103440][T11019] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 583.111420][T11019] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 583.119393][T11019] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 583.127367][T11019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 03:42:06 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 18) 03:42:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xeaffffff, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) (async) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80800) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) 03:42:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 583.135414][T11019] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 583.143393][T11019] 03:42:06 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 8) 03:42:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) write$selinux_attr(r2, &(0x7f0000000400)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x110) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) inotify_add_watch(r3, &(0x7f0000000380)='./file0\x00', 0xc0000024) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 583.190103][T11026] macvtap22: entered allmulticast mode [ 583.208829][T11026] 8021q: adding VLAN 0 to HW filter on device macvtap22 [ 583.222322][T11027] FAULT_INJECTION: forcing a failure. [ 583.222322][T11027] name failslab, interval 1, probability 0, space 0, times 0 [ 583.235058][T11027] CPU: 1 PID: 11027 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 583.245605][T11027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 583.255686][T11027] Call Trace: [ 583.258982][T11027] [ 583.261994][T11027] dump_stack_lvl+0xda/0x130 [ 583.266633][T11027] dump_stack+0x15/0x20 [ 583.270847][T11027] should_fail_ex+0x21f/0x230 [ 583.275554][T11027] __should_failslab+0x92/0xa0 [ 583.280371][T11027] should_failslab+0x9/0x20 [ 583.284914][T11027] slab_pre_alloc_hook+0x38/0x180 03:42:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000001100000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 583.289982][T11027] kmem_cache_alloc+0x52/0x220 [ 583.294771][T11027] ? __kernfs_new_node+0x6a/0x380 [ 583.299833][T11027] ? rb_insert_color+0x280/0x290 [ 583.304811][T11027] __kernfs_new_node+0x6a/0x380 [ 583.309710][T11027] ? kernfs_add_one+0x330/0x390 [ 583.314663][T11027] kernfs_new_node+0x5f/0xd0 [ 583.319289][T11027] kernfs_create_link+0x6c/0x120 [ 583.324289][T11027] sysfs_do_create_link_sd+0x6b/0xf0 [ 583.329652][T11027] sysfs_create_link+0x51/0x70 [ 583.334503][T11027] device_add_class_symlinks+0x9a/0x1e0 [ 583.340180][T11027] device_add+0x410/0x8b0 [ 583.344705][T11027] netdev_register_kobject+0xfc/0x230 [ 583.350092][T11027] register_netdevice+0x680/0xb40 [ 583.355211][T11027] ? rb_erase+0x117/0x6a0 [ 583.359625][T11027] ? validate_linkmsg+0x511/0x590 [ 583.364684][T11027] ipvlan_link_new+0x295/0x5c0 [ 583.369476][T11027] ? ipvlan_multicast_enqueue+0x270/0x270 [ 583.375259][T11027] rtnl_newlink+0xee5/0x1670 [ 583.379866][T11027] ? cgroup_rstat_updated+0x8c/0x1c0 [ 583.385262][T11027] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 583.391542][T11027] ? _raw_spin_unlock+0x26/0x40 [ 583.396407][T11027] ? __mutex_lock+0x21c/0x8d0 [ 583.401106][T11027] ? rtnl_setlink+0x300/0x300 [ 583.405854][T11027] rtnetlink_rcv_msg+0x807/0x8c0 [ 583.410865][T11027] ? put_dec_trunc8+0x10e/0x130 [ 583.415763][T11027] ? put_dec+0xcd/0xe0 [ 583.419855][T11027] ? number+0x98d/0xa90 [ 583.424117][T11027] ? xas_load+0x3ae/0x3c0 [ 583.428507][T11027] ? skb_release_data+0x53d/0x550 [ 583.433544][T11027] ? kmem_cache_free+0x1db/0x3a0 [ 583.438491][T11027] ? __kfree_skb+0x104/0x140 [ 583.443187][T11027] ? nlmon_xmit+0x4b/0x60 [ 583.447520][T11027] ? __kfree_skb+0x104/0x140 [ 583.452130][T11027] ? consume_skb+0x57/0x180 [ 583.456680][T11027] ? nlmon_xmit+0x4b/0x60 [ 583.461060][T11027] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 583.466373][T11027] ? __dev_queue_xmit+0xad9/0x1e20 [ 583.471503][T11027] ? ref_tracker_free+0x3a1/0x400 [ 583.476549][T11027] netlink_rcv_skb+0x126/0x220 [ 583.481360][T11027] ? rtnetlink_bind+0x60/0x60 [ 583.486132][T11027] rtnetlink_rcv+0x1c/0x20 [ 583.490735][T11027] netlink_unicast+0x589/0x650 [ 583.495546][T11027] netlink_sendmsg+0x66e/0x770 [ 583.500347][T11027] ? netlink_getsockopt+0x3e0/0x3e0 [ 583.505640][T11027] ____sys_sendmsg+0x37c/0x4d0 [ 583.510433][T11027] __sys_sendmsg+0x1e9/0x270 [ 583.515073][T11027] __x64_sys_sendmsg+0x46/0x50 [ 583.519850][T11027] do_syscall_64+0x41/0xc0 [ 583.524321][T11027] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 583.530292][T11027] RIP: 0033:0x7f205db7fae9 [ 583.534713][T11027] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 583.554428][T11027] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.562858][T11027] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 583.570845][T11027] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 583.578816][T11027] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 583.586795][T11027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 583.594769][T11027] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 583.602814][T11027] [ 583.608513][T11032] FAULT_INJECTION: forcing a failure. [ 583.608513][T11032] name failslab, interval 1, probability 0, space 0, times 0 [ 583.621215][T11032] CPU: 0 PID: 11032 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 583.631663][T11032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 583.641811][T11032] Call Trace: [ 583.645170][T11032] [ 583.648142][T11032] dump_stack_lvl+0xda/0x130 [ 583.652821][T11032] dump_stack+0x15/0x20 [ 583.656991][T11032] should_fail_ex+0x21f/0x230 [ 583.661714][T11032] ? __hw_addr_add_ex+0x13d/0x350 [ 583.666787][T11032] __should_failslab+0x92/0xa0 [ 583.671632][T11032] should_failslab+0x9/0x20 [ 583.676219][T11032] slab_pre_alloc_hook+0x38/0x180 [ 583.681285][T11032] ? __hw_addr_add_ex+0x13d/0x350 [ 583.686324][T11032] __kmem_cache_alloc_node+0x48/0x1d0 [ 583.691794][T11032] ? __hw_addr_add_ex+0x13d/0x350 [ 583.696841][T11032] kmalloc_trace+0x2a/0xa0 [ 583.701297][T11032] __hw_addr_add_ex+0x13d/0x350 [ 583.706214][T11032] dev_addr_init+0xb2/0x120 [ 583.710755][T11032] ? stack_depot_init+0x4f/0x130 [ 583.715745][T11032] alloc_netdev_mqs+0x1cc/0x8a0 [ 583.720628][T11032] ? ipvlan_link_delete+0x210/0x210 [ 583.725904][T11032] rtnl_create_link+0x23b/0x810 [ 583.730773][T11032] rtnl_newlink+0xdff/0x1670 [ 583.735466][T11032] ? cgroup_rstat_updated+0x8c/0x1c0 [ 583.740836][T11032] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 583.747160][T11032] ? _raw_spin_unlock+0x26/0x40 [ 583.752012][T11032] ? __mutex_lock+0x21c/0x8d0 [ 583.756761][T11032] ? rtnl_setlink+0x300/0x300 [ 583.761541][T11032] rtnetlink_rcv_msg+0x807/0x8c0 [ 583.766537][T11032] ? put_dec_trunc8+0x10e/0x130 [ 583.771457][T11032] ? put_dec+0xcd/0xe0 [ 583.775547][T11032] ? number+0x98d/0xa90 [ 583.779798][T11032] ? xas_load+0x3ae/0x3c0 [ 583.784185][T11032] ? skb_release_data+0x53d/0x550 [ 583.789286][T11032] ? kmem_cache_free+0x1db/0x3a0 [ 583.794236][T11032] ? __kfree_skb+0x104/0x140 [ 583.798860][T11032] ? nlmon_xmit+0x4b/0x60 [ 583.803196][T11032] ? __kfree_skb+0x104/0x140 [ 583.807924][T11032] ? consume_skb+0x57/0x180 [ 583.812499][T11032] ? nlmon_xmit+0x4b/0x60 [ 583.816857][T11032] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 583.822189][T11032] ? __dev_queue_xmit+0xad9/0x1e20 [ 583.827403][T11032] ? ref_tracker_free+0x3a1/0x400 [ 583.832439][T11032] netlink_rcv_skb+0x126/0x220 [ 583.837286][T11032] ? rtnetlink_bind+0x60/0x60 [ 583.842106][T11032] rtnetlink_rcv+0x1c/0x20 [ 583.846566][T11032] netlink_unicast+0x589/0x650 [ 583.851391][T11032] netlink_sendmsg+0x66e/0x770 [ 583.856221][T11032] ? netlink_getsockopt+0x3e0/0x3e0 [ 583.861454][T11032] ____sys_sendmsg+0x37c/0x4d0 [ 583.866270][T11032] __sys_sendmsg+0x1e9/0x270 [ 583.870918][T11032] __x64_sys_sendmsg+0x46/0x50 [ 583.875746][T11032] do_syscall_64+0x41/0xc0 [ 583.880186][T11032] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 583.886087][T11032] RIP: 0033:0x7f0cd1f70ae9 [ 583.890564][T11032] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 583.910223][T11032] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.918709][T11032] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 583.926680][T11032] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 583.934693][T11032] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 03:42:07 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 19) 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) write$selinux_attr(r2, &(0x7f0000000400)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) (async) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x110) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) (async) inotify_add_watch(r3, &(0x7f0000000380)='./file0\x00', 0xc0000024) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xefffffff, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:07 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 9) [ 583.942682][T11032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.950699][T11032] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 583.958683][T11032] [ 583.971031][T11043] macvtap23: entered allmulticast mode 03:42:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) write$selinux_attr(r2, &(0x7f0000000400)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x110) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) inotify_add_watch(r3, &(0x7f0000000380)='./file0\x00', 0xc0000024) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r1, 0x0, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x402000, 0x0) (async) write$selinux_attr(r2, &(0x7f0000000400)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) (async) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x110) (async) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) (async) inotify_add_watch(r3, &(0x7f0000000380)='./file0\x00', 0xc0000024) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 583.999224][T11043] 8021q: adding VLAN 0 to HW filter on device macvtap23 [ 584.028415][T11052] macvtap7: entered allmulticast mode [ 584.035847][T11052] 8021q: adding VLAN 0 to HW filter on device macvtap7 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=[0xff, 0x13]) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=[0xff, 0x13]) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 584.047595][T11052] team0: Device macvtap7 is already an upper device of the team interface [ 584.090693][T11054] FAULT_INJECTION: forcing a failure. [ 584.090693][T11054] name failslab, interval 1, probability 0, space 0, times 0 [ 584.103451][T11054] CPU: 1 PID: 11054 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 584.113899][T11054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 584.124032][T11054] Call Trace: [ 584.127321][T11054] [ 584.130333][T11054] dump_stack_lvl+0xda/0x130 [ 584.135001][T11054] dump_stack+0x15/0x20 [ 584.139184][T11054] should_fail_ex+0x21f/0x230 [ 584.143876][T11054] __should_failslab+0x92/0xa0 [ 584.148654][T11054] should_failslab+0x9/0x20 [ 584.153204][T11054] slab_pre_alloc_hook+0x38/0x180 [ 584.158238][T11054] kmem_cache_alloc+0x52/0x220 [ 584.163012][T11054] ? __kernfs_new_node+0x6a/0x380 [ 584.168064][T11054] ? rb_insert_color+0x280/0x290 [ 584.173020][T11054] __kernfs_new_node+0x6a/0x380 [ 584.177907][T11054] ? kernfs_add_one+0x330/0x390 [ 584.182853][T11054] kernfs_new_node+0x5f/0xd0 [ 584.187513][T11054] kernfs_create_link+0x6c/0x120 [ 584.192479][T11054] sysfs_do_create_link_sd+0x6b/0xf0 [ 584.197856][T11054] sysfs_create_link+0x51/0x70 [ 584.202655][T11054] device_add_class_symlinks+0x9a/0x1e0 [ 584.208236][T11054] device_add+0x410/0x8b0 [ 584.212617][T11054] netdev_register_kobject+0xfc/0x230 [ 584.218089][T11054] register_netdevice+0x680/0xb40 [ 584.223141][T11054] ? rb_erase+0x117/0x6a0 [ 584.227502][T11054] ? validate_linkmsg+0x511/0x590 [ 584.232550][T11054] ipvlan_link_new+0x295/0x5c0 [ 584.237363][T11054] ? ipvlan_multicast_enqueue+0x270/0x270 [ 584.243126][T11054] rtnl_newlink+0xee5/0x1670 [ 584.247727][T11054] ? cgroup_rstat_updated+0x8c/0x1c0 [ 584.253150][T11054] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 584.259475][T11054] ? _raw_spin_unlock+0x26/0x40 [ 584.264330][T11054] ? __mutex_lock+0x21c/0x8d0 [ 584.269084][T11054] ? rtnl_setlink+0x300/0x300 [ 584.273922][T11054] rtnetlink_rcv_msg+0x807/0x8c0 [ 584.278875][T11054] ? put_dec_trunc8+0x10e/0x130 [ 584.283759][T11054] ? put_dec+0xcd/0xe0 [ 584.287926][T11054] ? number+0x98d/0xa90 [ 584.292105][T11054] ? xas_load+0x3ae/0x3c0 [ 584.296489][T11054] ? skb_release_data+0x53d/0x550 [ 584.301526][T11054] ? kmem_cache_free+0x1db/0x3a0 [ 584.306540][T11054] ? __kfree_skb+0x104/0x140 [ 584.311207][T11054] ? nlmon_xmit+0x4b/0x60 [ 584.315540][T11054] ? __kfree_skb+0x104/0x140 [ 584.320246][T11054] ? consume_skb+0x57/0x180 [ 584.324843][T11054] ? nlmon_xmit+0x4b/0x60 [ 584.329176][T11054] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 584.334467][T11054] ? __dev_queue_xmit+0xad9/0x1e20 [ 584.339678][T11054] ? ref_tracker_free+0x3a1/0x400 [ 584.344842][T11054] netlink_rcv_skb+0x126/0x220 [ 584.349691][T11054] ? rtnetlink_bind+0x60/0x60 [ 584.354495][T11054] rtnetlink_rcv+0x1c/0x20 [ 584.358981][T11054] netlink_unicast+0x589/0x650 [ 584.363842][T11054] netlink_sendmsg+0x66e/0x770 [ 584.368635][T11054] ? netlink_getsockopt+0x3e0/0x3e0 [ 584.373869][T11054] ____sys_sendmsg+0x37c/0x4d0 [ 584.378678][T11054] __sys_sendmsg+0x1e9/0x270 [ 584.383296][T11054] __x64_sys_sendmsg+0x46/0x50 [ 584.388101][T11054] do_syscall_64+0x41/0xc0 [ 584.392558][T11054] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 584.398496][T11054] RIP: 0033:0x7f205db7fae9 [ 584.402931][T11054] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 584.422554][T11054] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 584.430979][T11054] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 584.439050][T11054] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 584.447030][T11054] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 584.455022][T11054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 584.463070][T11054] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 584.471065][T11054] [ 584.478712][T11059] FAULT_INJECTION: forcing a failure. [ 584.478712][T11059] name failslab, interval 1, probability 0, space 0, times 0 [ 584.491346][T11059] CPU: 1 PID: 11059 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 584.491377][T11059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 584.491431][T11059] Call Trace: [ 584.491438][T11059] [ 584.491445][T11059] dump_stack_lvl+0xda/0x130 [ 584.491487][T11059] dump_stack+0x15/0x20 [ 584.491567][T11059] should_fail_ex+0x21f/0x230 [ 584.531693][T11059] ? kvmalloc_node+0x72/0x160 [ 584.536452][T11059] __should_failslab+0x92/0xa0 [ 584.541237][T11059] should_failslab+0x9/0x20 [ 584.545826][T11059] slab_pre_alloc_hook+0x38/0x180 [ 584.550880][T11059] ? kvmalloc_node+0x72/0x160 [ 584.555593][T11059] __kmem_cache_alloc_node+0x48/0x1d0 [ 584.561022][T11059] ? kvmalloc_node+0x72/0x160 [ 584.565852][T11059] __kmalloc_node+0x98/0x1a0 [ 584.570443][T11059] ? dev_addr_init+0xf2/0x120 [ 584.575244][T11059] kvmalloc_node+0x72/0x160 [ 584.579783][T11059] alloc_netdev_mqs+0x552/0x8a0 [ 584.584782][T11059] rtnl_create_link+0x23b/0x810 [ 584.589669][T11059] rtnl_newlink+0xdff/0x1670 [ 584.594275][T11059] ? cgroup_rstat_updated+0x8c/0x1c0 [ 584.599599][T11059] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 584.605931][T11059] ? _raw_spin_unlock+0x26/0x40 [ 584.610796][T11059] ? __mutex_lock+0x21c/0x8d0 [ 584.615563][T11059] ? rtnl_setlink+0x300/0x300 [ 584.620323][T11059] rtnetlink_rcv_msg+0x807/0x8c0 [ 584.625345][T11059] ? put_dec_trunc8+0x10e/0x130 [ 584.630291][T11059] ? put_dec+0xcd/0xe0 [ 584.634449][T11059] ? number+0x98d/0xa90 [ 584.638693][T11059] ? try_charge_memcg+0xb49/0xd30 [ 584.643801][T11059] ? skb_release_data+0x53d/0x550 [ 584.648906][T11059] ? kmem_cache_free+0x1db/0x3a0 [ 584.653930][T11059] ? __kfree_skb+0x104/0x140 [ 584.658616][T11059] ? nlmon_xmit+0x4b/0x60 [ 584.662979][T11059] ? __kfree_skb+0x104/0x140 [ 584.667633][T11059] ? consume_skb+0x57/0x180 [ 584.672164][T11059] ? nlmon_xmit+0x4b/0x60 [ 584.676510][T11059] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 584.681814][T11059] ? __dev_queue_xmit+0xad9/0x1e20 [ 584.686929][T11059] ? ref_tracker_free+0x3a1/0x400 [ 584.692002][T11059] netlink_rcv_skb+0x126/0x220 [ 584.696777][T11059] ? rtnetlink_bind+0x60/0x60 [ 584.701491][T11059] rtnetlink_rcv+0x1c/0x20 [ 584.705924][T11059] netlink_unicast+0x589/0x650 [ 584.710734][T11059] netlink_sendmsg+0x66e/0x770 [ 584.715548][T11059] ? netlink_getsockopt+0x3e0/0x3e0 [ 584.720769][T11059] ____sys_sendmsg+0x37c/0x4d0 [ 584.725564][T11059] __sys_sendmsg+0x1e9/0x270 [ 584.730205][T11059] __x64_sys_sendmsg+0x46/0x50 [ 584.734981][T11059] do_syscall_64+0x41/0xc0 [ 584.739450][T11059] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 584.745431][T11059] RIP: 0033:0x7f0cd1f70ae9 [ 584.749883][T11059] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 584.769512][T11059] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 584.777932][T11059] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 584.785916][T11059] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000029000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:07 executing program 0: ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)=[0xff, 0x13]) (async, rerun: 32) r0 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:07 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 10) 03:42:07 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 20) [ 584.793946][T11059] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 584.801923][T11059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.809938][T11059] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 584.817915][T11059] [ 584.827162][T11063] macvtap24: entered allmulticast mode [ 584.834372][T11063] 8021q: adding VLAN 0 to HW filter on device macvtap24 03:42:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e23, @multicast2}, {0x2, 0x5e22, @multicast2}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='ip6gretap0\x00', 0x4, 0x7, 0x400}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x8, 0x6, 0x20000130, 0x20000280, 0x0, 0xde], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/618]}, 0x2e2) 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000088000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e23, @multicast2}, {0x2, 0x5e22, @multicast2}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='ip6gretap0\x00', 0x4, 0x7, 0x400}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x8, 0x6, 0x20000130, 0x20000280, 0x0, 0xde], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000010000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d69740000000000000000000000000000000000000000000000000000006000f87c3088ee87bda61408a098d7fba4bf0000000000000000000002000000000000000000000000000000000000000000000000000000636c757374eb514125d22f698d212065720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000008000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800001d00"/618]}, 0x2e2) [ 584.896676][T11084] macvtap7: entered allmulticast mode [ 584.903384][T11084] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 584.912578][T11084] team0: Device macvtap7 is already an upper device of the team interface 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000100ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 584.942392][T11080] FAULT_INJECTION: forcing a failure. [ 584.942392][T11080] name failslab, interval 1, probability 0, space 0, times 0 [ 584.955037][T11080] CPU: 0 PID: 11080 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 584.955066][T11080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 584.955078][T11080] Call Trace: [ 584.955085][T11080] [ 584.981800][T11080] dump_stack_lvl+0xda/0x130 [ 584.986432][T11080] dump_stack+0x15/0x20 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 584.990680][T11080] should_fail_ex+0x21f/0x230 [ 584.995474][T11080] ? kvmalloc_node+0x72/0x160 [ 585.000243][T11080] __should_failslab+0x92/0xa0 [ 585.005061][T11080] should_failslab+0x9/0x20 [ 585.009591][T11080] slab_pre_alloc_hook+0x38/0x180 [ 585.014705][T11080] ? kvmalloc_node+0x72/0x160 [ 585.019428][T11080] __kmem_cache_alloc_node+0x48/0x1d0 [ 585.024838][T11080] ? kvmalloc_node+0x72/0x160 [ 585.029552][T11080] __kmalloc_node+0x98/0x1a0 [ 585.034245][T11080] ? dev_addr_init+0xf2/0x120 [ 585.039009][T11080] kvmalloc_node+0x72/0x160 [ 585.043620][T11080] alloc_netdev_mqs+0x6d9/0x8a0 [ 585.048544][T11080] rtnl_create_link+0x23b/0x810 [ 585.053538][T11080] rtnl_newlink+0xdff/0x1670 [ 585.058184][T11080] ? cgroup_rstat_updated+0x8c/0x1c0 [ 585.063551][T11080] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 585.069887][T11080] ? _raw_spin_unlock+0x26/0x40 [ 585.074805][T11080] ? __mutex_lock+0x21c/0x8d0 [ 585.079560][T11080] ? rtnl_setlink+0x300/0x300 [ 585.084312][T11080] rtnetlink_rcv_msg+0x807/0x8c0 [ 585.089289][T11080] ? put_dec_trunc8+0x10e/0x130 [ 585.094194][T11080] ? put_dec+0xcd/0xe0 [ 585.098286][T11080] ? __rcu_read_unlock+0x4d/0x70 [ 585.103316][T11080] ? __perf_event_task_sched_in+0x769/0x790 [ 585.109223][T11080] ? save_fpregs_to_fpstate+0xfe/0x150 [ 585.114700][T11080] ? skb_release_data+0x53d/0x550 [ 585.119740][T11080] ? kmem_cache_free+0x1db/0x3a0 [ 585.124697][T11080] ? __kfree_skb+0x104/0x140 [ 585.129318][T11080] ? nlmon_xmit+0x4b/0x60 [ 585.133832][T11080] ? __kfree_skb+0x104/0x140 [ 585.138458][T11080] ? consume_skb+0x57/0x180 [ 585.143028][T11080] ? nlmon_xmit+0x4b/0x60 [ 585.147373][T11080] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 585.152668][T11080] ? __dev_queue_xmit+0xad9/0x1e20 [ 585.157868][T11080] ? ref_tracker_free+0x3a1/0x400 [ 585.162930][T11080] netlink_rcv_skb+0x126/0x220 [ 585.167819][T11080] ? rtnetlink_bind+0x60/0x60 [ 585.172566][T11080] rtnetlink_rcv+0x1c/0x20 [ 585.177131][T11080] netlink_unicast+0x589/0x650 [ 585.181926][T11080] netlink_sendmsg+0x66e/0x770 [ 585.186772][T11080] ? netlink_getsockopt+0x3e0/0x3e0 [ 585.192025][T11080] ____sys_sendmsg+0x37c/0x4d0 [ 585.196810][T11080] __sys_sendmsg+0x1e9/0x270 [ 585.201445][T11080] __x64_sys_sendmsg+0x46/0x50 [ 585.206302][T11080] do_syscall_64+0x41/0xc0 [ 585.210746][T11080] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 585.216698][T11080] RIP: 0033:0x7f0cd1f70ae9 [ 585.221117][T11080] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 585.240822][T11080] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 585.249255][T11080] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 585.257309][T11080] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 585.265307][T11080] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 585.273293][T11080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 585.281361][T11080] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 585.289344][T11080] [ 585.295771][T11086] FAULT_INJECTION: forcing a failure. [ 585.295771][T11086] name failslab, interval 1, probability 0, space 0, times 0 [ 585.308469][T11086] CPU: 1 PID: 11086 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 585.318914][T11086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 585.328998][T11086] Call Trace: [ 585.332318][T11086] [ 585.335308][T11086] dump_stack_lvl+0xda/0x130 [ 585.339939][T11086] dump_stack+0x15/0x20 [ 585.344131][T11086] should_fail_ex+0x21f/0x230 [ 585.348815][T11086] ? kstrdup_const+0x3e/0x50 [ 585.353426][T11086] __should_failslab+0x92/0xa0 [ 585.358198][T11086] should_failslab+0x9/0x20 [ 585.362708][T11086] slab_pre_alloc_hook+0x38/0x180 [ 585.367741][T11086] ? kstrdup_const+0x3e/0x50 [ 585.372361][T11086] __kmem_cache_alloc_node+0x48/0x1d0 [ 585.377837][T11086] ? kernfs_xattr_get+0x67/0x80 [ 585.382701][T11086] ? kstrdup_const+0x3e/0x50 [ 585.387354][T11086] __kmalloc_node_track_caller+0x96/0x1a0 [ 585.393090][T11086] kstrdup+0x3a/0x70 [ 585.396998][T11086] kstrdup_const+0x3e/0x50 [ 585.401425][T11086] __kernfs_new_node+0x41/0x380 [ 585.406285][T11086] ? rb_insert_color+0x6a/0x290 [ 585.411141][T11086] ? up_write+0x30/0xe0 [ 585.415319][T11086] ? kernfs_activate+0x252/0x270 [ 585.420350][T11086] kernfs_new_node+0x5f/0xd0 [ 585.424993][T11086] kernfs_create_link+0x6c/0x120 [ 585.430057][T11086] sysfs_do_create_link_sd+0x6b/0xf0 [ 585.435349][T11086] sysfs_create_link+0x51/0x70 [ 585.440114][T11086] device_add_class_symlinks+0x159/0x1e0 [ 585.445926][T11086] device_add+0x410/0x8b0 [ 585.450302][T11086] netdev_register_kobject+0xfc/0x230 [ 585.455743][T11086] register_netdevice+0x680/0xb40 [ 585.460794][T11086] ? rb_erase+0x117/0x6a0 [ 585.465141][T11086] ? validate_linkmsg+0x511/0x590 [ 585.470260][T11086] ipvlan_link_new+0x295/0x5c0 [ 585.475028][T11086] ? ipvlan_multicast_enqueue+0x270/0x270 [ 585.480807][T11086] rtnl_newlink+0xee5/0x1670 [ 585.485426][T11086] ? cgroup_rstat_updated+0x8c/0x1c0 [ 585.490770][T11086] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 585.497034][T11086] ? _raw_spin_unlock+0x26/0x40 [ 585.502070][T11086] ? __mutex_lock+0x21c/0x8d0 [ 585.506839][T11086] ? rtnl_setlink+0x300/0x300 [ 585.511609][T11086] rtnetlink_rcv_msg+0x807/0x8c0 [ 585.516656][T11086] ? put_dec_trunc8+0x10e/0x130 [ 585.521650][T11086] ? put_dec+0xcd/0xe0 [ 585.525774][T11086] ? number+0x98d/0xa90 [ 585.530008][T11086] ? xas_load+0x3ae/0x3c0 [ 585.534333][T11086] ? skb_release_data+0x53d/0x550 [ 585.539497][T11086] ? kmem_cache_free+0x1db/0x3a0 [ 585.544519][T11086] ? __kfree_skb+0x104/0x140 [ 585.549132][T11086] ? nlmon_xmit+0x4b/0x60 [ 585.553467][T11086] ? __kfree_skb+0x104/0x140 [ 585.558071][T11086] ? consume_skb+0x57/0x180 [ 585.562585][T11086] ? nlmon_xmit+0x4b/0x60 [ 585.566927][T11086] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 585.572330][T11086] ? __dev_queue_xmit+0xad9/0x1e20 [ 585.577481][T11086] ? ref_tracker_free+0x3a1/0x400 [ 585.582516][T11086] netlink_rcv_skb+0x126/0x220 [ 585.587375][T11086] ? rtnetlink_bind+0x60/0x60 [ 585.592068][T11086] rtnetlink_rcv+0x1c/0x20 [ 585.596493][T11086] netlink_unicast+0x589/0x650 [ 585.601340][T11086] netlink_sendmsg+0x66e/0x770 [ 585.606285][T11086] ? netlink_getsockopt+0x3e0/0x3e0 [ 585.611496][T11086] ____sys_sendmsg+0x37c/0x4d0 [ 585.616418][T11086] __sys_sendmsg+0x1e9/0x270 [ 585.621048][T11086] __x64_sys_sendmsg+0x46/0x50 [ 585.625846][T11086] do_syscall_64+0x41/0xc0 [ 585.630362][T11086] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 585.636311][T11086] RIP: 0033:0x7f205db7fae9 [ 585.640722][T11086] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 585.660357][T11086] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 585.668778][T11086] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 585.676750][T11086] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 585.684849][T11086] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 03:42:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 585.692826][T11086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 585.700801][T11086] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 585.708859][T11086] [ 585.717897][T11085] macvtap25: entered allmulticast mode [ 585.725280][T11085] 8021q: adding VLAN 0 to HW filter on device macvtap25 03:42:08 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 21) 03:42:08 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 11) 03:42:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e23, @multicast2}, {0x2, 0x5e22, @multicast2}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='ip6gretap0\x00', 0x4, 0x7, 0x400}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x8, 0x6, 0x20000130, 0x20000280, 0x0, 0xde], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/618]}, 0x2e2) socket$inet_udp(0x2, 0x2, 0x0) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r1, 0x0, 0x0) (async) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x4e23, @multicast2}, {0x2, 0x5e22, @multicast2}, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='ip6gretap0\x00', 0x4, 0x7, 0x400}) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x8, 0x6, 0x20000130, 0x20000280, 0x0, 0xde], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/618]}, 0x2e2) (async) 03:42:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f00000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a00000004155444954000000000000000000fcffffffffffffff000000000000000008000800000000000000000000000000000000cb0590c025536bac9c0d4b136fee6c178dfdbf6a0b38d2b1cad1d021de19f676668c08c4c3483cc675defb76fa27cdbe69039a85356a923d9c9be95ddbd8d3214a8ed16180979661bddef8aaaf87998433c4f220d31c12e622abe1952ae49aa241e9e164ab36a7b7e5a2ff87875b3597ec4796bb03467d241089dcb2fcb82fa3afd8e723808d019831f92ef3ecd9b1f6353ffd96f30e12f31ebc6a6c9d213ed454f14bf597fa7cee7432e5d6c0c33b7852e1"]}, 0x37a) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x600000, 0x59) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r1}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @rand_addr=0x64010100}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x4}) r3 = accept4$unix(r1, 0x0, &(0x7f0000000100), 0x0) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '}^'}], 0xa, "3bbf39"}, 0x11) [ 585.756391][T11108] macvtap7: entered allmulticast mode [ 585.764584][T11108] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 585.783151][T11108] team0: Device macvtap7 is already an upper device of the team interface 03:42:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}, 0x37a) (async) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x600000, 0x59) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r1}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @rand_addr=0x64010100}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x4}) (async) r3 = accept4$unix(r1, 0x0, &(0x7f0000000100), 0x0) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '}^'}], 0xa, "3bbf39"}, 0x11) 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 585.817372][T11114] FAULT_INJECTION: forcing a failure. [ 585.817372][T11114] name failslab, interval 1, probability 0, space 0, times 0 [ 585.830156][T11114] CPU: 1 PID: 11114 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 585.840662][T11114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 585.850776][T11114] Call Trace: [ 585.854066][T11114] [ 585.857068][T11114] dump_stack_lvl+0xda/0x130 [ 585.861781][T11114] dump_stack+0x15/0x20 03:42:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 585.866001][T11114] should_fail_ex+0x21f/0x230 [ 585.870741][T11114] ? bitmap_zalloc+0x29/0x30 [ 585.875369][T11114] __should_failslab+0x92/0xa0 [ 585.880250][T11114] should_failslab+0x9/0x20 [ 585.884855][T11114] slab_pre_alloc_hook+0x38/0x180 [ 585.889912][T11114] ? bitmap_zalloc+0x29/0x30 [ 585.894603][T11114] ? bitmap_zalloc+0x29/0x30 [ 585.899239][T11114] __kmem_cache_alloc_node+0x48/0x1d0 [ 585.904656][T11114] ? bitmap_zalloc+0x29/0x30 [ 585.909271][T11114] __kmalloc+0x95/0x1a0 [ 585.913512][T11114] bitmap_zalloc+0x29/0x30 [ 585.917941][T11114] __dev_alloc_name+0x2a8/0x580 [ 585.922875][T11114] ? __rcu_read_unlock+0x4d/0x70 [ 585.927893][T11114] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 585.933541][T11114] dev_prep_valid_name+0x117/0x1f0 [ 585.938744][T11114] register_netdevice+0x15f/0xb40 [ 585.943858][T11114] ? rb_erase+0x117/0x6a0 [ 585.948223][T11114] ? rb_insert_color+0x280/0x290 [ 585.953208][T11114] ? validate_linkmsg+0x511/0x590 [ 585.958253][T11114] ipvlan_link_new+0x295/0x5c0 [ 585.963026][T11114] ? ipvlan_multicast_enqueue+0x270/0x270 [ 585.968830][T11114] rtnl_newlink+0xee5/0x1670 [ 585.973435][T11114] ? cgroup_rstat_updated+0x8c/0x1c0 [ 585.978751][T11114] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 585.985115][T11114] ? _raw_spin_unlock+0x26/0x40 [ 585.990055][T11114] ? __mutex_lock+0x21c/0x8d0 [ 585.994780][T11114] ? rtnl_setlink+0x300/0x300 [ 585.999506][T11114] rtnetlink_rcv_msg+0x807/0x8c0 [ 586.004493][T11114] ? put_dec_trunc8+0x10e/0x130 [ 586.009457][T11114] ? put_dec+0xcd/0xe0 [ 586.013556][T11114] ? number+0x98d/0xa90 [ 586.017735][T11114] ? try_charge_memcg+0xb49/0xd30 [ 586.022779][T11114] ? skb_release_data+0x53d/0x550 [ 586.027841][T11114] ? kmem_cache_free+0x1db/0x3a0 [ 586.032842][T11114] ? __kfree_skb+0x104/0x140 [ 586.037511][T11114] ? nlmon_xmit+0x4b/0x60 [ 586.041875][T11114] ? __kfree_skb+0x104/0x140 [ 586.046547][T11114] ? consume_skb+0x57/0x180 [ 586.051131][T11114] ? nlmon_xmit+0x4b/0x60 [ 586.055467][T11114] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 586.060790][T11114] ? __dev_queue_xmit+0xad9/0x1e20 [ 586.065919][T11114] ? ref_tracker_free+0x3a1/0x400 [ 586.071113][T11114] netlink_rcv_skb+0x126/0x220 [ 586.075907][T11114] ? rtnetlink_bind+0x60/0x60 [ 586.080600][T11114] rtnetlink_rcv+0x1c/0x20 [ 586.085170][T11114] netlink_unicast+0x589/0x650 [ 586.090013][T11114] netlink_sendmsg+0x66e/0x770 [ 586.094807][T11114] ? netlink_getsockopt+0x3e0/0x3e0 [ 586.100186][T11114] ____sys_sendmsg+0x37c/0x4d0 [ 586.104988][T11114] __sys_sendmsg+0x1e9/0x270 [ 586.109640][T11114] __x64_sys_sendmsg+0x46/0x50 [ 586.114439][T11114] do_syscall_64+0x41/0xc0 [ 586.118928][T11114] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 586.124875][T11114] RIP: 0033:0x7f0cd1f70ae9 [ 586.129414][T11114] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 586.149122][T11114] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 586.157638][T11114] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 586.165610][T11114] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 586.173579][T11114] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 586.181553][T11114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 586.189533][T11114] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 586.197524][T11114] [ 586.207157][T11116] macvtap26: entered allmulticast mode 03:42:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf2030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 586.214560][T11116] 8021q: adding VLAN 0 to HW filter on device macvtap26 [ 586.226800][T11121] FAULT_INJECTION: forcing a failure. [ 586.226800][T11121] name failslab, interval 1, probability 0, space 0, times 0 [ 586.239466][T11121] CPU: 0 PID: 11121 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 586.249909][T11121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 586.259990][T11121] Call Trace: [ 586.263273][T11121] [ 586.266208][T11121] dump_stack_lvl+0xda/0x130 [ 586.270839][T11121] dump_stack+0x15/0x20 [ 586.275053][T11121] should_fail_ex+0x21f/0x230 [ 586.279757][T11121] __should_failslab+0x92/0xa0 [ 586.284535][T11121] should_failslab+0x9/0x20 [ 586.289125][T11121] slab_pre_alloc_hook+0x38/0x180 [ 586.294183][T11121] kmem_cache_alloc+0x52/0x220 [ 586.299001][T11121] ? __kernfs_new_node+0x6a/0x380 [ 586.304079][T11121] __kernfs_new_node+0x6a/0x380 [ 586.308963][T11121] ? __radix_tree_replace+0x1c1/0x1f0 [ 586.314354][T11121] ? mutex_lock+0xd/0x30 [ 586.318639][T11121] ? kernfs_xattr_get+0x67/0x80 [ 586.323599][T11121] kernfs_new_node+0x5f/0xd0 [ 586.328293][T11121] __kernfs_create_file+0x49/0x180 [ 586.333421][T11121] ? dev_attr_show+0x90/0x90 [ 586.338020][T11121] sysfs_add_file_mode_ns+0x136/0x1b0 [ 586.343406][T11121] internal_create_group+0x2e4/0x800 [ 586.348704][T11121] sysfs_create_groups+0x3c/0xe0 [ 586.353647][T11121] device_add_attrs+0x69/0x400 [ 586.358500][T11121] ? kobject_put+0xd8/0x160 [ 586.363014][T11121] device_add+0x431/0x8b0 [ 586.367416][T11121] netdev_register_kobject+0xfc/0x230 [ 586.372861][T11121] register_netdevice+0x680/0xb40 [ 586.377963][T11121] ? rb_erase+0x117/0x6a0 [ 586.382350][T11121] ? validate_linkmsg+0x511/0x590 [ 586.387406][T11121] ipvlan_link_new+0x295/0x5c0 [ 586.392252][T11121] ? ipvlan_multicast_enqueue+0x270/0x270 [ 586.397985][T11121] rtnl_newlink+0xee5/0x1670 [ 586.402593][T11121] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 586.408864][T11121] ? _raw_spin_unlock+0x26/0x40 [ 586.413719][T11121] ? __mutex_lock+0x21c/0x8d0 [ 586.418411][T11121] ? rtnl_setlink+0x300/0x300 [ 586.423147][T11121] rtnetlink_rcv_msg+0x807/0x8c0 [ 586.428223][T11121] ? put_dec_trunc8+0x10e/0x130 [ 586.433091][T11121] ? put_dec+0xcd/0xe0 [ 586.437174][T11121] ? number+0x98d/0xa90 [ 586.441372][T11121] ? xas_load+0x3ae/0x3c0 [ 586.445747][T11121] ? skb_release_data+0x53d/0x550 [ 586.450879][T11121] ? kmem_cache_free+0x1db/0x3a0 [ 586.455896][T11121] ? __kfree_skb+0x104/0x140 [ 586.460598][T11121] ? nlmon_xmit+0x4b/0x60 [ 586.464992][T11121] ? __kfree_skb+0x104/0x140 [ 586.469598][T11121] ? consume_skb+0x57/0x180 [ 586.474218][T11121] ? nlmon_xmit+0x4b/0x60 [ 586.478570][T11121] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 586.483913][T11121] ? __dev_queue_xmit+0xad9/0x1e20 [ 586.489043][T11121] ? ref_tracker_free+0x3a1/0x400 [ 586.494146][T11121] netlink_rcv_skb+0x126/0x220 [ 586.499053][T11121] ? rtnetlink_bind+0x60/0x60 [ 586.503767][T11121] rtnetlink_rcv+0x1c/0x20 [ 586.508221][T11121] netlink_unicast+0x589/0x650 [ 586.513044][T11121] netlink_sendmsg+0x66e/0x770 [ 586.517845][T11121] ? netlink_getsockopt+0x3e0/0x3e0 [ 586.523055][T11121] ____sys_sendmsg+0x37c/0x4d0 [ 586.527852][T11121] __sys_sendmsg+0x1e9/0x270 [ 586.532467][T11121] __x64_sys_sendmsg+0x46/0x50 [ 586.537291][T11121] do_syscall_64+0x41/0xc0 [ 586.541722][T11121] ? irqentry_exit+0x12/0x40 [ 586.546315][T11121] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 586.552233][T11121] RIP: 0033:0x7f205db7fae9 [ 586.556679][T11121] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 586.576301][T11121] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 586.584722][T11121] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 586.592703][T11121] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 586.600699][T11121] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 586.608669][T11121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:09 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 22) 03:42:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f00000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a00000004155444954000000000000000000fcffffffffffffff000000000000000008000800000000000000000000000000000000cb0590c025536bac9c0d4b136fee6c178dfdbf6a0b38d2b1cad1d021de19f676668c08c4c3483cc675defb76fa27cdbe69039a85356a923d9c9be95ddbd8d3214a8ed16180979661bddef8aaaf87998433c4f220d31c12e622abe1952ae49aa241e9e164ab36a7b7e5a2ff87875b3597ec4796bb03467d241089dcb2fcb82fa3afd8e723808d019831f92ef3ecd9b1f6353ffd96f30e12f31ebc6a6c9d213ed454f14bf597fa7cee7432e5d6c0c33b7852e1"]}, 0x37a) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x600000, 0x59) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r1}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @rand_addr=0x64010100}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x4}) r3 = accept4$unix(r1, 0x0, &(0x7f0000000100), 0x0) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '}^'}], 0xa, "3bbf39"}, 0x11) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}, 0x37a) (async) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x600000, 0x59) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r1}) (async) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e20, @rand_addr=0x64010100}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x6, 0x4}) (async) accept4$unix(r1, 0x0, &(0x7f0000000100), 0x0) (async) write$binfmt_script(r3, &(0x7f0000000140)={'#! ', './file0', [{0x20, '}^'}], 0xa, "3bbf39"}, 0x11) (async) 03:42:09 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 12) 03:42:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 586.616648][T11121] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 586.624686][T11121] [ 586.638968][T11134] macvtap7: entered allmulticast mode [ 586.647557][T11134] 8021q: adding VLAN 0 to HW filter on device macvtap7 03:42:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x200000fd, 0x20000130, 0x20000280, 0x2], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 03:42:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x200000fd, 0x20000130, 0x20000280, 0x2], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) (async) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x200000fd, 0x20000130, 0x20000280, 0x2], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (async) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 586.678122][T11134] team0: Device macvtap7 is already an upper device of the team interface [ 586.705505][T11149] FAULT_INJECTION: forcing a failure. [ 586.705505][T11149] name failslab, interval 1, probability 0, space 0, times 0 [ 586.718195][T11149] CPU: 0 PID: 11149 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 03:42:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 586.728644][T11149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 586.738800][T11149] Call Trace: [ 586.738810][T11149] [ 586.745116][T11149] dump_stack_lvl+0xda/0x130 [ 586.749748][T11149] dump_stack+0x15/0x20 [ 586.753998][T11149] should_fail_ex+0x21f/0x230 [ 586.758705][T11149] __should_failslab+0x92/0xa0 [ 586.763511][T11149] should_failslab+0x9/0x20 [ 586.768048][T11149] slab_pre_alloc_hook+0x38/0x180 [ 586.773114][T11149] kmem_cache_alloc+0x52/0x220 03:42:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 586.777913][T11149] ? __kernfs_new_node+0x6a/0x380 [ 586.782979][T11149] __kernfs_new_node+0x6a/0x380 [ 586.787879][T11149] ? __radix_tree_replace+0x1c1/0x1f0 [ 586.793407][T11149] ? mutex_lock+0xd/0x30 [ 586.797684][T11149] ? kernfs_xattr_get+0x67/0x80 [ 586.802706][T11149] kernfs_new_node+0x5f/0xd0 [ 586.807418][T11149] __kernfs_create_file+0x49/0x180 [ 586.812639][T11149] ? dev_attr_show+0x90/0x90 [ 586.817247][T11149] sysfs_add_file_mode_ns+0x136/0x1b0 [ 586.822660][T11149] internal_create_group+0x2e4/0x800 [ 586.827952][T11149] sysfs_create_groups+0x3c/0xe0 [ 586.832960][T11149] device_add_attrs+0x69/0x400 [ 586.837737][T11149] ? kobject_put+0xd8/0x160 [ 586.842254][T11149] device_add+0x431/0x8b0 [ 586.846643][T11149] netdev_register_kobject+0xfc/0x230 [ 586.852097][T11149] register_netdevice+0x680/0xb40 [ 586.857145][T11149] ? rb_erase+0x117/0x6a0 [ 586.861501][T11149] ? validate_linkmsg+0x511/0x590 [ 586.866613][T11149] ipvlan_link_new+0x295/0x5c0 [ 586.871379][T11149] ? ipvlan_multicast_enqueue+0x270/0x270 [ 586.877176][T11149] rtnl_newlink+0xee5/0x1670 [ 586.881793][T11149] ? cgroup_rstat_updated+0x8c/0x1c0 [ 586.887096][T11149] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 586.893406][T11149] ? _raw_spin_unlock+0x26/0x40 [ 586.898270][T11149] ? __mutex_lock+0x21c/0x8d0 [ 586.903052][T11149] ? rtnl_setlink+0x300/0x300 [ 586.907760][T11149] rtnetlink_rcv_msg+0x807/0x8c0 [ 586.912788][T11149] ? put_dec_trunc8+0x10e/0x130 [ 586.917725][T11149] ? put_dec+0xcd/0xe0 [ 586.921803][T11149] ? number+0x98d/0xa90 [ 586.925996][T11149] ? try_charge_memcg+0xb49/0xd30 [ 586.931109][T11149] ? xas_load+0x3ae/0x3c0 [ 586.935488][T11149] ? skb_release_data+0x53d/0x550 [ 586.940563][T11149] ? kmem_cache_free+0x1db/0x3a0 [ 586.945505][T11149] ? __kfree_skb+0x104/0x140 [ 586.950114][T11149] ? nlmon_xmit+0x4b/0x60 [ 586.954474][T11149] ? __kfree_skb+0x104/0x140 [ 586.959215][T11149] ? consume_skb+0x57/0x180 [ 586.963810][T11149] ? nlmon_xmit+0x4b/0x60 [ 586.968217][T11149] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 586.973575][T11149] ? __dev_queue_xmit+0xad9/0x1e20 [ 586.978694][T11149] ? ref_tracker_free+0x3a1/0x400 [ 586.983730][T11149] netlink_rcv_skb+0x126/0x220 [ 586.988603][T11149] ? rtnetlink_bind+0x60/0x60 [ 586.993332][T11149] rtnetlink_rcv+0x1c/0x20 [ 586.997851][T11149] netlink_unicast+0x589/0x650 [ 587.002668][T11149] netlink_sendmsg+0x66e/0x770 [ 587.007528][T11149] ? netlink_getsockopt+0x3e0/0x3e0 [ 587.012744][T11149] ____sys_sendmsg+0x37c/0x4d0 [ 587.017584][T11149] __sys_sendmsg+0x1e9/0x270 [ 587.022269][T11149] __x64_sys_sendmsg+0x46/0x50 [ 587.027157][T11149] do_syscall_64+0x41/0xc0 [ 587.031719][T11149] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 587.037646][T11149] RIP: 0033:0x7f205db7fae9 [ 587.042191][T11149] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 587.061820][T11149] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 587.070262][T11149] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 587.078246][T11149] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 587.086270][T11149] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 587.094297][T11149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 587.102301][T11149] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 [ 587.110299][T11149] 03:42:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf4030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x200000fd, 0x20000130, 0x20000280, 0x2], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) (async, rerun: 32) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000380)={0x0, 0x0, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) (rerun: 32) 03:42:10 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) (fail_nth: 23) [ 587.134624][T11146] macvtap27: entered allmulticast mode [ 587.147864][T11146] 8021q: adding VLAN 0 to HW filter on device macvtap27 [ 587.172419][T11139] FAULT_INJECTION: forcing a failure. [ 587.172419][T11139] name failslab, interval 1, probability 0, space 0, times 0 [ 587.185116][T11139] CPU: 0 PID: 11139 Comm: syz-executor.5 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 587.195546][T11139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 587.195563][T11139] Call Trace: [ 587.195572][T11139] [ 587.195593][T11139] dump_stack_lvl+0xda/0x130 [ 587.216502][T11139] dump_stack+0x15/0x20 [ 587.220774][T11139] should_fail_ex+0x21f/0x230 [ 587.225696][T11139] ? register_netdevice+0x1ab/0xb40 [ 587.230927][T11139] __should_failslab+0x92/0xa0 [ 587.235836][T11139] should_failslab+0x9/0x20 [ 587.240347][T11139] slab_pre_alloc_hook+0x38/0x180 [ 587.245398][T11139] ? register_netdevice+0x1ab/0xb40 [ 587.250634][T11139] __kmem_cache_alloc_node+0x48/0x1d0 [ 587.256089][T11139] ? register_netdevice+0x1ab/0xb40 [ 587.261350][T11139] kmalloc_trace+0x2a/0xa0 [ 587.265777][T11139] register_netdevice+0x1ab/0xb40 [ 587.270930][T11139] ? rb_erase+0x117/0x6a0 [ 587.275299][T11139] ? rb_insert_color+0x280/0x290 [ 587.280331][T11139] ? validate_linkmsg+0x511/0x590 [ 587.285467][T11139] ipvlan_link_new+0x295/0x5c0 [ 587.290313][T11139] ? ipvlan_multicast_enqueue+0x270/0x270 [ 587.296101][T11139] rtnl_newlink+0xee5/0x1670 [ 587.300726][T11139] ? cgroup_rstat_updated+0x8c/0x1c0 [ 587.306044][T11139] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 587.312326][T11139] ? _raw_spin_unlock+0x26/0x40 [ 587.317189][T11139] ? __mutex_lock+0x21c/0x8d0 [ 587.321903][T11139] ? rtnl_setlink+0x300/0x300 [ 587.326675][T11139] rtnetlink_rcv_msg+0x807/0x8c0 [ 587.331638][T11139] ? put_dec_trunc8+0x10e/0x130 [ 587.336503][T11139] ? put_dec+0xcd/0xe0 [ 587.340583][T11139] ? number+0x98d/0xa90 [ 587.344829][T11139] ? xas_load+0x3ae/0x3c0 [ 587.349168][T11139] ? skb_release_data+0x53d/0x550 [ 587.354224][T11139] ? kmem_cache_free+0x1db/0x3a0 [ 587.359214][T11139] ? __kfree_skb+0x104/0x140 [ 587.363828][T11139] ? nlmon_xmit+0x4b/0x60 [ 587.368181][T11139] ? __kfree_skb+0x104/0x140 [ 587.372838][T11139] ? consume_skb+0x57/0x180 [ 587.377401][T11139] ? nlmon_xmit+0x4b/0x60 [ 587.381736][T11139] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 587.387031][T11139] ? __dev_queue_xmit+0xad9/0x1e20 [ 587.392207][T11139] ? ref_tracker_free+0x3a1/0x400 [ 587.397320][T11139] netlink_rcv_skb+0x126/0x220 [ 587.402106][T11139] ? rtnetlink_bind+0x60/0x60 [ 587.406831][T11139] rtnetlink_rcv+0x1c/0x20 [ 587.411285][T11139] netlink_unicast+0x589/0x650 [ 587.416062][T11139] netlink_sendmsg+0x66e/0x770 [ 587.420881][T11139] ? netlink_getsockopt+0x3e0/0x3e0 [ 587.426184][T11139] ____sys_sendmsg+0x37c/0x4d0 [ 587.431043][T11139] __sys_sendmsg+0x1e9/0x270 [ 587.435731][T11139] __x64_sys_sendmsg+0x46/0x50 [ 587.440510][T11139] do_syscall_64+0x41/0xc0 [ 587.445002][T11139] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 587.450921][T11139] RIP: 0033:0x7f0cd1f70ae9 [ 587.455509][T11139] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 587.475132][T11139] RSP: 002b:00007f0cd12f30c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:42:10 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 587.483574][T11139] RAX: ffffffffffffffda RBX: 00007f0cd208ff80 RCX: 00007f0cd1f70ae9 [ 587.491639][T11139] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 000000000000000a [ 587.499625][T11139] RBP: 00007f0cd12f3120 R08: 0000000000000000 R09: 0000000000000000 [ 587.507599][T11139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 587.515570][T11139] R13: 000000000000000b R14: 00007f0cd208ff80 R15: 00007ffe71a80e98 [ 587.523610][T11139] 03:42:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 1) [ 587.543772][T11164] macvtap7: entered allmulticast mode [ 587.556450][T11164] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 587.570495][T11164] team0: Device macvtap7 is already an upper device of the team interface [ 587.571870][T11178] FAULT_INJECTION: forcing a failure. [ 587.571870][T11178] name fail_usercopy, interval 1, probability 0, space 0, times 0 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 587.592173][T11178] CPU: 1 PID: 11178 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 587.602657][T11178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 587.612923][T11178] Call Trace: [ 587.616300][T11178] [ 587.619257][T11178] dump_stack_lvl+0xda/0x130 [ 587.623995][T11178] dump_stack+0x15/0x20 [ 587.628282][T11178] should_fail_ex+0x21f/0x230 [ 587.632993][T11178] should_fail+0xb/0x10 [ 587.637231][T11178] should_fail_usercopy+0x1a/0x20 03:42:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 587.642364][T11178] _copy_from_user+0x1e/0xd0 [ 587.647008][T11178] copy_msghdr_from_user+0x54/0x2a0 [ 587.652264][T11178] __sys_sendmsg+0x17d/0x270 [ 587.656928][T11178] __x64_sys_sendmsg+0x46/0x50 [ 587.661798][T11178] do_syscall_64+0x41/0xc0 [ 587.666353][T11178] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 587.672355][T11178] RIP: 0033:0x7f7514d76ae9 [ 587.676790][T11178] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 587.696444][T11178] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 587.704881][T11178] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 587.712860][T11178] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 587.720910][T11178] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 587.728991][T11178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.736973][T11178] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 587.745005][T11178] [ 587.767776][T11166] FAULT_INJECTION: forcing a failure. [ 587.767776][T11166] name failslab, interval 1, probability 0, space 0, times 0 [ 587.780531][T11166] CPU: 0 PID: 11166 Comm: syz-executor.2 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 587.791022][T11166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 587.801110][T11166] Call Trace: [ 587.804390][T11166] [ 587.807333][T11166] dump_stack_lvl+0xda/0x130 [ 587.812026][T11166] dump_stack+0x15/0x20 [ 587.816211][T11166] should_fail_ex+0x21f/0x230 [ 587.821028][T11166] __should_failslab+0x92/0xa0 [ 587.825844][T11166] should_failslab+0x9/0x20 [ 587.830372][T11166] slab_pre_alloc_hook+0x38/0x180 [ 587.835427][T11166] kmem_cache_alloc+0x52/0x220 [ 587.840320][T11166] ? __kernfs_new_node+0x6a/0x380 [ 587.845437][T11166] __kernfs_new_node+0x6a/0x380 [ 587.850332][T11166] ? rb_insert_color+0x263/0x290 [ 587.855304][T11166] ? up_write+0x30/0xe0 [ 587.859509][T11166] ? kernfs_activate+0x252/0x270 [ 587.864519][T11166] kernfs_new_node+0x5f/0xd0 [ 587.869136][T11166] __kernfs_create_file+0x49/0x180 [ 587.874273][T11166] ? dev_attr_show+0x90/0x90 [ 587.878910][T11166] sysfs_add_file_mode_ns+0x136/0x1b0 [ 587.884469][T11166] internal_create_group+0x2e4/0x800 [ 587.889795][T11166] sysfs_create_groups+0x3c/0xe0 [ 587.894758][T11166] device_add_attrs+0x69/0x400 [ 587.899621][T11166] ? kobject_put+0xd8/0x160 [ 587.904146][T11166] device_add+0x431/0x8b0 [ 587.908499][T11166] netdev_register_kobject+0xfc/0x230 [ 587.913900][T11166] register_netdevice+0x680/0xb40 [ 587.918938][T11166] ? rb_erase+0x117/0x6a0 [ 587.923435][T11166] ? validate_linkmsg+0x511/0x590 [ 587.928505][T11166] ipvlan_link_new+0x295/0x5c0 [ 587.933271][T11166] ? ipvlan_multicast_enqueue+0x270/0x270 [ 587.939067][T11166] rtnl_newlink+0xee5/0x1670 [ 587.943686][T11166] ? cgroup_rstat_updated+0x8c/0x1c0 [ 587.949074][T11166] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 587.955332][T11166] ? _raw_spin_unlock+0x26/0x40 [ 587.960236][T11166] ? __mutex_lock+0x21c/0x8d0 [ 587.964930][T11166] ? rtnl_setlink+0x300/0x300 [ 587.969629][T11166] rtnetlink_rcv_msg+0x807/0x8c0 [ 587.974677][T11166] ? put_dec_trunc8+0x10e/0x130 [ 587.979614][T11166] ? put_dec+0xcd/0xe0 [ 587.983736][T11166] ? number+0x98d/0xa90 [ 587.987995][T11166] ? xas_load+0x3ae/0x3c0 [ 587.992350][T11166] ? skb_release_data+0x53d/0x550 [ 587.997440][T11166] ? kmem_cache_free+0x1db/0x3a0 [ 588.002421][T11166] ? __kfree_skb+0x104/0x140 [ 588.007071][T11166] ? nlmon_xmit+0x4b/0x60 [ 588.011434][T11166] ? __kfree_skb+0x104/0x140 [ 588.016136][T11166] ? consume_skb+0x57/0x180 [ 588.020655][T11166] ? nlmon_xmit+0x4b/0x60 [ 588.025008][T11166] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 588.030336][T11166] ? __dev_queue_xmit+0xad9/0x1e20 [ 588.035511][T11166] ? ref_tracker_free+0x3a1/0x400 [ 588.040666][T11166] netlink_rcv_skb+0x126/0x220 [ 588.045453][T11166] ? rtnetlink_bind+0x60/0x60 [ 588.050277][T11166] rtnetlink_rcv+0x1c/0x20 [ 588.054775][T11166] netlink_unicast+0x589/0x650 [ 588.059602][T11166] netlink_sendmsg+0x66e/0x770 [ 588.064463][T11166] ? netlink_getsockopt+0x3e0/0x3e0 [ 588.069773][T11166] ____sys_sendmsg+0x37c/0x4d0 [ 588.074562][T11166] __sys_sendmsg+0x1e9/0x270 [ 588.079215][T11166] __x64_sys_sendmsg+0x46/0x50 [ 588.084020][T11166] do_syscall_64+0x41/0xc0 [ 588.088472][T11166] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 588.094431][T11166] RIP: 0033:0x7f205db7fae9 [ 588.098845][T11166] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 588.118482][T11166] RSP: 002b:00007f205cf020c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 588.126964][T11166] RAX: ffffffffffffffda RBX: 00007f205dc9ef80 RCX: 00007f205db7fae9 [ 588.135010][T11166] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000011 [ 588.143015][T11166] RBP: 00007f205cf02120 R08: 0000000000000000 R09: 0000000000000000 [ 588.150989][T11166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 588.159189][T11166] R13: 000000000000000b R14: 00007f205dc9ef80 R15: 00007ffe2ca10168 03:42:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfb0a0000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000002000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 2) 03:42:11 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 588.167184][T11166] [ 588.176055][T11176] macvtap28: entered allmulticast mode [ 588.186858][T11176] 8021q: adding VLAN 0 to HW filter on device macvtap28 [ 588.209988][T11175] ipvlan8: entered promiscuous mode [ 588.215610][T11190] FAULT_INJECTION: forcing a failure. [ 588.215610][T11190] name failslab, interval 1, probability 0, space 0, times 0 [ 588.228372][T11190] CPU: 0 PID: 11190 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 588.238813][T11190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 588.248945][T11190] Call Trace: [ 588.252246][T11190] [ 588.255249][T11190] dump_stack_lvl+0xda/0x130 [ 588.259862][T11190] dump_stack+0x15/0x20 [ 588.264050][T11190] should_fail_ex+0x21f/0x230 [ 588.268771][T11190] __should_failslab+0x92/0xa0 [ 588.273679][T11190] should_failslab+0x9/0x20 [ 588.278203][T11190] slab_pre_alloc_hook+0x38/0x180 [ 588.283260][T11190] kmem_cache_alloc_node+0x54/0x240 [ 588.288502][T11190] ? __alloc_skb+0x109/0x2e0 [ 588.293196][T11190] __alloc_skb+0x109/0x2e0 [ 588.297670][T11190] netlink_sendmsg+0x483/0x770 [ 588.302454][T11190] ? netlink_getsockopt+0x3e0/0x3e0 [ 588.307690][T11190] ____sys_sendmsg+0x37c/0x4d0 [ 588.312543][T11190] __sys_sendmsg+0x1e9/0x270 [ 588.317161][T11190] __x64_sys_sendmsg+0x46/0x50 [ 588.321967][T11190] do_syscall_64+0x41/0xc0 [ 588.326428][T11190] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 588.332407][T11190] RIP: 0033:0x7f7514d76ae9 [ 588.336841][T11190] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 588.356611][T11190] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 588.365031][T11190] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 588.373094][T11190] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 588.381091][T11190] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 588.389160][T11190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.397135][T11190] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 588.405218][T11190] 03:42:11 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000001ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 3) 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 4) [ 588.438992][T11193] macvtap7: entered allmulticast mode [ 588.446803][T11193] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 588.455931][T11193] team0: Device macvtap7 is already an upper device of the team interface 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 588.501975][T11194] ipvlan12: entered promiscuous mode [ 588.514007][T11194] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 588.526782][T11194] team0: Device ipvlan12 is already an upper device of the team interface [ 588.536080][T11205] FAULT_INJECTION: forcing a failure. [ 588.536080][T11205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 588.549226][T11205] CPU: 1 PID: 11205 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 588.559718][T11205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 588.569783][T11205] Call Trace: [ 588.573062][T11205] [ 588.575996][T11205] dump_stack_lvl+0xda/0x130 [ 588.580715][T11205] dump_stack+0x15/0x20 [ 588.584883][T11205] should_fail_ex+0x21f/0x230 [ 588.589570][T11205] should_fail+0xb/0x10 [ 588.593774][T11205] should_fail_usercopy+0x1a/0x20 [ 588.598874][T11205] _copy_from_iter+0xd8/0xa90 [ 588.603569][T11205] ? kmalloc_reserve+0xfb/0x190 [ 588.608464][T11205] ? __build_skb_around+0x196/0x1f0 [ 588.613754][T11205] ? __virt_addr_valid+0x16a/0x1b0 [ 588.618967][T11205] ? __check_object_size+0x364/0x510 [ 588.624349][T11205] netlink_sendmsg+0x53c/0x770 [ 588.629253][T11205] ? netlink_getsockopt+0x3e0/0x3e0 [ 588.634470][T11205] ____sys_sendmsg+0x37c/0x4d0 [ 588.639326][T11205] __sys_sendmsg+0x1e9/0x270 [ 588.643940][T11205] __x64_sys_sendmsg+0x46/0x50 [ 588.648784][T11205] do_syscall_64+0x41/0xc0 [ 588.653218][T11205] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 588.659150][T11205] RIP: 0033:0x7f7514d76ae9 [ 588.663564][T11205] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 588.683216][T11205] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 588.691692][T11205] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 03:42:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfc0a0000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff02000000000000000000000000000000000000000000000000000000000000000000000000000000001ed524ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 588.699669][T11205] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 588.707655][T11205] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 588.715628][T11205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.723624][T11205] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 588.731618][T11205] 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000029ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 588.764490][T11201] ipvlan8: entered promiscuous mode [ 588.805461][T11204] macvtap29: entered allmulticast mode [ 588.812651][T11204] 8021q: adding VLAN 0 to HW filter on device macvtap29 [ 588.831355][T11214] macvtap7: entered allmulticast mode [ 588.839166][T11214] 8021q: adding VLAN 0 to HW filter on device macvtap7 03:42:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 5) 03:42:11 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:11 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 588.848443][T11214] team0: Device macvtap7 is already an upper device of the team interface [ 588.886799][T11218] FAULT_INJECTION: forcing a failure. [ 588.886799][T11218] name failslab, interval 1, probability 0, space 0, times 0 [ 588.899507][T11218] CPU: 0 PID: 11218 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 588.910084][T11218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 588.920163][T11218] Call Trace: [ 588.923466][T11218] [ 588.926412][T11218] dump_stack_lvl+0xda/0x130 [ 588.931128][T11218] dump_stack+0x15/0x20 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000110000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000290000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 588.935398][T11218] should_fail_ex+0x21f/0x230 [ 588.940129][T11218] __should_failslab+0x92/0xa0 [ 588.944950][T11218] should_failslab+0x9/0x20 [ 588.949586][T11218] slab_pre_alloc_hook+0x38/0x180 [ 588.954641][T11218] kmem_cache_alloc+0x52/0x220 [ 588.959493][T11218] ? skb_clone+0x154/0x1e0 [ 588.964006][T11218] skb_clone+0x154/0x1e0 [ 588.968300][T11218] __netlink_deliver_tap+0x2c0/0x4c0 [ 588.973653][T11218] netlink_unicast+0x62f/0x650 [ 588.978522][T11218] netlink_sendmsg+0x66e/0x770 [ 588.983338][T11218] ? netlink_getsockopt+0x3e0/0x3e0 [ 588.988625][T11218] ____sys_sendmsg+0x37c/0x4d0 [ 588.993509][T11218] __sys_sendmsg+0x1e9/0x270 [ 588.998190][T11218] __x64_sys_sendmsg+0x46/0x50 [ 589.003112][T11218] do_syscall_64+0x41/0xc0 [ 589.007673][T11218] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 589.013585][T11218] RIP: 0033:0x7f7514d76ae9 [ 589.018062][T11218] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 589.037717][T11218] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 589.046218][T11218] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 589.054207][T11218] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 589.062215][T11218] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 589.070186][T11218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.078184][T11218] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 589.086240][T11218] [ 589.094994][T11218] team_slave_0: entered promiscuous mode [ 589.100684][T11218] team_slave_1: entered promiscuous mode [ 589.106779][T11218] macvtap1: entered allmulticast mode [ 589.112293][T11218] team0: entered allmulticast mode [ 589.117448][T11218] team_slave_0: entered allmulticast mode [ 589.123234][T11218] team_slave_1: entered allmulticast mode [ 589.130519][T11218] 8021q: adding VLAN 0 to HW filter on device macvtap1 03:42:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfe030000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000880000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.138848][T11218] team0: Device macvtap1 is already an upper device of the team interface [ 589.151157][T11218] team0: left allmulticast mode [ 589.156071][T11218] team_slave_0: left allmulticast mode [ 589.161546][T11218] team_slave_1: left allmulticast mode [ 589.167076][T11218] team_slave_0: left promiscuous mode [ 589.172494][T11218] team_slave_1: left promiscuous mode [ 589.202352][T11222] ipvlan12: entered promiscuous mode [ 589.209215][T11222] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 589.217772][T11222] team0: Device ipvlan12 is already an upper device of the team interface [ 589.236484][T11224] ipvlan8: entered promiscuous mode 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 6) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:12 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:12 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 589.257273][T11229] macvtap30: entered allmulticast mode [ 589.264643][T11229] 8021q: adding VLAN 0 to HW filter on device macvtap30 [ 589.277097][T11238] macvtap7: entered allmulticast mode [ 589.282784][T11238] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 589.292470][T11238] team0: Device macvtap7 is already an upper device of the team interface 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.347902][T11246] macvtap31: entered allmulticast mode [ 589.356093][T11246] 8021q: adding VLAN 0 to HW filter on device macvtap31 [ 589.366423][T11250] FAULT_INJECTION: forcing a failure. [ 589.366423][T11250] name failslab, interval 1, probability 0, space 0, times 0 [ 589.379137][T11250] CPU: 0 PID: 11250 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.389586][T11250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 589.399667][T11250] Call Trace: [ 589.402967][T11250] [ 589.405913][T11250] dump_stack_lvl+0xda/0x130 [ 589.410679][T11250] dump_stack+0x15/0x20 [ 589.414933][T11250] should_fail_ex+0x21f/0x230 [ 589.419699][T11250] ? rtnl_newlink+0x5d/0x1670 [ 589.424487][T11250] __should_failslab+0x92/0xa0 [ 589.429278][T11250] should_failslab+0x9/0x20 [ 589.433838][T11250] slab_pre_alloc_hook+0x38/0x180 [ 589.438907][T11250] ? rtnl_newlink+0x5d/0x1670 [ 589.443635][T11250] __kmem_cache_alloc_node+0x48/0x1d0 [ 589.449043][T11250] ? rtnl_newlink+0x5d/0x1670 [ 589.453742][T11250] kmalloc_trace+0x2a/0xa0 [ 589.458253][T11250] rtnl_newlink+0x5d/0x1670 [ 589.462853][T11250] ? __rcu_read_unlock+0x4d/0x70 [ 589.467880][T11250] ? avc_has_perm_noaudit+0x1c8/0x210 [ 589.473373][T11250] ? selinux_capable+0x1ec/0x250 [ 589.478342][T11250] ? __mutex_lock+0x54/0x8d0 [ 589.483091][T11250] ? rtnl_setlink+0x300/0x300 [ 589.487784][T11250] rtnetlink_rcv_msg+0x807/0x8c0 [ 589.492758][T11250] ? memcg_list_lru_alloc+0xd5/0x750 [ 589.498059][T11250] ? should_fail_ex+0x2d/0x230 [ 589.502857][T11250] ? slab_post_alloc_hook+0x8c/0x340 [ 589.508178][T11250] ? xas_load+0x3ae/0x3c0 [ 589.512511][T11250] ? skb_release_data+0x53d/0x550 [ 589.517610][T11250] ? kmem_cache_free+0x1db/0x3a0 [ 589.522563][T11250] ? __kfree_skb+0x104/0x140 [ 589.527198][T11250] ? nlmon_xmit+0x4b/0x60 [ 589.531592][T11250] ? __kfree_skb+0x104/0x140 [ 589.536283][T11250] ? consume_skb+0x57/0x180 [ 589.540920][T11250] ? nlmon_xmit+0x4b/0x60 [ 589.545328][T11250] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 589.550634][T11250] ? __dev_queue_xmit+0xad9/0x1e20 [ 589.555770][T11250] ? ref_tracker_free+0x3a1/0x400 [ 589.560865][T11250] netlink_rcv_skb+0x126/0x220 [ 589.565721][T11250] ? rtnetlink_bind+0x60/0x60 [ 589.570424][T11250] rtnetlink_rcv+0x1c/0x20 [ 589.574975][T11250] netlink_unicast+0x589/0x650 [ 589.579850][T11250] netlink_sendmsg+0x66e/0x770 [ 589.584730][T11250] ? netlink_getsockopt+0x3e0/0x3e0 [ 589.589964][T11250] ____sys_sendmsg+0x37c/0x4d0 [ 589.594800][T11250] __sys_sendmsg+0x1e9/0x270 [ 589.599446][T11250] __x64_sys_sendmsg+0x46/0x50 [ 589.604242][T11250] do_syscall_64+0x41/0xc0 [ 589.608726][T11250] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 589.614635][T11250] RIP: 0033:0x7f7514d76ae9 [ 589.619054][T11250] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 589.638673][T11250] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:42:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfe1f0000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000002900ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 589.647239][T11250] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 589.655486][T11250] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 589.664403][T11250] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 589.672383][T11250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.680361][T11250] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 589.688339][T11250] 03:42:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 7) 03:42:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.705286][T11248] ipvlan8: entered promiscuous mode 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.748325][T11245] ipvlan12: entered promiscuous mode [ 589.756551][T11245] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 589.765731][T11245] team0: Device ipvlan12 is already an upper device of the team interface [ 589.794999][T11261] macvtap7: entered allmulticast mode [ 589.801506][T11261] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 589.810444][T11261] team0: Device macvtap7 is already an upper device of the team interface [ 589.835731][T11265] macvtap32: entered allmulticast mode 03:42:12 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:12 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 589.843078][T11265] 8021q: adding VLAN 0 to HW filter on device macvtap32 [ 589.859483][T11266] team_slave_0: entered promiscuous mode [ 589.865183][T11266] team_slave_1: entered promiscuous mode [ 589.883556][T11266] macvtap1: entered allmulticast mode [ 589.889018][T11266] team0: entered allmulticast mode 03:42:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfeffffff, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.894221][T11266] team_slave_0: entered allmulticast mode [ 589.900024][T11266] team_slave_1: entered allmulticast mode [ 589.916138][T11266] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 589.925421][T11266] team0: Device macvtap1 is already an upper device of the team interface [ 589.935043][T11266] team0: left allmulticast mode [ 589.940011][T11266] team_slave_0: left allmulticast mode 03:42:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 589.945679][T11266] team_slave_1: left allmulticast mode [ 589.951252][T11266] team_slave_0: left promiscuous mode [ 589.956680][T11266] team_slave_1: left promiscuous mode [ 589.984547][T11275] macvtap33: entered allmulticast mode [ 589.991669][T11275] 8021q: adding VLAN 0 to HW filter on device macvtap33 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 8) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000011ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000029ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 590.003234][T11278] ipvlan12: entered promiscuous mode [ 590.009944][T11278] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 590.019508][T11278] team0: Device ipvlan12 is already an upper device of the team interface 03:42:13 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 590.061296][T11280] macvtap7: entered allmulticast mode [ 590.067960][T11280] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 590.076909][T11280] team0: Device macvtap7 is already an upper device of the team interface [ 590.094793][T11276] ipvlan8: entered promiscuous mode [ 590.138941][T11291] FAULT_INJECTION: forcing a failure. [ 590.138941][T11291] name failslab, interval 1, probability 0, space 0, times 0 [ 590.151741][T11291] CPU: 0 PID: 11291 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 590.162237][T11291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 590.172331][T11291] Call Trace: [ 590.175699][T11291] [ 590.178670][T11291] dump_stack_lvl+0xda/0x130 [ 590.183378][T11291] dump_stack+0x15/0x20 [ 590.187576][T11291] should_fail_ex+0x21f/0x230 [ 590.192304][T11291] ? __hw_addr_add_ex+0x13d/0x350 [ 590.197351][T11291] __should_failslab+0x92/0xa0 [ 590.202146][T11291] should_failslab+0x9/0x20 [ 590.206701][T11291] slab_pre_alloc_hook+0x38/0x180 [ 590.211889][T11291] ? __hw_addr_add_ex+0x13d/0x350 [ 590.216915][T11291] __kmem_cache_alloc_node+0x48/0x1d0 [ 590.222453][T11291] ? __hw_addr_add_ex+0x13d/0x350 [ 590.227482][T11291] kmalloc_trace+0x2a/0xa0 [ 590.231908][T11291] __hw_addr_add_ex+0x13d/0x350 [ 590.236820][T11291] dev_addr_init+0xb2/0x120 [ 590.241350][T11291] ? stack_depot_init+0x4f/0x130 [ 590.246305][T11291] alloc_netdev_mqs+0x1cc/0x8a0 [ 590.251212][T11291] ? macvlan_device_event+0x4e0/0x4e0 [ 590.256593][T11291] rtnl_create_link+0x23b/0x810 [ 590.261521][T11291] rtnl_newlink+0xdff/0x1670 [ 590.266140][T11291] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 590.272429][T11291] ? _raw_spin_unlock+0x26/0x40 [ 590.277385][T11291] ? __mutex_lock+0x21c/0x8d0 [ 590.282092][T11291] ? rtnl_setlink+0x300/0x300 [ 590.286791][T11291] rtnetlink_rcv_msg+0x807/0x8c0 [ 590.291841][T11291] ? memcg_list_lru_alloc+0xd5/0x750 [ 590.297197][T11291] ? should_fail_ex+0x2d/0x230 [ 590.301998][T11291] ? slab_post_alloc_hook+0x8c/0x340 [ 590.307313][T11291] ? xas_load+0x3ae/0x3c0 [ 590.311650][T11291] ? skb_release_data+0x53d/0x550 [ 590.316702][T11291] ? kmem_cache_free+0x1db/0x3a0 [ 590.321643][T11291] ? __kfree_skb+0x104/0x140 [ 590.326327][T11291] ? nlmon_xmit+0x4b/0x60 [ 590.330672][T11291] ? __kfree_skb+0x104/0x140 [ 590.335272][T11291] ? consume_skb+0x57/0x180 [ 590.339785][T11291] ? nlmon_xmit+0x4b/0x60 [ 590.344120][T11291] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 590.349499][T11291] ? __dev_queue_xmit+0xad9/0x1e20 [ 590.354619][T11291] ? ref_tracker_free+0x3a1/0x400 [ 590.359653][T11291] netlink_rcv_skb+0x126/0x220 [ 590.364436][T11291] ? rtnetlink_bind+0x60/0x60 [ 590.369193][T11291] rtnetlink_rcv+0x1c/0x20 [ 590.373674][T11291] netlink_unicast+0x589/0x650 [ 590.378500][T11291] netlink_sendmsg+0x66e/0x770 [ 590.383481][T11291] ? netlink_getsockopt+0x3e0/0x3e0 [ 590.388696][T11291] ____sys_sendmsg+0x37c/0x4d0 [ 590.393498][T11291] __sys_sendmsg+0x1e9/0x270 [ 590.398250][T11291] __x64_sys_sendmsg+0x46/0x50 [ 590.403085][T11291] do_syscall_64+0x41/0xc0 [ 590.407596][T11291] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 590.413538][T11291] RIP: 0033:0x7f7514d76ae9 [ 590.417978][T11291] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 590.437604][T11291] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 590.446155][T11291] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 590.454139][T11291] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 590.462196][T11291] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 590.470171][T11291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 590.478148][T11291] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 590.486211][T11291] 03:42:13 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xff7f0000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 9) 03:42:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffd0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 590.497772][T11292] macvtap34: entered allmulticast mode [ 590.505302][T11292] 8021q: adding VLAN 0 to HW filter on device macvtap34 [ 590.520400][T11298] ipvlan12: entered promiscuous mode 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 590.544754][T11298] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 590.558883][T11298] team0: Device ipvlan12 is already an upper device of the team interface 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 590.601236][T11303] macvtap7: entered allmulticast mode [ 590.607100][T11303] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 590.618421][T11303] team0: Device macvtap7 is already an upper device of the team interface [ 590.641156][T11306] ipvlan8: entered promiscuous mode [ 590.657262][T11305] team_slave_0: entered promiscuous mode [ 590.662970][T11305] team_slave_1: entered promiscuous mode [ 590.669172][T11305] macvtap1: entered allmulticast mode [ 590.674759][T11305] team0: entered allmulticast mode [ 590.679888][T11305] team_slave_0: entered allmulticast mode [ 590.685696][T11305] team_slave_1: entered allmulticast mode [ 590.692590][T11305] 8021q: adding VLAN 0 to HW filter on device macvtap1 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffff0300, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 590.703083][T11305] team0: Device macvtap1 is already an upper device of the team interface [ 590.712692][T11305] team0: left allmulticast mode [ 590.717701][T11305] team_slave_0: left allmulticast mode [ 590.723257][T11305] team_slave_1: left allmulticast mode [ 590.728782][T11305] team_slave_0: left promiscuous mode [ 590.734211][T11305] team_slave_1: left promiscuous mode 03:42:13 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:13 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0003000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 10) 03:42:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 590.765082][T11310] macvtap35: entered allmulticast mode [ 590.772692][T11310] 8021q: adding VLAN 0 to HW filter on device macvtap35 [ 590.784530][T11322] macvtap7: entered allmulticast mode [ 590.790050][T11322] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 590.801865][T11322] team0: Device macvtap7 is already an upper device of the team interface 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0111000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 590.845116][T11326] ipvlan8: entered promiscuous mode 03:42:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffa888, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:13 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 590.890320][T11332] macvtap36: entered allmulticast mode [ 590.897947][T11332] 8021q: adding VLAN 0 to HW filter on device macvtap36 [ 590.913216][T11328] ipvlan12: entered promiscuous mode [ 590.922481][T11328] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 590.931948][T11328] team0: Device ipvlan12 is already an upper device of the team interface [ 590.981848][T11334] FAULT_INJECTION: forcing a failure. [ 590.981848][T11334] name failslab, interval 1, probability 0, space 0, times 0 [ 590.994565][T11334] CPU: 0 PID: 11334 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 591.005061][T11334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 591.015120][T11334] Call Trace: [ 591.018410][T11334] [ 591.021348][T11334] dump_stack_lvl+0xda/0x130 [ 591.025987][T11334] dump_stack+0x15/0x20 [ 591.030227][T11334] should_fail_ex+0x21f/0x230 [ 591.034980][T11334] ? __hw_addr_add_ex+0x13d/0x350 [ 591.040133][T11334] __should_failslab+0x92/0xa0 [ 591.044989][T11334] should_failslab+0x9/0x20 [ 591.049501][T11334] slab_pre_alloc_hook+0x38/0x180 [ 591.054584][T11334] ? __hw_addr_add_ex+0x13d/0x350 [ 591.059636][T11334] __kmem_cache_alloc_node+0x48/0x1d0 [ 591.065107][T11334] ? __hw_addr_add_ex+0x13d/0x350 [ 591.070175][T11334] kmalloc_trace+0x2a/0xa0 [ 591.074706][T11334] __hw_addr_add_ex+0x13d/0x350 [ 591.079650][T11334] dev_addr_init+0xb2/0x120 [ 591.084250][T11334] ? stack_depot_init+0x4f/0x130 [ 591.089282][T11334] alloc_netdev_mqs+0x1cc/0x8a0 [ 591.094205][T11334] ? macvlan_device_event+0x4e0/0x4e0 [ 591.099621][T11334] rtnl_create_link+0x23b/0x810 [ 591.104505][T11334] rtnl_newlink+0xdff/0x1670 [ 591.109112][T11334] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 591.115416][T11334] ? _raw_spin_unlock+0x26/0x40 [ 591.120307][T11334] ? __mutex_lock+0x21c/0x8d0 [ 591.125059][T11334] ? rtnl_setlink+0x300/0x300 [ 591.129823][T11334] rtnetlink_rcv_msg+0x807/0x8c0 [ 591.134861][T11334] ? memcg_list_lru_alloc+0xd5/0x750 [ 591.140181][T11334] ? should_fail_ex+0x2d/0x230 [ 591.144951][T11334] ? slab_post_alloc_hook+0x8c/0x340 [ 591.150243][T11334] ? xas_load+0x3ae/0x3c0 [ 591.154633][T11334] ? skb_release_data+0x53d/0x550 [ 591.159714][T11334] ? kmem_cache_free+0x1db/0x3a0 [ 591.164659][T11334] ? __kfree_skb+0x104/0x140 [ 591.169351][T11334] ? nlmon_xmit+0x4b/0x60 [ 591.173700][T11334] ? __kfree_skb+0x104/0x140 [ 591.178356][T11334] ? consume_skb+0x57/0x180 [ 591.182906][T11334] ? nlmon_xmit+0x4b/0x60 [ 591.187254][T11334] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 591.192637][T11334] ? __dev_queue_xmit+0xad9/0x1e20 [ 591.197815][T11334] ? ref_tracker_free+0x3a1/0x400 [ 591.202865][T11334] netlink_rcv_skb+0x126/0x220 [ 591.207766][T11334] ? rtnetlink_bind+0x60/0x60 [ 591.212476][T11334] rtnetlink_rcv+0x1c/0x20 [ 591.217019][T11334] netlink_unicast+0x589/0x650 [ 591.221807][T11334] netlink_sendmsg+0x66e/0x770 [ 591.226674][T11334] ? netlink_getsockopt+0x3e0/0x3e0 [ 591.231946][T11334] ____sys_sendmsg+0x37c/0x4d0 [ 591.236833][T11334] __sys_sendmsg+0x1e9/0x270 [ 591.241485][T11334] __x64_sys_sendmsg+0x46/0x50 [ 591.246278][T11334] do_syscall_64+0x41/0xc0 [ 591.250784][T11334] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 591.256761][T11334] RIP: 0033:0x7f7514d76ae9 [ 591.261236][T11334] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 591.280851][T11334] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 591.289353][T11334] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 591.297346][T11334] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 591.305325][T11334] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 591.313296][T11334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 591.321335][T11334] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 591.329374][T11334] 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100200003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 11) 03:42:14 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 591.343198][T11340] macvtap7: entered allmulticast mode [ 591.348758][T11340] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 591.357738][T11340] team0: Device macvtap7 is already an upper device of the team interface [ 591.377401][T11346] macvtap37: entered allmulticast mode [ 591.386278][T11346] 8021q: adding VLAN 0 to HW filter on device macvtap37 03:42:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 591.414616][T11348] ipvlan8: entered promiscuous mode 03:42:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffe000, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 591.462072][T11352] FAULT_INJECTION: forcing a failure. [ 591.462072][T11352] name failslab, interval 1, probability 0, space 0, times 0 [ 591.474781][T11352] CPU: 1 PID: 11352 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 591.485221][T11352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 591.495348][T11352] Call Trace: [ 591.498646][T11352] [ 591.501599][T11352] dump_stack_lvl+0xda/0x130 [ 591.506243][T11352] dump_stack+0x15/0x20 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 591.510439][T11352] should_fail_ex+0x21f/0x230 [ 591.515149][T11352] ? macvlan_common_newlink+0x592/0xbc0 [ 591.520725][T11352] __should_failslab+0x92/0xa0 [ 591.525564][T11352] should_failslab+0x9/0x20 [ 591.530104][T11352] slab_pre_alloc_hook+0x38/0x180 [ 591.535165][T11352] ? macvlan_common_newlink+0x592/0xbc0 [ 591.540752][T11352] __kmem_cache_alloc_node+0x48/0x1d0 [ 591.546235][T11352] ? macvlan_common_newlink+0x592/0xbc0 [ 591.551813][T11352] kmalloc_trace+0x2a/0xa0 [ 591.556262][T11352] macvlan_common_newlink+0x592/0xbc0 [ 591.561671][T11352] ? mutex_is_locked+0xd/0x20 [ 591.566418][T11352] macvtap_newlink+0xf6/0x150 [ 591.571103][T11352] ? macvtap_setup+0x30/0x30 [ 591.575706][T11352] rtnl_newlink+0xee5/0x1670 [ 591.580385][T11352] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 591.586660][T11352] ? _raw_spin_unlock+0x26/0x40 [ 591.591560][T11352] ? __mutex_lock+0x21c/0x8d0 [ 591.596278][T11352] ? rtnl_setlink+0x300/0x300 [ 591.600967][T11352] rtnetlink_rcv_msg+0x807/0x8c0 [ 591.605924][T11352] ? memcg_alloc_slab_cgroups+0x4e/0xa0 [ 591.611487][T11352] ? slab_post_alloc_hook+0x8c/0x340 [ 591.616827][T11352] ? memcg_alloc_slab_cgroups+0x4e/0xa0 [ 591.622414][T11352] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 591.628121][T11352] ? xas_load+0x3ae/0x3c0 [ 591.632447][T11352] ? skb_release_data+0x53d/0x550 [ 591.637539][T11352] ? kmem_cache_free+0x1db/0x3a0 [ 591.642498][T11352] ? __kfree_skb+0x104/0x140 [ 591.647180][T11352] ? nlmon_xmit+0x4b/0x60 [ 591.651522][T11352] ? __kfree_skb+0x104/0x140 [ 591.656151][T11352] ? consume_skb+0x57/0x180 [ 591.660737][T11352] ? nlmon_xmit+0x4b/0x60 [ 591.665094][T11352] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 591.670449][T11352] ? __dev_queue_xmit+0xad9/0x1e20 [ 591.675593][T11352] ? ref_tracker_free+0x3a1/0x400 [ 591.680645][T11352] netlink_rcv_skb+0x126/0x220 [ 591.685427][T11352] ? rtnetlink_bind+0x60/0x60 [ 591.690143][T11352] rtnetlink_rcv+0x1c/0x20 [ 591.694604][T11352] netlink_unicast+0x589/0x650 [ 591.699432][T11352] netlink_sendmsg+0x66e/0x770 [ 591.704235][T11352] ? netlink_getsockopt+0x3e0/0x3e0 [ 591.709465][T11352] ____sys_sendmsg+0x37c/0x4d0 [ 591.714254][T11352] __sys_sendmsg+0x1e9/0x270 [ 591.718910][T11352] __x64_sys_sendmsg+0x46/0x50 [ 591.723692][T11352] do_syscall_64+0x41/0xc0 [ 591.728280][T11352] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 591.734223][T11352] RIP: 0033:0x7f7514d76ae9 [ 591.738645][T11352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 591.758305][T11352] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 591.766810][T11352] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 591.774797][T11352] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 591.782819][T11352] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 591.790846][T11352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 591.798880][T11352] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 591.806938][T11352] 03:42:14 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 12) [ 591.819945][T11356] macvtap38: entered allmulticast mode [ 591.828082][T11356] 8021q: adding VLAN 0 to HW filter on device macvtap38 [ 591.844361][T11355] ipvlan12: entered promiscuous mode [ 591.860466][T11355] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 591.871827][T11355] team0: Device ipvlan12 is already an upper device of the team interface [ 591.893508][T11360] macvtap7: entered allmulticast mode [ 591.899046][T11360] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 591.907848][T11360] team0: Device macvtap7 is already an upper device of the team interface 03:42:14 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100002003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 591.931186][T11376] ipvlan8: entered promiscuous mode [ 591.981254][T11375] FAULT_INJECTION: forcing a failure. [ 591.981254][T11375] name failslab, interval 1, probability 0, space 0, times 0 [ 591.993996][T11375] CPU: 0 PID: 11375 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 592.004441][T11375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 592.014574][T11375] Call Trace: [ 592.017876][T11375] [ 592.020820][T11375] dump_stack_lvl+0xda/0x130 [ 592.025493][T11375] dump_stack+0x15/0x20 03:42:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff7f, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100002903000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000203000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 592.029722][T11375] should_fail_ex+0x21f/0x230 [ 592.034539][T11375] ? bitmap_zalloc+0x29/0x30 [ 592.039165][T11375] __should_failslab+0x92/0xa0 [ 592.044012][T11375] should_failslab+0x9/0x20 [ 592.048549][T11375] slab_pre_alloc_hook+0x38/0x180 [ 592.053607][T11375] ? bitmap_zalloc+0x29/0x30 [ 592.058232][T11375] ? bitmap_zalloc+0x29/0x30 [ 592.062866][T11375] __kmem_cache_alloc_node+0x48/0x1d0 [ 592.068278][T11375] ? bitmap_zalloc+0x29/0x30 [ 592.072981][T11375] __kmalloc+0x95/0x1a0 [ 592.077159][T11375] bitmap_zalloc+0x29/0x30 [ 592.081630][T11375] __dev_alloc_name+0x2a8/0x580 [ 592.086594][T11375] dev_prep_valid_name+0x117/0x1f0 [ 592.091759][T11375] register_netdevice+0x15f/0xb40 [ 592.096956][T11375] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 592.102598][T11375] ? rtnl_is_locked+0x15/0x20 [ 592.107285][T11375] ? netdev_rx_handler_register+0x11a/0x140 [ 592.113197][T11375] macvlan_common_newlink+0xa1b/0xbc0 [ 592.118592][T11375] macvtap_newlink+0xf6/0x150 [ 592.123278][T11375] ? macvtap_setup+0x30/0x30 [ 592.127964][T11375] rtnl_newlink+0xee5/0x1670 [ 592.132724][T11375] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 592.138982][T11375] ? _raw_spin_unlock+0x26/0x40 [ 592.143915][T11375] ? __mutex_lock+0x21c/0x8d0 [ 592.148609][T11375] ? rtnl_setlink+0x300/0x300 [ 592.153431][T11375] rtnetlink_rcv_msg+0x807/0x8c0 [ 592.158406][T11375] ? memcg_list_lru_alloc+0xd5/0x750 [ 592.163709][T11375] ? should_fail_ex+0x2d/0x230 [ 592.168538][T11375] ? slab_post_alloc_hook+0x8c/0x340 [ 592.173894][T11375] ? xas_load+0x3ae/0x3c0 [ 592.178250][T11375] ? skb_release_data+0x53d/0x550 [ 592.183392][T11375] ? kmem_cache_free+0x1db/0x3a0 [ 592.188379][T11375] ? __kfree_skb+0x104/0x140 [ 592.192990][T11375] ? nlmon_xmit+0x4b/0x60 [ 592.197439][T11375] ? __kfree_skb+0x104/0x140 [ 592.202051][T11375] ? consume_skb+0x57/0x180 [ 592.206666][T11375] ? nlmon_xmit+0x4b/0x60 [ 592.211014][T11375] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 592.216322][T11375] ? __dev_queue_xmit+0xad9/0x1e20 [ 592.221496][T11375] ? ref_tracker_free+0x3a1/0x400 [ 592.226597][T11375] netlink_rcv_skb+0x126/0x220 [ 592.231395][T11375] ? rtnetlink_bind+0x60/0x60 [ 592.236155][T11375] rtnetlink_rcv+0x1c/0x20 [ 592.240674][T11375] netlink_unicast+0x589/0x650 [ 592.245478][T11375] netlink_sendmsg+0x66e/0x770 [ 592.250276][T11375] ? netlink_getsockopt+0x3e0/0x3e0 [ 592.255500][T11375] ____sys_sendmsg+0x37c/0x4d0 [ 592.260322][T11375] __sys_sendmsg+0x1e9/0x270 [ 592.264947][T11375] __x64_sys_sendmsg+0x46/0x50 [ 592.269763][T11375] do_syscall_64+0x41/0xc0 [ 592.274202][T11375] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 592.280151][T11375] RIP: 0033:0x7f7514d76ae9 [ 592.284675][T11375] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 592.304290][T11375] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 592.312713][T11375] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 592.320768][T11375] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 03:42:15 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 592.328743][T11375] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 592.336725][T11375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 592.344714][T11375] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 592.352692][T11375] [ 592.365729][T11382] ipvlan12: entered promiscuous mode [ 592.372489][T11382] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 13) [ 592.383521][T11382] team0: Device ipvlan12 is already an upper device of the team interface [ 592.421404][T11381] macvtap39: entered allmulticast mode [ 592.429397][T11381] 8021q: adding VLAN 0 to HW filter on device macvtap39 [ 592.441153][T11390] macvtap7: entered allmulticast mode [ 592.447396][T11390] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 592.456823][T11390] team0: Device macvtap7 is already an upper device of the team interface 03:42:15 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 592.482999][T11398] ipvlan8: entered promiscuous mode 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 592.525407][T11399] FAULT_INJECTION: forcing a failure. [ 592.525407][T11399] name failslab, interval 1, probability 0, space 0, times 0 [ 592.538217][T11399] CPU: 1 PID: 11399 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 592.548674][T11399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 592.558754][T11399] Call Trace: [ 592.562112][T11399] [ 592.565085][T11399] dump_stack_lvl+0xda/0x130 [ 592.569795][T11399] dump_stack+0x15/0x20 [ 592.573973][T11399] should_fail_ex+0x21f/0x230 [ 592.578745][T11399] ? macvlan_common_newlink+0x592/0xbc0 [ 592.584371][T11399] __should_failslab+0x92/0xa0 [ 592.589152][T11399] should_failslab+0x9/0x20 [ 592.593665][T11399] slab_pre_alloc_hook+0x38/0x180 [ 592.598775][T11399] ? macvlan_common_newlink+0x592/0xbc0 [ 592.604363][T11399] __kmem_cache_alloc_node+0x48/0x1d0 [ 592.609749][T11399] ? macvlan_common_newlink+0x592/0xbc0 [ 592.615327][T11399] kmalloc_trace+0x2a/0xa0 [ 592.619750][T11399] macvlan_common_newlink+0x592/0xbc0 [ 592.625193][T11399] ? mutex_is_locked+0xd/0x20 [ 592.629974][T11399] macvtap_newlink+0xf6/0x150 [ 592.634805][T11399] ? macvtap_setup+0x30/0x30 [ 592.639433][T11399] rtnl_newlink+0xee5/0x1670 [ 592.644056][T11399] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 592.650382][T11399] ? _raw_spin_unlock+0x26/0x40 [ 592.655349][T11399] ? __mutex_lock+0x21c/0x8d0 [ 592.660066][T11399] ? rtnl_setlink+0x300/0x300 [ 592.664835][T11399] rtnetlink_rcv_msg+0x807/0x8c0 [ 592.669818][T11399] ? memcg_list_lru_alloc+0xd5/0x750 [ 592.675124][T11399] ? should_fail_ex+0x2d/0x230 [ 592.679897][T11399] ? __rcu_read_unlock+0x4d/0x70 [ 592.684845][T11399] ? __perf_event_task_sched_in+0x769/0x790 [ 592.690809][T11399] ? save_fpregs_to_fpstate+0xfe/0x150 [ 592.696342][T11399] ? skb_release_data+0x53d/0x550 [ 592.701516][T11399] ? kmem_cache_free+0x1db/0x3a0 [ 592.706462][T11399] ? __kfree_skb+0x104/0x140 [ 592.711084][T11399] ? nlmon_xmit+0x4b/0x60 [ 592.715424][T11399] ? __kfree_skb+0x104/0x140 [ 592.720079][T11399] ? consume_skb+0x57/0x180 [ 592.724600][T11399] ? nlmon_xmit+0x4b/0x60 [ 592.729033][T11399] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 592.734335][T11399] ? __dev_queue_xmit+0xad9/0x1e20 [ 592.739459][T11399] ? ref_tracker_free+0x3a1/0x400 [ 592.744500][T11399] netlink_rcv_skb+0x126/0x220 [ 592.749286][T11399] ? rtnetlink_bind+0x60/0x60 [ 592.753988][T11399] rtnetlink_rcv+0x1c/0x20 [ 592.758441][T11399] netlink_unicast+0x589/0x650 [ 592.763249][T11399] netlink_sendmsg+0x66e/0x770 [ 592.768034][T11399] ? netlink_getsockopt+0x3e0/0x3e0 [ 592.773307][T11399] ____sys_sendmsg+0x37c/0x4d0 [ 592.778154][T11399] __sys_sendmsg+0x1e9/0x270 [ 592.782823][T11399] __x64_sys_sendmsg+0x46/0x50 [ 592.787687][T11399] do_syscall_64+0x41/0xc0 [ 592.792131][T11399] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 592.798040][T11399] RIP: 0033:0x7f7514d76ae9 [ 592.802489][T11399] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 03:42:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 592.822108][T11399] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 592.830603][T11399] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 592.838630][T11399] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 592.846641][T11399] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 592.854621][T11399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 592.862670][T11399] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 592.870651][T11399] 03:42:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 14) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:15 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 592.897547][T11403] macvtap40: entered allmulticast mode [ 592.912297][T11403] 8021q: adding VLAN 0 to HW filter on device macvtap40 [ 592.926630][T11406] ipvlan12: entered promiscuous mode [ 592.933292][T11406] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 592.954160][T11406] team0: Device ipvlan12 is already an upper device of the team interface [ 592.983719][T11413] FAULT_INJECTION: forcing a failure. [ 592.983719][T11413] name failslab, interval 1, probability 0, space 0, times 0 [ 592.996440][T11413] CPU: 0 PID: 11413 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 593.006926][T11413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 593.017011][T11413] Call Trace: [ 593.020310][T11413] [ 593.023263][T11413] dump_stack_lvl+0xda/0x130 [ 593.027870][T11413] dump_stack+0x15/0x20 [ 593.032062][T11413] should_fail_ex+0x21f/0x230 [ 593.036759][T11413] ? kstrdup_const+0x3e/0x50 [ 593.041385][T11413] __should_failslab+0x92/0xa0 [ 593.046242][T11413] should_failslab+0x9/0x20 [ 593.050773][T11413] slab_pre_alloc_hook+0x38/0x180 [ 593.055810][T11413] ? kstrdup_const+0x3e/0x50 [ 593.060498][T11413] __kmem_cache_alloc_node+0x48/0x1d0 [ 593.065891][T11413] ? kstrdup_const+0x3e/0x50 [ 593.070516][T11413] __kmalloc_node_track_caller+0x96/0x1a0 [ 593.076247][T11413] ? vsnprintf+0xdd0/0xe20 [ 593.080717][T11413] kstrdup+0x3a/0x70 [ 593.084630][T11413] kstrdup_const+0x3e/0x50 [ 593.089199][T11413] kvasprintf_const+0xe5/0xf0 [ 593.093998][T11413] kobject_set_name_vargs+0x44/0xe0 [ 593.099231][T11413] dev_set_name+0x84/0xb0 [ 593.103657][T11413] ? hrtimer_init+0x104/0x1f0 [ 593.108362][T11413] ? netdev_register_kobject+0x63/0x230 [ 593.114034][T11413] ? device_initialize+0x1fe/0x210 [ 593.119174][T11413] netdev_register_kobject+0x7c/0x230 [ 593.124612][T11413] register_netdevice+0x680/0xb40 [ 593.129668][T11413] ? rtnl_is_locked+0x15/0x20 [ 593.134422][T11413] ? netdev_rx_handler_register+0x11a/0x140 [ 593.140513][T11413] macvlan_common_newlink+0xa1b/0xbc0 [ 593.145993][T11413] macvtap_newlink+0xf6/0x150 [ 593.150716][T11413] ? macvtap_setup+0x30/0x30 [ 593.155319][T11413] rtnl_newlink+0xee5/0x1670 [ 593.159919][T11413] ? cgroup_rstat_updated+0x8c/0x1c0 [ 593.165239][T11413] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 593.171513][T11413] ? _raw_spin_unlock+0x26/0x40 [ 593.176417][T11413] ? __mutex_lock+0x21c/0x8d0 [ 593.181127][T11413] ? rtnl_setlink+0x300/0x300 [ 593.185838][T11413] rtnetlink_rcv_msg+0x807/0x8c0 [ 593.190932][T11413] ? memcg_list_lru_alloc+0xd5/0x750 [ 593.196266][T11413] ? should_fail_ex+0x2d/0x230 [ 593.201177][T11413] ? slab_post_alloc_hook+0x8c/0x340 [ 593.206512][T11413] ? try_charge_memcg+0xb49/0xd30 [ 593.211550][T11413] ? skb_release_data+0x53d/0x550 [ 593.216622][T11413] ? kmem_cache_free+0x1db/0x3a0 [ 593.221601][T11413] ? __kfree_skb+0x104/0x140 [ 593.226229][T11413] ? nlmon_xmit+0x4b/0x60 [ 593.230632][T11413] ? __kfree_skb+0x104/0x140 [ 593.235260][T11413] ? consume_skb+0x57/0x180 [ 593.239858][T11413] ? nlmon_xmit+0x4b/0x60 [ 593.244209][T11413] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 593.249538][T11413] ? __dev_queue_xmit+0xad9/0x1e20 [ 593.254859][T11413] ? ref_tracker_free+0x3a1/0x400 [ 593.259898][T11413] netlink_rcv_skb+0x126/0x220 [ 593.264743][T11413] ? rtnetlink_bind+0x60/0x60 [ 593.269458][T11413] rtnetlink_rcv+0x1c/0x20 [ 593.273888][T11413] netlink_unicast+0x589/0x650 [ 593.278721][T11413] netlink_sendmsg+0x66e/0x770 [ 593.283567][T11413] ? netlink_getsockopt+0x3e0/0x3e0 [ 593.288859][T11413] ____sys_sendmsg+0x37c/0x4d0 [ 593.293717][T11413] __sys_sendmsg+0x1e9/0x270 [ 593.298355][T11413] __x64_sys_sendmsg+0x46/0x50 [ 593.303163][T11413] do_syscall_64+0x41/0xc0 [ 593.307679][T11413] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 593.313584][T11413] RIP: 0033:0x7f7514d76ae9 [ 593.318000][T11413] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 593.337748][T11413] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 593.346291][T11413] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 593.354282][T11413] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 593.362275][T11413] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 593.362295][T11413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 593.378327][T11413] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 593.386344][T11413] [ 593.395162][T11414] macvtap7: entered allmulticast mode [ 593.400660][T11414] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 593.409781][T11414] team0: Device macvtap7 is already an upper device of the team interface [ 593.430859][T11418] ipvlan8: entered promiscuous mode 03:42:16 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 15) 03:42:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 593.453319][T11422] macvtap41: entered allmulticast mode [ 593.461525][T11422] 8021q: adding VLAN 0 to HW filter on device macvtap41 [ 593.492521][T11428] FAULT_INJECTION: forcing a failure. [ 593.492521][T11428] name failslab, interval 1, probability 0, space 0, times 0 [ 593.505412][T11428] CPU: 1 PID: 11428 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 593.515921][T11428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 593.526061][T11428] Call Trace: [ 593.529346][T11428] [ 593.532345][T11428] dump_stack_lvl+0xda/0x130 [ 593.537016][T11428] dump_stack+0x15/0x20 [ 593.541263][T11428] should_fail_ex+0x21f/0x230 [ 593.545979][T11428] ? device_add+0x88/0x8b0 [ 593.550407][T11428] __should_failslab+0x92/0xa0 [ 593.555186][T11428] should_failslab+0x9/0x20 [ 593.559692][T11428] slab_pre_alloc_hook+0x38/0x180 [ 593.564810][T11428] ? device_add+0x88/0x8b0 [ 593.569350][T11428] __kmem_cache_alloc_node+0x48/0x1d0 [ 593.574738][T11428] ? device_add+0x88/0x8b0 [ 593.579181][T11428] kmalloc_trace+0x2a/0xa0 [ 593.583638][T11428] device_add+0x88/0x8b0 [ 593.587981][T11428] netdev_register_kobject+0xfc/0x230 [ 593.593436][T11428] register_netdevice+0x680/0xb40 [ 593.598514][T11428] ? rtnl_is_locked+0x15/0x20 [ 593.603213][T11428] ? netdev_rx_handler_register+0x11a/0x140 [ 593.609135][T11428] macvlan_common_newlink+0xa1b/0xbc0 [ 593.614604][T11428] macvtap_newlink+0xf6/0x150 [ 593.619299][T11428] ? macvtap_setup+0x30/0x30 [ 593.623964][T11428] rtnl_newlink+0xee5/0x1670 [ 593.628589][T11428] ? security_capable+0x5e/0x80 [ 593.633451][T11428] ? ns_capable+0x7c/0xb0 [ 593.637831][T11428] ? rtnl_setlink+0x300/0x300 [ 593.642526][T11428] rtnetlink_rcv_msg+0x807/0x8c0 [ 593.647524][T11428] ? should_fail_ex+0x2d/0x230 [ 593.652332][T11428] ? slab_post_alloc_hook+0x8c/0x340 [ 593.657624][T11428] ? xas_load+0x3ae/0x3c0 [ 593.662030][T11428] ? skb_release_data+0x53d/0x550 [ 593.667137][T11428] ? kmem_cache_free+0x1db/0x3a0 [ 593.672091][T11428] ? __kfree_skb+0x104/0x140 [ 593.676708][T11428] ? nlmon_xmit+0x4b/0x60 [ 593.681042][T11428] ? __kfree_skb+0x104/0x140 [ 593.685643][T11428] ? consume_skb+0x57/0x180 [ 593.690159][T11428] ? nlmon_xmit+0x4b/0x60 [ 593.694492][T11428] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 593.699790][T11428] ? __dev_queue_xmit+0xad9/0x1e20 [ 593.705003][T11428] ? ref_tracker_free+0x3a1/0x400 [ 593.710085][T11428] netlink_rcv_skb+0x126/0x220 [ 593.714899][T11428] ? rtnetlink_bind+0x60/0x60 [ 593.719691][T11428] rtnetlink_rcv+0x1c/0x20 [ 593.724202][T11428] netlink_unicast+0x589/0x650 [ 593.729073][T11428] netlink_sendmsg+0x66e/0x770 [ 593.733944][T11428] ? netlink_getsockopt+0x3e0/0x3e0 [ 593.739167][T11428] ____sys_sendmsg+0x37c/0x4d0 [ 593.743966][T11428] __sys_sendmsg+0x1e9/0x270 [ 593.748659][T11428] __x64_sys_sendmsg+0x46/0x50 [ 593.753441][T11428] do_syscall_64+0x41/0xc0 [ 593.757921][T11428] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 593.763827][T11428] RIP: 0033:0x7f7514d76ae9 [ 593.768260][T11428] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 593.787912][T11428] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 593.796372][T11428] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 593.804365][T11428] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 593.812344][T11428] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 593.820330][T11428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 593.828307][T11428] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 593.836312][T11428] 03:42:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffc3, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 16) 03:42:16 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 593.854708][T11429] ipvlan12: entered promiscuous mode [ 593.867442][T11429] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 593.883701][T11429] team0: Device ipvlan12 is already an upper device of the team interface 03:42:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:17 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4d, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 593.925997][T11432] macvtap42: entered allmulticast mode [ 593.934285][T11432] 8021q: adding VLAN 0 to HW filter on device macvtap42 [ 593.949255][T11438] macvtap7: entered allmulticast mode [ 593.954931][T11438] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 593.963809][T11438] team0: Device macvtap7 is already an upper device of the team interface [ 593.993493][T11439] FAULT_INJECTION: forcing a failure. [ 593.993493][T11439] name failslab, interval 1, probability 0, space 0, times 0 [ 594.006239][T11439] CPU: 0 PID: 11439 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 594.016688][T11439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 594.026791][T11439] Call Trace: [ 594.030075][T11439] [ 594.033038][T11439] dump_stack_lvl+0xda/0x130 [ 594.037694][T11439] dump_stack+0x15/0x20 [ 594.041875][T11439] should_fail_ex+0x21f/0x230 [ 594.046563][T11439] ? kstrdup_const+0x3e/0x50 [ 594.051239][T11439] __should_failslab+0x92/0xa0 [ 594.056027][T11439] should_failslab+0x9/0x20 [ 594.060571][T11439] slab_pre_alloc_hook+0x38/0x180 [ 594.065670][T11439] ? kstrdup_const+0x3e/0x50 [ 594.070286][T11439] __kmem_cache_alloc_node+0x48/0x1d0 [ 594.075754][T11439] ? kstrdup_const+0x3e/0x50 [ 594.080418][T11439] __kmalloc_node_track_caller+0x96/0x1a0 [ 594.086150][T11439] kstrdup+0x3a/0x70 [ 594.090129][T11439] kstrdup_const+0x3e/0x50 [ 594.094589][T11439] __kernfs_new_node+0x41/0x380 [ 594.099529][T11439] ? make_kgid+0x115/0x310 [ 594.103982][T11439] ? net_ns_get_ownership+0xae/0xd0 [ 594.109572][T11439] ? net_namespace+0x20/0x20 [ 594.114218][T11439] kernfs_create_dir_ns+0x62/0x150 [ 594.119412][T11439] sysfs_create_dir_ns+0xd7/0x1d0 [ 594.124463][T11439] kobject_add_internal+0x3eb/0x730 [ 594.129692][T11439] kobject_add+0xdc/0x150 [ 594.134131][T11439] ? kobject_get+0x95/0xc0 [ 594.138631][T11439] ? device_add+0x2ea/0x8b0 [ 594.143162][T11439] device_add+0x2f8/0x8b0 [ 594.147563][T11439] netdev_register_kobject+0xfc/0x230 [ 594.152991][T11439] register_netdevice+0x680/0xb40 [ 594.158063][T11439] ? rtnl_is_locked+0x15/0x20 [ 594.162763][T11439] ? netdev_rx_handler_register+0x11a/0x140 [ 594.168674][T11439] macvlan_common_newlink+0xa1b/0xbc0 [ 594.174147][T11439] macvtap_newlink+0xf6/0x150 [ 594.178961][T11439] ? macvtap_setup+0x30/0x30 [ 594.183563][T11439] rtnl_newlink+0xee5/0x1670 [ 594.188196][T11439] ? cgroup_rstat_updated+0x8c/0x1c0 [ 594.193544][T11439] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 594.200002][T11439] ? _raw_spin_unlock+0x26/0x40 [ 594.204864][T11439] ? __mutex_lock+0x21c/0x8d0 [ 594.209563][T11439] ? rtnl_setlink+0x300/0x300 [ 594.214345][T11439] rtnetlink_rcv_msg+0x807/0x8c0 [ 594.219304][T11439] ? memcg_list_lru_alloc+0xd5/0x750 [ 594.224607][T11439] ? should_fail_ex+0x2d/0x230 [ 594.229382][T11439] ? slab_post_alloc_hook+0x8c/0x340 [ 594.234739][T11439] ? xas_load+0x3ae/0x3c0 [ 594.239076][T11439] ? skb_release_data+0x53d/0x550 [ 594.244154][T11439] ? kmem_cache_free+0x1db/0x3a0 [ 594.249175][T11439] ? __kfree_skb+0x104/0x140 [ 594.253787][T11439] ? nlmon_xmit+0x4b/0x60 [ 594.258181][T11439] ? __kfree_skb+0x104/0x140 [ 594.262831][T11439] ? consume_skb+0x57/0x180 [ 594.267426][T11439] ? nlmon_xmit+0x4b/0x60 [ 594.271771][T11439] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 594.277091][T11439] ? __dev_queue_xmit+0xad9/0x1e20 [ 594.282281][T11439] ? ref_tracker_free+0x3a1/0x400 [ 594.287381][T11439] netlink_rcv_skb+0x126/0x220 [ 594.292172][T11439] ? rtnetlink_bind+0x60/0x60 [ 594.296913][T11439] rtnetlink_rcv+0x1c/0x20 [ 594.301436][T11439] netlink_unicast+0x589/0x650 [ 594.306223][T11439] netlink_sendmsg+0x66e/0x770 [ 594.311276][T11439] ? netlink_getsockopt+0x3e0/0x3e0 [ 594.316498][T11439] ____sys_sendmsg+0x37c/0x4d0 [ 594.321304][T11439] __sys_sendmsg+0x1e9/0x270 [ 594.325999][T11439] __x64_sys_sendmsg+0x46/0x50 [ 594.330785][T11439] do_syscall_64+0x41/0xc0 [ 594.335229][T11439] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 594.341195][T11439] RIP: 0033:0x7f7514d76ae9 [ 594.345634][T11439] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 594.365299][T11439] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 594.373738][T11439] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 594.381723][T11439] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 03:42:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 594.389709][T11439] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 594.397688][T11439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 594.405678][T11439] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 594.413684][T11439] [ 594.416768][T11439] kobject: kobject_add_internal failed for macvtap1 (error: -12 parent: net) [ 594.434690][T11440] ipvlan8: entered promiscuous mode 03:42:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffea, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 17) [ 594.473954][T11451] macvtap43: entered allmulticast mode [ 594.489224][T11451] 8021q: adding VLAN 0 to HW filter on device macvtap43 [ 594.501681][T11453] ipvlan12: entered promiscuous mode [ 594.508555][T11453] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 594.517266][T11453] team0: Device ipvlan12 is already an upper device of the team interface [ 594.539403][T11460] FAULT_INJECTION: forcing a failure. [ 594.539403][T11460] name failslab, interval 1, probability 0, space 0, times 0 [ 594.552057][T11460] CPU: 1 PID: 11460 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 594.562549][T11460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 594.572663][T11460] Call Trace: [ 594.575984][T11460] [ 594.578925][T11460] dump_stack_lvl+0xda/0x130 [ 594.583556][T11460] dump_stack+0x15/0x20 [ 594.587730][T11460] should_fail_ex+0x21f/0x230 [ 594.592478][T11460] __should_failslab+0x92/0xa0 [ 594.597258][T11460] should_failslab+0x9/0x20 [ 594.601805][T11460] slab_pre_alloc_hook+0x38/0x180 [ 594.606844][T11460] kmem_cache_alloc+0x52/0x220 [ 594.611645][T11460] ? __kernfs_new_node+0x6a/0x380 [ 594.616729][T11460] __kernfs_new_node+0x6a/0x380 [ 594.621673][T11460] ? make_kgid+0x115/0x310 [ 594.626099][T11460] ? net_ns_get_ownership+0xae/0xd0 [ 594.631349][T11460] ? net_namespace+0x20/0x20 [ 594.635961][T11460] kernfs_create_dir_ns+0x62/0x150 [ 594.641155][T11460] sysfs_create_dir_ns+0xd7/0x1d0 [ 594.646250][T11460] kobject_add_internal+0x3eb/0x730 [ 594.651470][T11460] kobject_add+0xdc/0x150 [ 594.655961][T11460] ? kobject_get+0x95/0xc0 [ 594.660393][T11460] ? device_add+0x2ea/0x8b0 [ 594.664977][T11460] device_add+0x2f8/0x8b0 [ 594.669334][T11460] netdev_register_kobject+0xfc/0x230 [ 594.674729][T11460] register_netdevice+0x680/0xb40 [ 594.679849][T11460] ? rtnl_is_locked+0x15/0x20 [ 594.684581][T11460] ? netdev_rx_handler_register+0x11a/0x140 [ 594.690486][T11460] macvlan_common_newlink+0xa1b/0xbc0 [ 594.695889][T11460] macvtap_newlink+0xf6/0x150 [ 594.700658][T11460] ? macvtap_setup+0x30/0x30 [ 594.705263][T11460] rtnl_newlink+0xee5/0x1670 [ 594.709872][T11460] ? cgroup_rstat_updated+0x8c/0x1c0 [ 594.715242][T11460] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 594.721513][T11460] ? _raw_spin_unlock+0x26/0x40 [ 594.726374][T11460] ? __mutex_lock+0x21c/0x8d0 [ 594.731101][T11460] ? rtnl_setlink+0x300/0x300 [ 594.735846][T11460] rtnetlink_rcv_msg+0x807/0x8c0 [ 594.740804][T11460] ? should_fail_ex+0x2d/0x230 [ 594.745577][T11460] ? slab_post_alloc_hook+0x8c/0x340 [ 594.750879][T11460] ? sysvec_apic_timer_interrupt+0x42/0x80 [ 594.756706][T11460] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 594.762939][T11460] ? xas_load+0x3ae/0x3c0 [ 594.767328][T11460] ? skb_release_data+0x53d/0x550 [ 594.772487][T11460] ? kmem_cache_free+0x1db/0x3a0 [ 594.777447][T11460] ? __kfree_skb+0x104/0x140 [ 594.782116][T11460] ? nlmon_xmit+0x4b/0x60 [ 594.786485][T11460] ? __kfree_skb+0x104/0x140 [ 594.791241][T11460] ? consume_skb+0x57/0x180 [ 594.795761][T11460] ? nlmon_xmit+0x4b/0x60 [ 594.800100][T11460] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 594.805458][T11460] ? __dev_queue_xmit+0xad9/0x1e20 [ 594.810584][T11460] ? ref_tracker_free+0x3a1/0x400 [ 594.815657][T11460] netlink_rcv_skb+0x126/0x220 [ 594.820500][T11460] ? rtnetlink_bind+0x60/0x60 [ 594.825207][T11460] rtnetlink_rcv+0x1c/0x20 [ 594.829643][T11460] netlink_unicast+0x589/0x650 [ 594.834560][T11460] netlink_sendmsg+0x66e/0x770 [ 594.839432][T11460] ? netlink_getsockopt+0x3e0/0x3e0 [ 594.844662][T11460] ____sys_sendmsg+0x37c/0x4d0 [ 594.849470][T11460] __sys_sendmsg+0x1e9/0x270 [ 594.854126][T11460] __x64_sys_sendmsg+0x46/0x50 [ 594.858940][T11460] do_syscall_64+0x41/0xc0 [ 594.863387][T11460] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 594.869378][T11460] RIP: 0033:0x7f7514d76ae9 [ 594.873843][T11460] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 594.893482][T11460] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 594.901907][T11460] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 594.909885][T11460] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 594.917897][T11460] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 03:42:18 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x55, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 594.925976][T11460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 594.933975][T11460] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 594.941971][T11460] [ 594.945370][T11460] kobject: kobject_add_internal failed for macvtap1 (error: -12 parent: net) 03:42:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 18) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 594.972039][T11463] macvtap7: entered allmulticast mode [ 594.977787][T11463] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 594.986766][T11463] team0: Device macvtap7 is already an upper device of the team interface 03:42:18 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.016911][T11466] ipvlan8: entered promiscuous mode 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000880000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 595.061030][T11471] team_slave_0: entered promiscuous mode [ 595.066731][T11471] team_slave_1: entered promiscuous mode [ 595.074417][T11471] macvtap1: entered allmulticast mode [ 595.079842][T11471] team0: entered allmulticast mode [ 595.085000][T11471] team_slave_0: entered allmulticast mode [ 595.090774][T11471] team_slave_1: entered allmulticast mode [ 595.098211][T11471] 8021q: adding VLAN 0 to HW filter on device macvtap1 03:42:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffef, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.107089][T11471] team0: Device macvtap1 is already an upper device of the team interface [ 595.120358][T11471] team0: left allmulticast mode [ 595.125356][T11471] team_slave_0: left allmulticast mode [ 595.130846][T11471] team_slave_1: left allmulticast mode [ 595.136528][T11471] team_slave_0: left promiscuous mode [ 595.142007][T11471] team_slave_1: left promiscuous mode 03:42:18 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5e, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 595.175136][T11468] macvtap44: entered allmulticast mode [ 595.182687][T11468] 8021q: adding VLAN 0 to HW filter on device macvtap44 [ 595.195013][T11477] ipvlan12: entered promiscuous mode [ 595.203510][T11477] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 19) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.225959][T11477] team0: Device ipvlan12 is already an upper device of the team interface [ 595.250159][T11483] macvtap7: entered allmulticast mode [ 595.255854][T11483] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 595.266473][T11483] team0: Device macvtap7 is already an upper device of the team interface 03:42:18 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.297713][T11491] ipvlan8: entered promiscuous mode 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.341001][T11493] macvtap45: entered allmulticast mode [ 595.349148][T11493] 8021q: adding VLAN 0 to HW filter on device macvtap45 [ 595.358314][T11497] FAULT_INJECTION: forcing a failure. [ 595.358314][T11497] name failslab, interval 1, probability 0, space 0, times 0 [ 595.370973][T11497] CPU: 0 PID: 11497 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 595.381478][T11497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 595.391552][T11497] Call Trace: [ 595.394842][T11497] [ 595.397774][T11497] dump_stack_lvl+0xda/0x130 [ 595.402389][T11497] dump_stack+0x15/0x20 [ 595.406599][T11497] should_fail_ex+0x21f/0x230 [ 595.411288][T11497] __should_failslab+0x92/0xa0 [ 595.416098][T11497] should_failslab+0x9/0x20 [ 595.420614][T11497] slab_pre_alloc_hook+0x38/0x180 [ 595.425656][T11497] kmem_cache_alloc+0x52/0x220 [ 595.430438][T11497] ? __kernfs_new_node+0x6a/0x380 [ 595.435483][T11497] ? rb_insert_color+0x280/0x290 [ 595.440485][T11497] __kernfs_new_node+0x6a/0x380 [ 595.445355][T11497] ? kernfs_add_one+0x330/0x390 [ 595.450315][T11497] kernfs_new_node+0x5f/0xd0 [ 595.454924][T11497] kernfs_create_link+0x6c/0x120 [ 595.459960][T11497] sysfs_do_create_link_sd+0x6b/0xf0 [ 595.465278][T11497] sysfs_create_link+0x51/0x70 [ 595.470098][T11497] device_add_class_symlinks+0x9a/0x1e0 [ 595.475718][T11497] device_add+0x410/0x8b0 [ 595.480084][T11497] netdev_register_kobject+0xfc/0x230 [ 595.485509][T11497] register_netdevice+0x680/0xb40 [ 595.490573][T11497] ? rtnl_is_locked+0x15/0x20 [ 595.495265][T11497] ? netdev_rx_handler_register+0x11a/0x140 [ 595.501173][T11497] macvlan_common_newlink+0xa1b/0xbc0 [ 595.506582][T11497] macvtap_newlink+0xf6/0x150 [ 595.511291][T11497] ? macvtap_setup+0x30/0x30 [ 595.516033][T11497] rtnl_newlink+0xee5/0x1670 [ 595.520687][T11497] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 595.526955][T11497] ? _raw_spin_unlock+0x26/0x40 [ 595.531848][T11497] ? __mutex_lock+0x21c/0x8d0 [ 595.536623][T11497] ? rtnl_setlink+0x300/0x300 [ 595.541389][T11497] rtnetlink_rcv_msg+0x807/0x8c0 [ 595.546375][T11497] ? memcg_list_lru_alloc+0xd5/0x750 [ 595.551677][T11497] ? should_fail_ex+0x2d/0x230 [ 595.556489][T11497] ? slab_post_alloc_hook+0x8c/0x340 [ 595.561853][T11497] ? xas_load+0x3ae/0x3c0 [ 595.566187][T11497] ? skb_release_data+0x53d/0x550 [ 595.571263][T11497] ? kmem_cache_free+0x1db/0x3a0 [ 595.576210][T11497] ? __kfree_skb+0x104/0x140 [ 595.580887][T11497] ? nlmon_xmit+0x4b/0x60 [ 595.585310][T11497] ? __kfree_skb+0x104/0x140 [ 595.589924][T11497] ? consume_skb+0x57/0x180 [ 595.594481][T11497] ? nlmon_xmit+0x4b/0x60 [ 595.598828][T11497] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 595.604169][T11497] ? __dev_queue_xmit+0xad9/0x1e20 [ 595.609292][T11497] ? ref_tracker_free+0x3a1/0x400 [ 595.614418][T11497] netlink_rcv_skb+0x126/0x220 [ 595.619244][T11497] ? rtnetlink_bind+0x60/0x60 [ 595.624079][T11497] rtnetlink_rcv+0x1c/0x20 [ 595.628523][T11497] netlink_unicast+0x589/0x650 [ 595.633308][T11497] netlink_sendmsg+0x66e/0x770 [ 595.638136][T11497] ? netlink_getsockopt+0x3e0/0x3e0 [ 595.643371][T11497] ____sys_sendmsg+0x37c/0x4d0 [ 595.648246][T11497] __sys_sendmsg+0x1e9/0x270 [ 595.652987][T11497] __x64_sys_sendmsg+0x46/0x50 [ 595.657786][T11497] do_syscall_64+0x41/0xc0 [ 595.662257][T11497] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 595.668166][T11497] RIP: 0033:0x7f7514d76ae9 [ 595.672664][T11497] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 595.692658][T11497] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 595.701146][T11497] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 595.709126][T11497] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 595.717218][T11497] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 595.725201][T11497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 595.733181][T11497] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000008800697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 595.741176][T11497] 03:42:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:18 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 595.763357][T11500] ipvlan12: entered promiscuous mode [ 595.770609][T11500] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 595.788968][T11500] team0: Device ipvlan12 is already an upper device of the team interface 03:42:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 20) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 595.823932][T11509] macvtap46: entered allmulticast mode [ 595.842150][T11509] 8021q: adding VLAN 0 to HW filter on device macvtap46 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.865125][T11511] macvtap7: entered allmulticast mode [ 595.877047][T11511] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 595.889997][T11511] team0: Device macvtap7 is already an upper device of the team interface 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 595.917641][T11516] FAULT_INJECTION: forcing a failure. [ 595.917641][T11516] name failslab, interval 1, probability 0, space 0, times 0 [ 595.930328][T11516] CPU: 1 PID: 11516 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 595.940789][T11516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 595.950913][T11516] Call Trace: [ 595.954222][T11516] [ 595.957177][T11516] dump_stack_lvl+0xda/0x130 [ 595.961889][T11516] dump_stack+0x15/0x20 [ 595.966126][T11516] should_fail_ex+0x21f/0x230 [ 595.970835][T11516] __should_failslab+0x92/0xa0 [ 595.975682][T11516] should_failslab+0x9/0x20 [ 595.980189][T11516] slab_pre_alloc_hook+0x38/0x180 [ 595.985274][T11516] kmem_cache_alloc+0x52/0x220 [ 595.990085][T11516] ? __kernfs_new_node+0x6a/0x380 [ 595.995122][T11516] ? rb_insert_color+0x280/0x290 [ 596.000071][T11516] __kernfs_new_node+0x6a/0x380 [ 596.004941][T11516] ? kernfs_add_one+0x330/0x390 [ 596.009822][T11516] kernfs_new_node+0x5f/0xd0 [ 596.014439][T11516] kernfs_create_link+0x6c/0x120 [ 596.019452][T11516] sysfs_do_create_link_sd+0x6b/0xf0 [ 596.024746][T11516] sysfs_create_link+0x51/0x70 [ 596.029530][T11516] device_add_class_symlinks+0x9a/0x1e0 [ 596.035114][T11516] device_add+0x410/0x8b0 [ 596.039555][T11516] netdev_register_kobject+0xfc/0x230 [ 596.045037][T11516] register_netdevice+0x680/0xb40 [ 596.050127][T11516] ? rtnl_is_locked+0x15/0x20 [ 596.054825][T11516] ? netdev_rx_handler_register+0x11a/0x140 [ 596.060732][T11516] macvlan_common_newlink+0xa1b/0xbc0 [ 596.066176][T11516] macvtap_newlink+0xf6/0x150 [ 596.071010][T11516] ? macvtap_setup+0x30/0x30 [ 596.075607][T11516] rtnl_newlink+0xee5/0x1670 [ 596.080226][T11516] ? cgroup_rstat_updated+0x8c/0x1c0 [ 596.085588][T11516] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 596.091920][T11516] ? _raw_spin_unlock+0x26/0x40 [ 596.096835][T11516] ? __mutex_lock+0x21c/0x8d0 [ 596.101562][T11516] ? rtnl_setlink+0x300/0x300 [ 596.106273][T11516] rtnetlink_rcv_msg+0x807/0x8c0 [ 596.111375][T11516] ? memcg_list_lru_alloc+0xd5/0x750 [ 596.116671][T11516] ? should_fail_ex+0x2d/0x230 [ 596.121634][T11516] ? slab_post_alloc_hook+0x8c/0x340 [ 596.126991][T11516] ? try_charge_memcg+0xb49/0xd30 [ 596.132028][T11516] ? skb_release_data+0x53d/0x550 [ 596.137157][T11516] ? kmem_cache_free+0x1db/0x3a0 [ 596.142120][T11516] ? __kfree_skb+0x104/0x140 [ 596.146791][T11516] ? nlmon_xmit+0x4b/0x60 [ 596.151180][T11516] ? __kfree_skb+0x104/0x140 [ 596.155848][T11516] ? consume_skb+0x57/0x180 [ 596.160362][T11516] ? nlmon_xmit+0x4b/0x60 [ 596.164702][T11516] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 596.169998][T11516] ? __dev_queue_xmit+0xad9/0x1e20 [ 596.175162][T11516] ? ref_tracker_free+0x3a1/0x400 [ 596.180216][T11516] netlink_rcv_skb+0x126/0x220 [ 596.185061][T11516] ? rtnetlink_bind+0x60/0x60 [ 596.189767][T11516] rtnetlink_rcv+0x1c/0x20 [ 596.194211][T11516] netlink_unicast+0x589/0x650 [ 596.199079][T11516] netlink_sendmsg+0x66e/0x770 [ 596.203860][T11516] ? netlink_getsockopt+0x3e0/0x3e0 [ 596.209100][T11516] ____sys_sendmsg+0x37c/0x4d0 [ 596.213897][T11516] __sys_sendmsg+0x1e9/0x270 [ 596.218535][T11516] __x64_sys_sendmsg+0x46/0x50 [ 596.223319][T11516] do_syscall_64+0x41/0xc0 [ 596.227780][T11516] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 596.233766][T11516] RIP: 0033:0x7f7514d76ae9 [ 596.238231][T11516] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 596.257849][T11516] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 596.266274][T11516] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 596.274319][T11516] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 596.282335][T11516] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 596.290321][T11516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 596.298309][T11516] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 596.306342][T11516] [ 596.314449][T11517] ipvlan8: entered promiscuous mode 03:42:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffe, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000011000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 21) 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:19 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 596.355103][T11524] macvtap47: entered allmulticast mode [ 596.365679][T11524] 8021q: adding VLAN 0 to HW filter on device macvtap47 [ 596.379054][T11525] ipvlan12: entered promiscuous mode [ 596.385575][T11525] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 596.394861][T11525] team0: Device ipvlan12 is already an upper device of the team interface 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000029000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:19 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 596.442129][T11535] macvtap7: entered allmulticast mode [ 596.447856][T11535] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 596.457056][T11535] team0: Device macvtap7 is already an upper device of the team interface 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030024d51e0000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x2, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6f, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 596.488698][T11540] macvtap48: entered allmulticast mode [ 596.500304][T11540] 8021q: adding VLAN 0 to HW filter on device macvtap48 [ 596.519465][T11542] ipvlan8: entered promiscuous mode 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000100000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 596.553001][T11543] FAULT_INJECTION: forcing a failure. [ 596.553001][T11543] name failslab, interval 1, probability 0, space 0, times 0 [ 596.565830][T11543] CPU: 0 PID: 11543 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 596.576280][T11543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 596.586361][T11543] Call Trace: [ 596.589664][T11543] [ 596.592661][T11543] dump_stack_lvl+0xda/0x130 [ 596.597375][T11543] dump_stack+0x15/0x20 [ 596.601576][T11543] should_fail_ex+0x21f/0x230 [ 596.606368][T11543] ? kstrdup_const+0x3e/0x50 [ 596.611014][T11543] __should_failslab+0x92/0xa0 [ 596.615892][T11543] should_failslab+0x9/0x20 [ 596.620427][T11543] slab_pre_alloc_hook+0x38/0x180 [ 596.625557][T11543] ? kstrdup_const+0x3e/0x50 [ 596.630205][T11543] __kmem_cache_alloc_node+0x48/0x1d0 [ 596.635605][T11543] ? kernfs_xattr_get+0x67/0x80 [ 596.640529][T11543] ? kstrdup_const+0x3e/0x50 [ 596.645249][T11543] __kmalloc_node_track_caller+0x96/0x1a0 [ 596.650990][T11543] kstrdup+0x3a/0x70 [ 596.654928][T11543] kstrdup_const+0x3e/0x50 [ 596.659378][T11543] __kernfs_new_node+0x41/0x380 [ 596.664326][T11543] ? rb_insert_color+0x6a/0x290 [ 596.669199][T11543] ? up_write+0x30/0xe0 [ 596.673451][T11543] ? kernfs_activate+0x252/0x270 [ 596.678463][T11543] kernfs_new_node+0x5f/0xd0 [ 596.683133][T11543] kernfs_create_link+0x6c/0x120 [ 596.688146][T11543] sysfs_do_create_link_sd+0x6b/0xf0 [ 596.693482][T11543] sysfs_create_link+0x51/0x70 [ 596.698251][T11543] device_add_class_symlinks+0x159/0x1e0 [ 596.703936][T11543] device_add+0x410/0x8b0 [ 596.708280][T11543] netdev_register_kobject+0xfc/0x230 [ 596.713668][T11543] register_netdevice+0x680/0xb40 [ 596.718770][T11543] ? rtnl_is_locked+0x15/0x20 [ 596.723487][T11543] ? netdev_rx_handler_register+0x11a/0x140 [ 596.729449][T11543] macvlan_common_newlink+0xa1b/0xbc0 [ 596.734955][T11543] macvtap_newlink+0xf6/0x150 [ 596.739709][T11543] ? macvtap_setup+0x30/0x30 [ 596.744306][T11543] rtnl_newlink+0xee5/0x1670 [ 596.748964][T11543] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 596.755331][T11543] ? _raw_spin_unlock+0x26/0x40 [ 596.760227][T11543] ? __mutex_lock+0x21c/0x8d0 [ 596.764952][T11543] ? rtnl_setlink+0x300/0x300 [ 596.769669][T11543] rtnetlink_rcv_msg+0x807/0x8c0 [ 596.774684][T11543] ? memcg_list_lru_alloc+0xd5/0x750 [ 596.780047][T11543] ? should_fail_ex+0x2d/0x230 [ 596.784862][T11543] ? slab_post_alloc_hook+0x8c/0x340 [ 596.790183][T11543] ? xas_load+0x3ae/0x3c0 [ 596.794521][T11543] ? skb_release_data+0x53d/0x550 [ 596.799628][T11543] ? kmem_cache_free+0x1db/0x3a0 [ 596.804576][T11543] ? __kfree_skb+0x104/0x140 [ 596.809201][T11543] ? nlmon_xmit+0x4b/0x60 [ 596.813627][T11543] ? __kfree_skb+0x104/0x140 [ 596.818275][T11543] ? consume_skb+0x57/0x180 [ 596.822860][T11543] ? nlmon_xmit+0x4b/0x60 [ 596.827233][T11543] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 596.832541][T11543] ? __dev_queue_xmit+0xad9/0x1e20 [ 596.837857][T11543] ? ref_tracker_free+0x3a1/0x400 [ 596.842936][T11543] netlink_rcv_skb+0x126/0x220 [ 596.847790][T11543] ? rtnetlink_bind+0x60/0x60 [ 596.852501][T11543] rtnetlink_rcv+0x1c/0x20 [ 596.856943][T11543] netlink_unicast+0x589/0x650 [ 596.861811][T11543] netlink_sendmsg+0x66e/0x770 [ 596.866606][T11543] ? netlink_getsockopt+0x3e0/0x3e0 [ 596.871900][T11543] ____sys_sendmsg+0x37c/0x4d0 [ 596.876693][T11543] __sys_sendmsg+0x1e9/0x270 [ 596.881412][T11543] __x64_sys_sendmsg+0x46/0x50 [ 596.886254][T11543] do_syscall_64+0x41/0xc0 [ 596.890694][T11543] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 596.896631][T11543] RIP: 0033:0x7f7514d76ae9 [ 596.901106][T11543] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 596.920759][T11543] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 596.929238][T11543] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 596.937218][T11543] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 596.945246][T11543] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 596.953258][T11543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 596.961385][T11543] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 596.969470][T11543] [ 596.982527][T11546] ipvlan12: entered promiscuous mode [ 596.989534][T11546] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 22) 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0xa, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 596.998689][T11546] team0: Device ipvlan12 is already an upper device of the team interface 03:42:20 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 597.050449][T11555] macvtap49: entered allmulticast mode [ 597.061079][T11555] 8021q: adding VLAN 0 to HW filter on device macvtap49 [ 597.078238][T11564] FAULT_INJECTION: forcing a failure. [ 597.078238][T11564] name failslab, interval 1, probability 0, space 0, times 0 [ 597.090904][T11564] CPU: 0 PID: 11564 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 597.101369][T11564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 597.111427][T11564] Call Trace: [ 597.114728][T11564] [ 597.117690][T11564] dump_stack_lvl+0xda/0x130 [ 597.122346][T11564] dump_stack+0x15/0x20 [ 597.126547][T11564] should_fail_ex+0x21f/0x230 [ 597.131264][T11564] __should_failslab+0x92/0xa0 [ 597.136057][T11564] should_failslab+0x9/0x20 [ 597.140578][T11564] slab_pre_alloc_hook+0x38/0x180 [ 597.145681][T11564] kmem_cache_alloc+0x52/0x220 [ 597.150509][T11564] ? __kernfs_new_node+0x6a/0x380 [ 597.155595][T11564] __kernfs_new_node+0x6a/0x380 [ 597.160481][T11564] ? __radix_tree_replace+0x1c1/0x1f0 [ 597.165889][T11564] ? mutex_lock+0xd/0x30 [ 597.170161][T11564] ? kernfs_xattr_get+0x67/0x80 [ 597.175098][T11564] kernfs_new_node+0x5f/0xd0 [ 597.179813][T11564] __kernfs_create_file+0x49/0x180 [ 597.184960][T11564] ? dev_attr_show+0x90/0x90 [ 597.189637][T11564] sysfs_add_file_mode_ns+0x136/0x1b0 [ 597.195121][T11564] internal_create_group+0x2e4/0x800 [ 597.200451][T11564] sysfs_create_groups+0x3c/0xe0 [ 597.205395][T11564] device_add_attrs+0x69/0x400 [ 597.210256][T11564] ? kobject_put+0xd8/0x160 [ 597.214771][T11564] device_add+0x431/0x8b0 [ 597.219150][T11564] netdev_register_kobject+0xfc/0x230 [ 597.224555][T11564] register_netdevice+0x680/0xb40 [ 597.229599][T11564] ? rtnl_is_locked+0x15/0x20 [ 597.234335][T11564] ? netdev_rx_handler_register+0x11a/0x140 [ 597.240236][T11564] macvlan_common_newlink+0xa1b/0xbc0 [ 597.245641][T11564] macvtap_newlink+0xf6/0x150 [ 597.250406][T11564] ? macvtap_setup+0x30/0x30 [ 597.255103][T11564] rtnl_newlink+0xee5/0x1670 [ 597.259715][T11564] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 597.266028][T11564] ? _raw_spin_unlock+0x26/0x40 [ 597.270910][T11564] ? __mutex_lock+0x21c/0x8d0 [ 597.275676][T11564] ? rtnl_setlink+0x300/0x300 [ 597.280394][T11564] rtnetlink_rcv_msg+0x807/0x8c0 [ 597.285423][T11564] ? memcg_list_lru_alloc+0xd5/0x750 [ 597.290776][T11564] ? should_fail_ex+0x2d/0x230 [ 597.295544][T11564] ? slab_post_alloc_hook+0x8c/0x340 [ 597.300911][T11564] ? xas_load+0x3ae/0x3c0 [ 597.305250][T11564] ? skb_release_data+0x53d/0x550 [ 597.310287][T11564] ? kmem_cache_free+0x1db/0x3a0 [ 597.315372][T11564] ? __kfree_skb+0x104/0x140 [ 597.319995][T11564] ? nlmon_xmit+0x4b/0x60 [ 597.324341][T11564] ? __kfree_skb+0x104/0x140 [ 597.328968][T11564] ? consume_skb+0x57/0x180 [ 597.333483][T11564] ? nlmon_xmit+0x4b/0x60 [ 597.337849][T11564] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 597.343243][T11564] ? __dev_queue_xmit+0xad9/0x1e20 [ 597.348478][T11564] ? ref_tracker_free+0x3a1/0x400 [ 597.353548][T11564] netlink_rcv_skb+0x126/0x220 [ 597.358336][T11564] ? rtnetlink_bind+0x60/0x60 [ 597.363058][T11564] rtnetlink_rcv+0x1c/0x20 [ 597.367590][T11564] netlink_unicast+0x589/0x650 [ 597.372378][T11564] netlink_sendmsg+0x66e/0x770 [ 597.377155][T11564] ? netlink_getsockopt+0x3e0/0x3e0 [ 597.382490][T11564] ____sys_sendmsg+0x37c/0x4d0 [ 597.387274][T11564] __sys_sendmsg+0x1e9/0x270 [ 597.391994][T11564] __x64_sys_sendmsg+0x46/0x50 [ 597.396808][T11564] do_syscall_64+0x41/0xc0 [ 597.401307][T11564] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 597.407229][T11564] RIP: 0033:0x7f7514d76ae9 [ 597.411641][T11564] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 597.431285][T11564] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 597.439708][T11564] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 597.447680][T11564] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 597.455695][T11564] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 597.463694][T11564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 597.471667][T11564] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 597.479647][T11564] 03:42:20 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xf, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0xf, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 23) 03:42:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x10, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 597.498002][T11569] ipvlan8: entered promiscuous mode 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x25, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 597.569566][T11574] macvtap50: entered allmulticast mode [ 597.584096][T11574] 8021q: adding VLAN 0 to HW filter on device macvtap50 [ 597.598344][T11577] ipvlan12: entered promiscuous mode [ 597.608563][T11577] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 597.617380][T11577] team0: Device ipvlan12 is already an upper device of the team interface [ 597.654448][T11579] FAULT_INJECTION: forcing a failure. [ 597.654448][T11579] name failslab, interval 1, probability 0, space 0, times 0 [ 597.667237][T11579] CPU: 0 PID: 11579 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 597.677650][T11579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 597.687772][T11579] Call Trace: [ 597.691048][T11579] [ 597.693981][T11579] dump_stack_lvl+0xda/0x130 [ 597.698601][T11579] dump_stack+0x15/0x20 [ 597.702817][T11579] should_fail_ex+0x21f/0x230 [ 597.707522][T11579] __should_failslab+0x92/0xa0 [ 597.712315][T11579] should_failslab+0x9/0x20 [ 597.716818][T11579] slab_pre_alloc_hook+0x38/0x180 [ 597.721853][T11579] kmem_cache_alloc+0x52/0x220 [ 597.726626][T11579] ? __kernfs_new_node+0x6a/0x380 [ 597.731667][T11579] __kernfs_new_node+0x6a/0x380 [ 597.736530][T11579] ? __radix_tree_replace+0x1c1/0x1f0 [ 597.741979][T11579] ? mutex_lock+0xd/0x30 [ 597.746317][T11579] ? kernfs_xattr_get+0x67/0x80 [ 597.751260][T11579] kernfs_new_node+0x5f/0xd0 [ 597.755916][T11579] __kernfs_create_file+0x49/0x180 [ 597.761137][T11579] ? dev_attr_show+0x90/0x90 [ 597.765774][T11579] sysfs_add_file_mode_ns+0x136/0x1b0 [ 597.771173][T11579] internal_create_group+0x2e4/0x800 [ 597.776463][T11579] sysfs_create_groups+0x3c/0xe0 [ 597.781409][T11579] device_add_attrs+0x69/0x400 [ 597.786248][T11579] ? kobject_put+0xd8/0x160 [ 597.790867][T11579] device_add+0x431/0x8b0 [ 597.795228][T11579] netdev_register_kobject+0xfc/0x230 [ 597.800662][T11579] register_netdevice+0x680/0xb40 [ 597.805752][T11579] ? rtnl_is_locked+0x15/0x20 [ 597.810634][T11579] ? netdev_rx_handler_register+0x11a/0x140 [ 597.816567][T11579] macvlan_common_newlink+0xa1b/0xbc0 [ 597.821994][T11579] macvtap_newlink+0xf6/0x150 [ 597.826692][T11579] ? macvtap_setup+0x30/0x30 [ 597.831342][T11579] rtnl_newlink+0xee5/0x1670 [ 597.835967][T11579] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 597.842288][T11579] ? _raw_spin_unlock+0x26/0x40 [ 597.847154][T11579] ? __mutex_lock+0x21c/0x8d0 [ 597.851962][T11579] ? rtnl_setlink+0x300/0x300 [ 597.856702][T11579] rtnetlink_rcv_msg+0x807/0x8c0 [ 597.861678][T11579] ? memcg_list_lru_alloc+0xd5/0x750 [ 597.866975][T11579] ? should_fail_ex+0x2d/0x230 [ 597.871743][T11579] ? slab_post_alloc_hook+0x8c/0x340 [ 597.877096][T11579] ? xas_load+0x3ae/0x3c0 [ 597.881426][T11579] ? skb_release_data+0x53d/0x550 [ 597.886472][T11579] ? kmem_cache_free+0x1db/0x3a0 [ 597.891423][T11579] ? __kfree_skb+0x104/0x140 [ 597.896062][T11579] ? nlmon_xmit+0x4b/0x60 [ 597.900400][T11579] ? __kfree_skb+0x104/0x140 [ 597.905032][T11579] ? consume_skb+0x57/0x180 [ 597.909599][T11579] ? nlmon_xmit+0x4b/0x60 [ 597.914022][T11579] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 597.919398][T11579] ? __dev_queue_xmit+0xad9/0x1e20 [ 597.924602][T11579] ? ref_tracker_free+0x3a1/0x400 [ 597.929675][T11579] netlink_rcv_skb+0x126/0x220 [ 597.934481][T11579] ? rtnetlink_bind+0x60/0x60 [ 597.939175][T11579] rtnetlink_rcv+0x1c/0x20 [ 597.943607][T11579] netlink_unicast+0x589/0x650 [ 597.948388][T11579] netlink_sendmsg+0x66e/0x770 [ 597.953311][T11579] ? netlink_getsockopt+0x3e0/0x3e0 [ 597.958571][T11579] ____sys_sendmsg+0x37c/0x4d0 [ 597.963385][T11579] __sys_sendmsg+0x1e9/0x270 [ 597.968063][T11579] __x64_sys_sendmsg+0x46/0x50 [ 597.972945][T11579] do_syscall_64+0x41/0xc0 [ 597.977382][T11579] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 597.983393][T11579] RIP: 0033:0x7f7514d76ae9 [ 597.987876][T11579] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 598.007546][T11579] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 598.016035][T11579] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 598.024048][T11579] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 598.032061][T11579] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 598.040041][T11579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 598.048045][T11579] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 598.056026][T11579] [ 598.061679][T11587] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.1'. 03:42:21 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:21 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x140, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 24) 03:42:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9c, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 598.086080][T11593] macvtap51: entered allmulticast mode [ 598.094540][T11593] 8021q: adding VLAN 0 to HW filter on device macvtap51 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0xec0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 598.133654][T11597] ipvlan8: entered promiscuous mode 03:42:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 598.176627][T11601] FAULT_INJECTION: forcing a failure. [ 598.176627][T11601] name failslab, interval 1, probability 0, space 0, times 0 [ 598.189299][T11601] CPU: 0 PID: 11601 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 598.199810][T11601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 598.209972][T11601] Call Trace: [ 598.213266][T11601] [ 598.216220][T11601] dump_stack_lvl+0xda/0x130 [ 598.220882][T11601] dump_stack+0x15/0x20 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 598.225154][T11601] should_fail_ex+0x21f/0x230 [ 598.229870][T11601] __should_failslab+0x92/0xa0 [ 598.234762][T11601] should_failslab+0x9/0x20 [ 598.239359][T11601] slab_pre_alloc_hook+0x38/0x180 [ 598.244421][T11601] kmem_cache_alloc+0x52/0x220 [ 598.249220][T11601] ? __kernfs_new_node+0x6a/0x380 [ 598.254287][T11601] __kernfs_new_node+0x6a/0x380 [ 598.259236][T11601] ? rb_insert_color+0x263/0x290 [ 598.264246][T11601] ? up_write+0x30/0xe0 [ 598.268425][T11601] ? kernfs_activate+0x252/0x270 [ 598.273461][T11601] kernfs_new_node+0x5f/0xd0 [ 598.278159][T11601] __kernfs_create_file+0x49/0x180 [ 598.283333][T11601] ? dev_attr_show+0x90/0x90 [ 598.287926][T11601] sysfs_add_file_mode_ns+0x136/0x1b0 [ 598.293367][T11601] internal_create_group+0x2e4/0x800 [ 598.298683][T11601] sysfs_create_groups+0x3c/0xe0 [ 598.303649][T11601] device_add_attrs+0x69/0x400 [ 598.308505][T11601] ? kobject_put+0xd8/0x160 [ 598.313137][T11601] device_add+0x431/0x8b0 [ 598.317544][T11601] netdev_register_kobject+0xfc/0x230 [ 598.322929][T11601] register_netdevice+0x680/0xb40 [ 598.328046][T11601] ? rtnl_is_locked+0x15/0x20 [ 598.332743][T11601] ? netdev_rx_handler_register+0x11a/0x140 [ 598.338768][T11601] macvlan_common_newlink+0xa1b/0xbc0 [ 598.344152][T11601] macvtap_newlink+0xf6/0x150 [ 598.348948][T11601] ? macvtap_setup+0x30/0x30 [ 598.353622][T11601] rtnl_newlink+0xee5/0x1670 [ 598.358268][T11601] ? cgroup_rstat_updated+0x8c/0x1c0 [ 598.363572][T11601] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 598.369967][T11601] ? _raw_spin_unlock+0x26/0x40 [ 598.374850][T11601] ? __mutex_lock+0x21c/0x8d0 [ 598.379591][T11601] ? rtnl_setlink+0x300/0x300 [ 598.384280][T11601] rtnetlink_rcv_msg+0x807/0x8c0 [ 598.389299][T11601] ? memcg_list_lru_alloc+0xd5/0x750 [ 598.394699][T11601] ? should_fail_ex+0x2d/0x230 [ 598.399500][T11601] ? slab_post_alloc_hook+0x8c/0x340 [ 598.404948][T11601] ? xas_load+0x3ae/0x3c0 [ 598.409307][T11601] ? skb_release_data+0x53d/0x550 [ 598.414449][T11601] ? kmem_cache_free+0x1db/0x3a0 [ 598.419416][T11601] ? __kfree_skb+0x104/0x140 [ 598.424125][T11601] ? nlmon_xmit+0x4b/0x60 [ 598.428474][T11601] ? __kfree_skb+0x104/0x140 [ 598.433125][T11601] ? consume_skb+0x57/0x180 [ 598.437661][T11601] ? nlmon_xmit+0x4b/0x60 [ 598.441995][T11601] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 598.447366][T11601] ? __dev_queue_xmit+0xad9/0x1e20 [ 598.452481][T11601] ? ref_tracker_free+0x3a1/0x400 [ 598.457650][T11601] netlink_rcv_skb+0x126/0x220 [ 598.462426][T11601] ? rtnetlink_bind+0x60/0x60 [ 598.467202][T11601] rtnetlink_rcv+0x1c/0x20 [ 598.471638][T11601] netlink_unicast+0x589/0x650 [ 598.476427][T11601] netlink_sendmsg+0x66e/0x770 [ 598.481306][T11601] ? netlink_getsockopt+0x3e0/0x3e0 [ 598.486570][T11601] ____sys_sendmsg+0x37c/0x4d0 [ 598.491385][T11601] __sys_sendmsg+0x1e9/0x270 [ 598.496134][T11601] __x64_sys_sendmsg+0x46/0x50 [ 598.501002][T11601] do_syscall_64+0x41/0xc0 [ 598.505434][T11601] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 598.511364][T11601] RIP: 0033:0x7f7514d76ae9 [ 598.515909][T11601] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 598.535602][T11601] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 598.544045][T11601] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 598.552199][T11601] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 598.560173][T11601] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 598.568143][T11601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 598.576135][T11601] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 598.584141][T11601] [ 598.606329][T11603] ipvlan12: entered promiscuous mode [ 598.613181][T11603] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 598.622463][T11603] team0: Device ipvlan12 is already an upper device of the team interface 03:42:21 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x11, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 25) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000029697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:21 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb1, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 598.653616][T11606] macvtap52: entered allmulticast mode [ 598.662184][T11606] 8021q: adding VLAN 0 to HW filter on device macvtap52 [ 598.707363][T11620] FAULT_INJECTION: forcing a failure. [ 598.707363][T11620] name failslab, interval 1, probability 0, space 0, times 0 [ 598.713209][T11627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11627 comm=syz-executor.1 [ 598.720094][T11620] CPU: 0 PID: 11620 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 598.720122][T11620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 598.753349][T11620] Call Trace: 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 598.756645][T11620] [ 598.759591][T11620] dump_stack_lvl+0xda/0x130 [ 598.764331][T11620] dump_stack+0x15/0x20 [ 598.768533][T11620] should_fail_ex+0x21f/0x230 [ 598.773296][T11620] __should_failslab+0x92/0xa0 [ 598.778113][T11620] should_failslab+0x9/0x20 [ 598.782708][T11620] slab_pre_alloc_hook+0x38/0x180 [ 598.787845][T11620] kmem_cache_alloc+0x52/0x220 [ 598.792642][T11620] ? __kernfs_new_node+0x6a/0x380 [ 598.797715][T11620] __kernfs_new_node+0x6a/0x380 [ 598.802693][T11620] ? rb_insert_color+0x6a/0x290 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000002000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000011000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 598.807653][T11620] ? up_write+0x30/0xe0 [ 598.811877][T11620] ? kernfs_activate+0x252/0x270 [ 598.816862][T11620] kernfs_new_node+0x5f/0xd0 [ 598.821588][T11620] __kernfs_create_file+0x49/0x180 [ 598.826792][T11620] ? dev_attr_show+0x90/0x90 [ 598.831472][T11620] sysfs_add_file_mode_ns+0x136/0x1b0 [ 598.836928][T11620] internal_create_group+0x2e4/0x800 [ 598.842248][T11620] sysfs_create_groups+0x3c/0xe0 [ 598.847213][T11620] device_add_attrs+0x69/0x400 [ 598.852076][T11620] ? kobject_put+0xd8/0x160 03:42:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 598.856625][T11620] device_add+0x431/0x8b0 [ 598.861001][T11620] netdev_register_kobject+0xfc/0x230 [ 598.866573][T11620] register_netdevice+0x680/0xb40 [ 598.871751][T11620] ? rtnl_is_locked+0x15/0x20 [ 598.876468][T11620] ? netdev_rx_handler_register+0x11a/0x140 [ 598.882454][T11620] macvlan_common_newlink+0xa1b/0xbc0 [ 598.887868][T11620] macvtap_newlink+0xf6/0x150 [ 598.892593][T11620] ? macvtap_setup+0x30/0x30 [ 598.897240][T11620] rtnl_newlink+0xee5/0x1670 [ 598.901902][T11620] ? security_capable+0x5e/0x80 [ 598.906772][T11620] ? ns_capable+0x7c/0xb0 [ 598.911165][T11620] ? rtnl_setlink+0x300/0x300 [ 598.915851][T11620] rtnetlink_rcv_msg+0x807/0x8c0 [ 598.920855][T11620] ? memcg_list_lru_alloc+0xd5/0x750 [ 598.926163][T11620] ? should_fail_ex+0x2d/0x230 [ 598.930958][T11620] ? slab_post_alloc_hook+0x8c/0x340 [ 598.936351][T11620] ? xas_load+0x3ae/0x3c0 [ 598.940680][T11620] ? skb_release_data+0x53d/0x550 [ 598.945744][T11620] ? kmem_cache_free+0x1db/0x3a0 [ 598.950802][T11620] ? __kfree_skb+0x104/0x140 [ 598.955404][T11620] ? nlmon_xmit+0x4b/0x60 [ 598.959737][T11620] ? __kfree_skb+0x104/0x140 [ 598.964360][T11620] ? consume_skb+0x57/0x180 [ 598.968921][T11620] ? nlmon_xmit+0x4b/0x60 [ 598.973289][T11620] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 598.978608][T11620] ? __dev_queue_xmit+0xad9/0x1e20 [ 598.983743][T11620] ? ref_tracker_free+0x3a1/0x400 [ 598.988814][T11620] netlink_rcv_skb+0x126/0x220 [ 598.993630][T11620] ? rtnetlink_bind+0x60/0x60 [ 598.998383][T11620] rtnetlink_rcv+0x1c/0x20 [ 599.002813][T11620] netlink_unicast+0x589/0x650 [ 599.007645][T11620] netlink_sendmsg+0x66e/0x770 [ 599.012462][T11620] ? netlink_getsockopt+0x3e0/0x3e0 [ 599.017715][T11620] ____sys_sendmsg+0x37c/0x4d0 [ 599.022520][T11620] __sys_sendmsg+0x1e9/0x270 [ 599.027186][T11620] __x64_sys_sendmsg+0x46/0x50 [ 599.031979][T11620] do_syscall_64+0x41/0xc0 [ 599.036519][T11620] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 599.042440][T11620] RIP: 0033:0x7f7514d76ae9 [ 599.046919][T11620] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 599.066633][T11620] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 599.075095][T11620] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 599.083069][T11620] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 599.091089][T11620] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 599.099071][T11620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 599.107078][T11620] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 599.115063][T11620] [ 599.132863][T11626] macvtap53: entered allmulticast mode [ 599.141898][T11626] 8021q: adding VLAN 0 to HW filter on device macvtap53 [ 599.153477][T11628] ipvlan12: entered promiscuous mode [ 599.159944][T11628] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 599.168569][T11628] team0: Device ipvlan12 is already an upper device of the team interface [ 599.197906][T11629] ipvlan8: entered promiscuous mode 03:42:22 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd1, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000088000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:22 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 26) 03:42:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x4, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 599.281695][T11644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=11644 comm=syz-executor.1 [ 599.306685][T11648] macvtap54: entered allmulticast mode [ 599.317558][T11648] 8021q: adding VLAN 0 to HW filter on device macvtap54 03:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf5, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x5, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 599.343829][T11649] ipvlan12: entered promiscuous mode [ 599.354205][T11649] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 599.363512][T11649] team0: Device ipvlan12 is already an upper device of the team interface [ 599.372768][T11658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=11658 comm=syz-executor.1 [ 599.406433][T11652] ipvlan8: entered promiscuous mode [ 599.422963][T11665] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=11665 comm=syz-executor.1 [ 599.442774][T11653] FAULT_INJECTION: forcing a failure. [ 599.442774][T11653] name failslab, interval 1, probability 0, space 0, times 0 [ 599.455487][T11653] CPU: 1 PID: 11653 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 599.465921][T11653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 599.475994][T11653] Call Trace: [ 599.479275][T11653] [ 599.482203][T11653] dump_stack_lvl+0xda/0x130 [ 599.486896][T11653] dump_stack+0x15/0x20 [ 599.491065][T11653] should_fail_ex+0x21f/0x230 [ 599.495762][T11653] __should_failslab+0x92/0xa0 [ 599.500549][T11653] should_failslab+0x9/0x20 [ 599.505070][T11653] slab_pre_alloc_hook+0x38/0x180 [ 599.510115][T11653] kmem_cache_alloc+0x52/0x220 [ 599.514907][T11653] ? __kernfs_new_node+0x6a/0x380 [ 599.519984][T11653] __kernfs_new_node+0x6a/0x380 [ 599.524896][T11653] ? rb_insert_color+0x6a/0x290 [ 599.529773][T11653] ? up_write+0x30/0xe0 [ 599.533944][T11653] ? kernfs_activate+0x252/0x270 [ 599.538895][T11653] kernfs_new_node+0x5f/0xd0 [ 599.543550][T11653] __kernfs_create_file+0x49/0x180 [ 599.548693][T11653] ? dev_attr_show+0x90/0x90 [ 599.553295][T11653] sysfs_add_file_mode_ns+0x136/0x1b0 [ 599.558760][T11653] internal_create_group+0x2e4/0x800 [ 599.564082][T11653] sysfs_create_groups+0x3c/0xe0 [ 599.569042][T11653] device_add_attrs+0x69/0x400 [ 599.573834][T11653] ? kobject_put+0xd8/0x160 [ 599.578435][T11653] device_add+0x431/0x8b0 [ 599.582787][T11653] netdev_register_kobject+0xfc/0x230 [ 599.588269][T11653] register_netdevice+0x680/0xb40 [ 599.593453][T11653] ? rtnl_is_locked+0x15/0x20 [ 599.598217][T11653] ? netdev_rx_handler_register+0x11a/0x140 [ 599.604136][T11653] macvlan_common_newlink+0xa1b/0xbc0 [ 599.609581][T11653] macvtap_newlink+0xf6/0x150 [ 599.614321][T11653] ? macvtap_setup+0x30/0x30 [ 599.618970][T11653] rtnl_newlink+0xee5/0x1670 [ 599.623681][T11653] ? cgroup_rstat_updated+0x8c/0x1c0 [ 599.629045][T11653] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 599.635343][T11653] ? _raw_spin_unlock+0x26/0x40 [ 599.640225][T11653] ? __mutex_lock+0x21c/0x8d0 [ 599.644939][T11653] ? rtnl_setlink+0x300/0x300 [ 599.649729][T11653] rtnetlink_rcv_msg+0x807/0x8c0 [ 599.654782][T11653] ? memcg_list_lru_alloc+0xd5/0x750 [ 599.660082][T11653] ? should_fail_ex+0x2d/0x230 [ 599.664860][T11653] ? slab_post_alloc_hook+0x8c/0x340 [ 599.670216][T11653] ? xas_load+0x3ae/0x3c0 [ 599.674557][T11653] ? skb_release_data+0x53d/0x550 [ 599.679697][T11653] ? kmem_cache_free+0x1db/0x3a0 [ 599.684638][T11653] ? __kfree_skb+0x104/0x140 [ 599.689239][T11653] ? nlmon_xmit+0x4b/0x60 [ 599.693597][T11653] ? __kfree_skb+0x104/0x140 [ 599.698261][T11653] ? consume_skb+0x57/0x180 [ 599.702775][T11653] ? nlmon_xmit+0x4b/0x60 [ 599.707203][T11653] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 599.712497][T11653] ? __dev_queue_xmit+0xad9/0x1e20 [ 599.717732][T11653] ? ref_tracker_free+0x3a1/0x400 [ 599.722856][T11653] netlink_rcv_skb+0x126/0x220 [ 599.727709][T11653] ? rtnetlink_bind+0x60/0x60 [ 599.732405][T11653] rtnetlink_rcv+0x1c/0x20 [ 599.736854][T11653] netlink_unicast+0x589/0x650 [ 599.741633][T11653] netlink_sendmsg+0x66e/0x770 [ 599.746537][T11653] ? netlink_getsockopt+0x3e0/0x3e0 [ 599.751770][T11653] ____sys_sendmsg+0x37c/0x4d0 [ 599.756553][T11653] __sys_sendmsg+0x1e9/0x270 [ 599.761369][T11653] __x64_sys_sendmsg+0x46/0x50 [ 599.766250][T11653] do_syscall_64+0x41/0xc0 [ 599.770717][T11653] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 599.776667][T11653] RIP: 0033:0x7f7514d76ae9 [ 599.781079][T11653] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 599.800696][T11653] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 599.809223][T11653] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 599.817208][T11653] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 599.825246][T11653] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 599.833224][T11653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 599.841218][T11653] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 599.849195][T11653] [ 599.865704][T11661] macvtap55: entered allmulticast mode [ 599.874492][T11661] 8021q: adding VLAN 0 to HW filter on device macvtap55 [ 599.900933][T11668] FAULT_INJECTION: forcing a failure. [ 599.900933][T11668] name failslab, interval 1, probability 0, space 0, times 0 03:42:22 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x1d, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 27) 03:42:22 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf9, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 599.908314][T11669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=11669 comm=syz-executor.1 [ 599.913598][T11668] CPU: 1 PID: 11668 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 599.936846][T11668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 599.946983][T11668] Call Trace: [ 599.950290][T11668] [ 599.953280][T11668] dump_stack_lvl+0xda/0x130 [ 599.957916][T11668] dump_stack+0x15/0x20 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 599.962102][T11668] should_fail_ex+0x21f/0x230 [ 599.966808][T11668] __should_failslab+0x92/0xa0 [ 599.971659][T11668] should_failslab+0x9/0x20 [ 599.976195][T11668] slab_pre_alloc_hook+0x38/0x180 [ 599.981342][T11668] kmem_cache_alloc+0x52/0x220 [ 599.986141][T11668] ? __kernfs_new_node+0x6a/0x380 [ 599.991241][T11668] __kernfs_new_node+0x6a/0x380 [ 599.996129][T11668] ? rb_insert_color+0x6a/0x290 [ 600.001047][T11668] ? up_write+0x30/0xe0 [ 600.005278][T11668] ? kernfs_activate+0x252/0x270 [ 600.010440][T11668] kernfs_new_node+0x5f/0xd0 [ 600.015075][T11668] __kernfs_create_file+0x49/0x180 [ 600.020237][T11668] ? dev_attr_show+0x90/0x90 [ 600.024909][T11668] sysfs_add_file_mode_ns+0x136/0x1b0 [ 600.030393][T11668] internal_create_group+0x2e4/0x800 [ 600.035789][T11668] sysfs_create_groups+0x3c/0xe0 [ 600.040856][T11668] device_add_attrs+0x69/0x400 [ 600.045672][T11668] ? kobject_put+0xd8/0x160 [ 600.050224][T11668] device_add+0x431/0x8b0 [ 600.054600][T11668] netdev_register_kobject+0xfc/0x230 [ 600.060023][T11668] register_netdevice+0x680/0xb40 [ 600.065267][T11668] ? rtnl_is_locked+0x15/0x20 [ 600.070071][T11668] ? netdev_rx_handler_register+0x11a/0x140 [ 600.075999][T11668] macvlan_common_newlink+0xa1b/0xbc0 [ 600.081406][T11668] macvtap_newlink+0xf6/0x150 [ 600.086192][T11668] ? macvtap_setup+0x30/0x30 [ 600.090843][T11668] rtnl_newlink+0xee5/0x1670 [ 600.095545][T11668] ? security_capable+0x5e/0x80 [ 600.100467][T11668] ? ns_capable+0x7c/0xb0 [ 600.104843][T11668] ? rtnl_setlink+0x300/0x300 [ 600.109534][T11668] rtnetlink_rcv_msg+0x807/0x8c0 [ 600.114507][T11668] ? should_fail_ex+0x2d/0x230 [ 600.119275][T11668] ? slab_post_alloc_hook+0x8c/0x340 [ 600.124568][T11668] ? kmem_cache_free+0x1db/0x3a0 [ 600.129539][T11668] ? kmem_cache_free+0x1db/0x3a0 [ 600.134501][T11668] ? __kfree_skb+0x104/0x140 [ 600.139160][T11668] ? nlmon_xmit+0x4b/0x60 [ 600.143513][T11668] ? __kfree_skb+0x104/0x140 [ 600.148122][T11668] ? consume_skb+0x57/0x180 [ 600.152709][T11668] ? nlmon_xmit+0x4b/0x60 [ 600.157060][T11668] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 600.162363][T11668] ? __dev_queue_xmit+0xad9/0x1e20 [ 600.167503][T11668] ? ref_tracker_free+0x3a1/0x400 [ 600.172554][T11668] netlink_rcv_skb+0x126/0x220 [ 600.177360][T11668] ? rtnetlink_bind+0x60/0x60 [ 600.182214][T11668] rtnetlink_rcv+0x1c/0x20 [ 600.186642][T11668] netlink_unicast+0x589/0x650 [ 600.191431][T11668] netlink_sendmsg+0x66e/0x770 [ 600.196221][T11668] ? netlink_getsockopt+0x3e0/0x3e0 [ 600.201455][T11668] ____sys_sendmsg+0x37c/0x4d0 [ 600.206260][T11668] __sys_sendmsg+0x1e9/0x270 [ 600.210977][T11668] __x64_sys_sendmsg+0x46/0x50 [ 600.215773][T11668] do_syscall_64+0x41/0xc0 [ 600.220228][T11668] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 600.226153][T11668] RIP: 0033:0x7f7514d76ae9 [ 600.230624][T11668] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 600.250292][T11668] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 600.258729][T11668] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 600.266718][T11668] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 600.274700][T11668] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 600.282694][T11668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 600.290810][T11668] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 600.298810][T11668] [ 600.313462][T11675] ipvlan12: entered promiscuous mode [ 600.320730][T11675] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 600.330330][T11675] team0: Device ipvlan12 is already an upper device of the team interface [ 600.352531][T11674] macvtap56: entered allmulticast mode [ 600.361316][T11674] 8021q: adding VLAN 0 to HW filter on device macvtap56 03:42:23 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000030000001ed524000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x7, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 28) [ 600.372978][T11677] ipvlan8: entered promiscuous mode [ 600.420635][T11695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=11695 comm=syz-executor.1 [ 600.437377][T11694] FAULT_INJECTION: forcing a failure. [ 600.437377][T11694] name failslab, interval 1, probability 0, space 0, times 0 [ 600.450211][T11694] CPU: 0 PID: 11694 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 600.460647][T11694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 600.470712][T11694] Call Trace: [ 600.474073][T11694] [ 600.477203][T11694] dump_stack_lvl+0xda/0x130 [ 600.481830][T11694] dump_stack+0x15/0x20 [ 600.486021][T11694] should_fail_ex+0x21f/0x230 [ 600.490782][T11694] __should_failslab+0x92/0xa0 [ 600.495607][T11694] should_failslab+0x9/0x20 [ 600.500214][T11694] slab_pre_alloc_hook+0x38/0x180 [ 600.505304][T11694] kmem_cache_alloc+0x52/0x220 [ 600.510148][T11694] ? __kernfs_new_node+0x6a/0x380 [ 600.515209][T11694] __kernfs_new_node+0x6a/0x380 [ 600.520117][T11694] ? rb_insert_color+0x6a/0x290 [ 600.525025][T11694] ? up_write+0x30/0xe0 [ 600.529232][T11694] ? kernfs_activate+0x252/0x270 [ 600.534262][T11694] kernfs_new_node+0x5f/0xd0 [ 600.538960][T11694] __kernfs_create_file+0x49/0x180 [ 600.544089][T11694] ? dev_attr_show+0x90/0x90 [ 600.548678][T11694] sysfs_add_file_mode_ns+0x136/0x1b0 [ 600.554091][T11694] internal_create_group+0x2e4/0x800 [ 600.559459][T11694] sysfs_create_groups+0x3c/0xe0 [ 600.564509][T11694] device_add_attrs+0x69/0x400 [ 600.569365][T11694] ? kobject_put+0xd8/0x160 [ 600.573955][T11694] device_add+0x431/0x8b0 [ 600.578346][T11694] netdev_register_kobject+0xfc/0x230 [ 600.583770][T11694] register_netdevice+0x680/0xb40 [ 600.588891][T11694] ? rtnl_is_locked+0x15/0x20 [ 600.593584][T11694] ? netdev_rx_handler_register+0x11a/0x140 [ 600.599605][T11694] macvlan_common_newlink+0xa1b/0xbc0 [ 600.604986][T11694] macvtap_newlink+0xf6/0x150 [ 600.609738][T11694] ? macvtap_setup+0x30/0x30 [ 600.614466][T11694] rtnl_newlink+0xee5/0x1670 [ 600.619105][T11694] ? security_capable+0x5e/0x80 [ 600.623994][T11694] ? ns_capable+0x7c/0xb0 [ 600.628412][T11694] ? rtnl_setlink+0x300/0x300 [ 600.633203][T11694] rtnetlink_rcv_msg+0x807/0x8c0 [ 600.638175][T11694] ? memcg_list_lru_alloc+0xd5/0x750 [ 600.643571][T11694] ? should_fail_ex+0x2d/0x230 [ 600.648371][T11694] ? slab_post_alloc_hook+0x8c/0x340 [ 600.653661][T11694] ? xas_load+0x3ae/0x3c0 [ 600.658075][T11694] ? skb_release_data+0x53d/0x550 [ 600.663119][T11694] ? kmem_cache_free+0x1db/0x3a0 [ 600.668126][T11694] ? __kfree_skb+0x104/0x140 [ 600.672828][T11694] ? nlmon_xmit+0x4b/0x60 [ 600.677184][T11694] ? __kfree_skb+0x104/0x140 [ 600.681863][T11694] ? consume_skb+0x57/0x180 [ 600.686433][T11694] ? nlmon_xmit+0x4b/0x60 [ 600.690799][T11694] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 600.696121][T11694] ? __dev_queue_xmit+0xad9/0x1e20 [ 600.701354][T11694] ? ref_tracker_free+0x3a1/0x400 [ 600.706404][T11694] netlink_rcv_skb+0x126/0x220 [ 600.711185][T11694] ? rtnetlink_bind+0x60/0x60 [ 600.715984][T11694] rtnetlink_rcv+0x1c/0x20 [ 600.720442][T11694] netlink_unicast+0x589/0x650 [ 600.725266][T11694] netlink_sendmsg+0x66e/0x770 [ 600.730139][T11694] ? netlink_getsockopt+0x3e0/0x3e0 [ 600.735417][T11694] ____sys_sendmsg+0x37c/0x4d0 [ 600.740303][T11694] __sys_sendmsg+0x1e9/0x270 [ 600.744917][T11694] __x64_sys_sendmsg+0x46/0x50 [ 600.749696][T11694] do_syscall_64+0x41/0xc0 [ 600.754158][T11694] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 600.760143][T11694] RIP: 0033:0x7f7514d76ae9 [ 600.764663][T11694] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 600.784377][T11694] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 600.792876][T11694] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 600.800863][T11694] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 600.808837][T11694] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 03:42:23 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x12f, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x8, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 29) [ 600.816884][T11694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 600.824890][T11694] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 600.832952][T11694] [ 600.848060][T11697] ipvlan12: entered promiscuous mode [ 600.858195][T11697] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x9, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 600.877133][T11701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=11701 comm=syz-executor.1 [ 600.895071][T11697] team0: Device ipvlan12 is already an upper device of the team interface 03:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 600.925229][T11710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=11710 comm=syz-executor.1 [ 600.953208][T11704] macvtap57: entered allmulticast mode [ 600.963615][T11704] 8021q: adding VLAN 0 to HW filter on device macvtap57 03:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1f], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x3b8) 03:42:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:24 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x25, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x165, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 600.977179][T11707] ipvlan8: entered promiscuous mode [ 600.992407][T11716] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=11716 comm=syz-executor.1 [ 601.037600][T11706] FAULT_INJECTION: forcing a failure. [ 601.037600][T11706] name failslab, interval 1, probability 0, space 0, times 0 [ 601.050401][T11706] CPU: 0 PID: 11706 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 601.060845][T11706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 601.070930][T11706] Call Trace: [ 601.074216][T11706] [ 601.077161][T11706] dump_stack_lvl+0xda/0x130 [ 601.081801][T11706] dump_stack+0x15/0x20 [ 601.086011][T11706] should_fail_ex+0x21f/0x230 [ 601.090858][T11706] __should_failslab+0x92/0xa0 [ 601.095659][T11706] should_failslab+0x9/0x20 [ 601.100253][T11706] slab_pre_alloc_hook+0x38/0x180 [ 601.105352][T11706] kmem_cache_alloc+0x52/0x220 [ 601.110233][T11706] ? __kernfs_new_node+0x6a/0x380 [ 601.115286][T11706] __kernfs_new_node+0x6a/0x380 [ 601.120191][T11706] ? rb_insert_color+0x6a/0x290 [ 601.125093][T11706] ? up_write+0x30/0xe0 [ 601.129304][T11706] ? kernfs_activate+0x252/0x270 [ 601.134269][T11706] kernfs_new_node+0x5f/0xd0 [ 601.138946][T11706] __kernfs_create_file+0x49/0x180 [ 601.144171][T11706] ? dev_attr_show+0x90/0x90 [ 601.148771][T11706] sysfs_add_file_mode_ns+0x136/0x1b0 [ 601.154185][T11706] internal_create_group+0x2e4/0x800 [ 601.159528][T11706] sysfs_create_groups+0x3c/0xe0 [ 601.164484][T11706] device_add_attrs+0x69/0x400 [ 601.169276][T11706] ? kobject_put+0xd8/0x160 [ 601.173809][T11706] device_add+0x431/0x8b0 [ 601.178154][T11706] netdev_register_kobject+0xfc/0x230 [ 601.183572][T11706] register_netdevice+0x680/0xb40 [ 601.188705][T11706] ? rtnl_is_locked+0x15/0x20 [ 601.193447][T11706] ? netdev_rx_handler_register+0x11a/0x140 [ 601.199436][T11706] macvlan_common_newlink+0xa1b/0xbc0 [ 601.204843][T11706] macvtap_newlink+0xf6/0x150 [ 601.209545][T11706] ? macvtap_setup+0x30/0x30 [ 601.214219][T11706] rtnl_newlink+0xee5/0x1670 [ 601.218846][T11706] ? cgroup_rstat_updated+0x8c/0x1c0 [ 601.224162][T11706] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 601.230506][T11706] ? _raw_spin_unlock+0x26/0x40 [ 601.235359][T11706] ? __mutex_lock+0x21c/0x8d0 [ 601.240159][T11706] ? rtnl_setlink+0x300/0x300 [ 601.244876][T11706] rtnetlink_rcv_msg+0x807/0x8c0 [ 601.249866][T11706] ? memcg_list_lru_alloc+0xd5/0x750 [ 601.255221][T11706] ? should_fail_ex+0x2d/0x230 [ 601.260019][T11706] ? slab_post_alloc_hook+0x8c/0x340 [ 601.265472][T11706] ? xas_load+0x3ae/0x3c0 [ 601.269869][T11706] ? skb_release_data+0x53d/0x550 [ 601.274910][T11706] ? kmem_cache_free+0x1db/0x3a0 [ 601.279927][T11706] ? __kfree_skb+0x104/0x140 [ 601.284546][T11706] ? nlmon_xmit+0x4b/0x60 [ 601.288900][T11706] ? __kfree_skb+0x104/0x140 [ 601.293612][T11706] ? consume_skb+0x57/0x180 [ 601.298128][T11706] ? nlmon_xmit+0x4b/0x60 [ 601.302621][T11706] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 601.307969][T11706] ? __dev_queue_xmit+0xad9/0x1e20 [ 601.313084][T11706] ? ref_tracker_free+0x3a1/0x400 [ 601.318119][T11706] netlink_rcv_skb+0x126/0x220 [ 601.322973][T11706] ? rtnetlink_bind+0x60/0x60 [ 601.327688][T11706] rtnetlink_rcv+0x1c/0x20 [ 601.332198][T11706] netlink_unicast+0x589/0x650 [ 601.336998][T11706] netlink_sendmsg+0x66e/0x770 [ 601.341778][T11706] ? netlink_getsockopt+0x3e0/0x3e0 [ 601.347062][T11706] ____sys_sendmsg+0x37c/0x4d0 [ 601.351915][T11706] __sys_sendmsg+0x1e9/0x270 [ 601.356534][T11706] __x64_sys_sendmsg+0x46/0x50 [ 601.361362][T11706] do_syscall_64+0x41/0xc0 [ 601.365803][T11706] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 601.371798][T11706] RIP: 0033:0x7f7514d76ae9 [ 601.376224][T11706] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 601.395847][T11706] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 601.404267][T11706] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 601.412311][T11706] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 601.420294][T11706] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 601.428357][T11706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:24 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1f], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x3b8) 03:42:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xb, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 30) [ 601.436348][T11706] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 601.444343][T11706] [ 601.457170][T11719] ipvlan12: entered promiscuous mode [ 601.464395][T11719] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 601.473179][T11719] team0: Device ipvlan12 is already an upper device of the team interface 03:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1f], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x3b8) 03:42:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x0, 0xb3550aa4ba878345}, 0x9c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xc, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 601.494612][T11725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=11725 comm=syz-executor.1 03:42:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xd, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x169, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:24 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 601.548220][T11721] macvtap58: entered allmulticast mode [ 601.557860][T11721] 8021q: adding VLAN 0 to HW filter on device macvtap58 [ 601.572130][T11729] ipvlan8: entered promiscuous mode [ 601.619040][T11728] FAULT_INJECTION: forcing a failure. [ 601.619040][T11728] name failslab, interval 1, probability 0, space 0, times 0 [ 601.631871][T11728] CPU: 1 PID: 11728 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 601.642430][T11728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 601.652564][T11728] Call Trace: [ 601.655874][T11728] [ 601.658807][T11728] dump_stack_lvl+0xda/0x130 [ 601.663448][T11728] dump_stack+0x15/0x20 [ 601.667623][T11728] should_fail_ex+0x21f/0x230 [ 601.672315][T11728] __should_failslab+0x92/0xa0 [ 601.677099][T11728] should_failslab+0x9/0x20 [ 601.681674][T11728] slab_pre_alloc_hook+0x38/0x180 [ 601.686737][T11728] kmem_cache_alloc+0x52/0x220 [ 601.691515][T11728] ? __kernfs_new_node+0x6a/0x380 [ 601.696618][T11728] __kernfs_new_node+0x6a/0x380 [ 601.701491][T11728] ? rb_insert_color+0x6a/0x290 [ 601.706356][T11728] ? up_write+0x30/0xe0 [ 601.710618][T11728] ? kernfs_activate+0x252/0x270 [ 601.715654][T11728] kernfs_new_node+0x5f/0xd0 [ 601.720265][T11728] __kernfs_create_file+0x49/0x180 [ 601.725441][T11728] ? dev_attr_show+0x90/0x90 [ 601.730039][T11728] sysfs_add_file_mode_ns+0x136/0x1b0 [ 601.735497][T11728] internal_create_group+0x2e4/0x800 [ 601.740837][T11728] sysfs_create_groups+0x3c/0xe0 [ 601.745870][T11728] device_add_attrs+0x69/0x400 [ 601.750701][T11728] ? kobject_put+0xd8/0x160 [ 601.755226][T11728] device_add+0x431/0x8b0 [ 601.759579][T11728] netdev_register_kobject+0xfc/0x230 [ 601.765053][T11728] register_netdevice+0x680/0xb40 [ 601.770134][T11728] ? rtnl_is_locked+0x15/0x20 [ 601.774971][T11728] ? netdev_rx_handler_register+0x11a/0x140 [ 601.780948][T11728] macvlan_common_newlink+0xa1b/0xbc0 [ 601.786370][T11728] macvtap_newlink+0xf6/0x150 [ 601.791085][T11728] ? macvtap_setup+0x30/0x30 [ 601.795732][T11728] rtnl_newlink+0xee5/0x1670 [ 601.800351][T11728] ? cgroup_rstat_updated+0x8c/0x1c0 [ 601.805663][T11728] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 601.811976][T11728] ? _raw_spin_unlock+0x26/0x40 [ 601.816837][T11728] ? __mutex_lock+0x21c/0x8d0 [ 601.821619][T11728] ? rtnl_setlink+0x300/0x300 [ 601.826318][T11728] rtnetlink_rcv_msg+0x807/0x8c0 [ 601.831306][T11728] ? memcg_list_lru_alloc+0xd5/0x750 [ 601.836674][T11728] ? should_fail_ex+0x2d/0x230 [ 601.841448][T11728] ? slab_post_alloc_hook+0x8c/0x340 [ 601.846909][T11728] ? xas_load+0x3ae/0x3c0 [ 601.851263][T11728] ? skb_release_data+0x53d/0x550 [ 601.856357][T11728] ? kmem_cache_free+0x1db/0x3a0 [ 601.861323][T11728] ? __kfree_skb+0x104/0x140 [ 601.865932][T11728] ? nlmon_xmit+0x4b/0x60 [ 601.870299][T11728] ? __kfree_skb+0x104/0x140 [ 601.874929][T11728] ? consume_skb+0x57/0x180 [ 601.879472][T11728] ? nlmon_xmit+0x4b/0x60 [ 601.883816][T11728] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 601.889122][T11728] ? __dev_queue_xmit+0xad9/0x1e20 [ 601.894325][T11728] ? ref_tracker_free+0x3a1/0x400 [ 601.899454][T11728] netlink_rcv_skb+0x126/0x220 [ 601.904273][T11728] ? rtnetlink_bind+0x60/0x60 [ 601.908992][T11728] rtnetlink_rcv+0x1c/0x20 [ 601.913488][T11728] netlink_unicast+0x589/0x650 [ 601.918325][T11728] netlink_sendmsg+0x66e/0x770 [ 601.923175][T11728] ? netlink_getsockopt+0x3e0/0x3e0 [ 601.928490][T11728] ____sys_sendmsg+0x37c/0x4d0 [ 601.933279][T11728] __sys_sendmsg+0x1e9/0x270 [ 601.937983][T11728] __x64_sys_sendmsg+0x46/0x50 [ 601.942844][T11728] do_syscall_64+0x41/0xc0 [ 601.947287][T11728] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 601.953314][T11728] RIP: 0033:0x7f7514d76ae9 [ 601.957757][T11728] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 601.977380][T11728] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 601.985892][T11728] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 601.993921][T11728] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 602.001899][T11728] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 602.009903][T11728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x0, 0xb3550aa4ba878345}, 0x9c) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket$inet6(0xa, 0x1, 0x8010000000000084) (async) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) (async) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) (async) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x0, 0xb3550aa4ba878345}, 0x9c) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) 03:42:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xe, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 602.017891][T11728] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 602.025887][T11728] 03:42:25 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xf, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 31) 03:42:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x176, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 602.071562][T11737] macvtap59: entered allmulticast mode [ 602.080606][T11737] 8021q: adding VLAN 0 to HW filter on device macvtap59 [ 602.096703][T11741] ipvlan12: entered promiscuous mode [ 602.103475][T11741] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x11, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) (async) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x29}}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x2, 0x0, 0x0, 0xb3550aa4ba878345}, 0x9c) socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 602.138211][T11741] team0: Device ipvlan12 is already an upper device of the team interface [ 602.188520][T11748] ipvlan8: entered promiscuous mode 03:42:25 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r0]}, 0x7c) sendmmsg$inet(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="1bac95a2c8d1b8e95361c3db7da9ccfdfc678020b11947a4a0c4b46a7bb04d582944950cbda1c85c8af1de26a8fa31614e81b653621dc56e9a5b1d119bcf4a11c2b0b56543f7ca603a7e230147267252941187af1543861471ba913d998eb3d4ebe10380b29664b422efc731fb4366672315f09cd832b1f7a6e8315d1267f39297e1328c9b05cc256fa6a90a5dde43c2161c710fcdadc5a9ee3d5bce9de63790da7ba55b7ac38ec5598fbd6a427e3ae8c8d495edf64da23af1abbbdbf1394d2ff4559adb55ef9ef7dd1af78eab5efb51d4440c0f7e9847e17055c9a5da2f733b064026452179e4db96bb3a1a371472cd7d7713", 0xf3}], 0x1, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x80}}, {{&(0x7f0000000040)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000001400)=[{&(0x7f00000002c0)="f4c1bcc33e59255f7950dbf89a4bae83d896ae4ac4345c3b4c64d31890c8533e594008ff1c007e9d0c7d9f3fde81a50ab3e0438b8a4d40a12a512e64435b117e8132eee5090a654e22c16719764f6470071536eacf25b0104b4601f1839f6cbebee314f1f59a68b95a6773a5be4d7ac5850410a1f598f4a2da535cab015c9b559f55ffaec95d7f29a83539dae96baa75bdf799d5c38b6d710e9bcc1b62b4fdf3586b25b5f36b5b1e6b43b2e1322c099828782b8fd4de66d8466bcbf28664eda2b7948c57d202c2aee4d68c2cf918b5c4146e5b8df99e8f61", 0xd8}, {&(0x7f00000003c0)="a9ea862092e6e2b9bacf61d3b30febb696debb785404ccc8f255fcac7692d523fe68a3671e6849df80ee6de030281e3d3a3d7c48c006422ca694674c0db61a559b2b1e1da35cab903f6f5ad2fb3c7bcd5f1f84e300d3fb08d9b70554e060e7fa490bdc7e0c8bd3925dd32fed045595ccdfb29c8556138ef090ad6594562d4969624bd79ee6265b7753af3dbf0c2d5ce2d03c95611d7323270cbc55d4e7dc5caf991811e28b4c351953280909ae3417edea5fd5487c591f0896127d7f6ef1da317d41518ec0665ad0cc86ba3156a36cae340ff54bde26e5062a8119da02c876a19024f54326093746d8547ecda3331508b129173f6947130e50e6985b516b4f180a66e2e189590264a82f348f3a1cf11dcdf61a7b762cc137a958c73eedaa9e961592308fbc60134a6039376d014037af5372a4aaa845ad6a5865c9049c6b435552ad0af9bfd4b6a96ce746994526d696047f52357496555027dc3fdb7062d49a75b7bc439390409e614a11e6a441a631a47d67e02ca1b9abfb6ce92f9c3b472b1eba87757918cf512eead3c50ea6084104aefa5b777cd5a53b880c780c700174739990d3bb5d7c23430c3af3e1647b9b8e1abd1b956c90c1a4a068ab3400637c31467154caaf470411a077cca23058f4a8cda5c196d59c449ff136ca7d9ca45e32d37bb30ac23bd7fbc4ead235693c1c5fde9ebac92a19d93b714921a7f78fc10a0ec56cdebf46c1d8ad65c20487a529017610589f81f2d727339da59ed6e80c7f82f40ed3e151762b15b3e6aa305d7fc9419bc8b7348ba31f3e9f0fb46d0b2a36b86046613cd1053d5b2778e872f76f4e6b62ce0e2e2f44a20b76a7af70ba7f808aa0e41b56500f2088aff2eb5c196a79302f10485f5832f45df688797965a59a48e486497680399a694c1957ba7981699b02477cbb4476e59636e07c28fba46d23cc9db7220c1415965a07b5883e6094f77c90a7b66556db49601b53c85fc4a66a99caa669feed95d38e6c01c9cc422ececbc767589fd8b17635cefaeb9abb3f7f6c8ce8f14df0f4ddb143f8d97f759ac83599262de947935199d1ae9119d53471c02907fe436d01457af856bee47a21e05641c5fec7dcd3562dd4b3dfb9236a5205d1bef951bf5ee265f3490a841c1b74ced335b9e77cf845efb6af20d1eda4bf84c2d1ef7b64f89e0b4343c976bd544df7ca8d744b21ebd5b679e4378b02d5314ceb281092d773d79ab1c4a08d88769b051711dc8efa67e7c79d9d8af32efda9bfec715caab96c2bcaf8c9b129b8173ef28dccf6e1d99f636de9859a10cb2e7394c21c3264b15e2c2f7c0652be0023bf5840330c7234f15472cb6a8922b317513b1021e755c7a0ed30045cf9fa04410e4ac56b6015fa5a7e022aa848f5ebfcb64344df37aacec2843c4374022d9e6939dbe308bd9788780056beb3f94ef20e2a9cf0f6a3512d53ce447a362a2ca7f0f28c569697c0e70e6af0aff8b93b16c0923420f10d03d97d4b22d0040cd361f010149ba65b3df1b195ade290ee69b7f09727d8957090e241e2172520eb3c31cc42794decebc8b6d542bfb23bd28b80cb19b9d689d43523cf5197bb018a618d79e689eb6c1be8ba0b117d3987adad0d0a6aa9d9f86353ba0f1bce71cefa09bd6f99717621fcffc9f70c3b7e65d5dc5f70788553c99dfc1e35c6dc565c7c0a5f379042a3f04b7607bcd4d4deedc1d13f8bc4a47397841c92bca1465d2783f49be34761836f7a1a49249776aa7ec29f944c2695933bec9aaf63a7975ae521c95e87fffdbf0024ae9064f965b86b70a69ac235d7920615d2ac1fd3080b46f15ae3ea8abb43a75cf92d77b4e9974396efd31189bc33bf948555bb9dd6f279c5fb6ae48c5a9b7990e5b550b3191dbb9ec713e15d9cfc8df44b32cf62d8a5bc1063037f26314e067fb72333dbb4c6b639c171a28c6c814c3059cafc503a16711f4dac61225b7fd451b00979fc254a9abbadcce07eb847e5beda479d7004c6430ccac982d93dde93e0df4cffffd27e92a0e8ad7cf45b43659c60f868034f7e48dc9230ad684212c814bfe7f4eb40c08ee77fe090837b6ab48323eade5685997f7a4947da90dbb550257e847a833ee4e71bb1f245a233d2df19338675ef903f5ca77ab6d33eb3618a1cc63913d1901cf5f5edf8d21cc21af264d50cbd93756b0a2a71ca5a1a760a9f7849c301919f729569a47234259adc2bfc239a1aa8b946913e9a31e15c4f2893d58fdfd3bdc77f3a6eb1f82028d03ad2245ea83a8cf68e1fe93d314dbc40a4ba257cc43225218b9f0b03722e1b1627f257ad0bf27856eaf1e3e1b1632fe202190c186834ecff33cfac360d3f96434c8cd72a2e549ccc2a566d1c9edcf4195fa222af8bdc4a5395b5acc3ba61aab1d34e23c3212f1724f269ced2b4f0f641472f2e52363a28b68a51d35c5e49673ecce6fd388e388ba6424aef75f9c6196fe8869c3e2ffb5c900d462d8854b2846ad419a4df8da049f50cdef1d8208bb61854cfdfe32a92b06ef5143807eb2f58927dff863bfb00ef28ec99ff55248815bfb365696c91e09172622cdc6afc8fff8e0d8fbc0b066447eec6f58a0587b996a90a56454548319053370830d2e65877f08a142d84f3866b18ada004cd38f81ee7d15e80b5c2a19f4462ffc684ff67244f47ba8cd19c973b31677df9eeedfde95fbe84eb8425c0db0f9981e1b6f33b2062a2979e61d3050bdf78f9ca161a9a9931bddd728c7ae16eb988c81e81fefc79f1a753ee557feeb5f00fa518b043e192f8b7530647f6fce3dedb2b2a4074405c778e7889f84e86753e27aa9e7fbe81a5e6131d9707b18b5ed641fdf8bc55777f6154a660e4db9f0023d31910f70a2def63feb4f9f1df8c72c787adc69e5415e6fa7ef030d74b2ee22fb6d2a668b454716b5a92bf6e2fe740b0b6d419dfe5a8047f733689534be8662bf2dd7624458d6ab5df320d408689a32bd6e2a67c4a2aec69882489ccba38c1d0afdf83e7a6250cd87aa7da6698c417880da28dfca054ba38da36348d7255160a4f8d7091de1add2fefbf034fd32d36adc6d1226b231398c58abaa8859fcd7922a1d71b12984f8a48f677277e3591cc8a19e7aac336426bd404e13b1ac607d8fdd971064fcebb3c1eabccd0b288a40f408f1ba88bdf5ef7baeb0f0011396f52cecfbe0cdca4a4235f919a90f12c3b86a80dd4e0acbf54c4f173ea47c65b4d58882dae1a97984991de047756ecc025f396d880ddcb58b4dec2b221771a20f6b16431567f7a8f4b562e2aac43671173e56c818a2f05b21c923d5258ca4da6bb8d82faa64912a6ff17ed061075b84fa77873711f65cad6c9f73fce83129ae0cf7eb00ac7bac707014341396808b45e6ba6b7e4e7e66f16ffb78ad801e2d66787ed04220cf8b185b5136d9d43a2c56d04c879372bf76c20dda9ebbeabcb09b41a1cfda351d6aa25babca21bd000f1b73021b12ad1aa026a103f155c23fc1a05a0a97a2a1db5e2bb542a3c328596fdbc654b3bfd9ff606b7f20b83d8379e6c4ac3d577be89099688c8bdb63fd69325d2157eec4fb075ff17c407c6f730fc63f6381bffa1d8ebfb47588681cee577c2a8ca06e0514c2f1993123b3831f2ccd5db7516033cf03120acebad9615b8696e1604d48c8f5c96f4bbebc2e5a6b3a492ed86b20d17200aed865702a55bea5f7cd90591ce80f3629e8a25616c9367f4505850ca4c8d82166ff7c52df5f3c774f1275297055dd0660fdceefbc132693f54e2409a5c898b4f9bc3886a121c976f11bda737a4d93becde598a3587a42797eeaed42fba56ad503df98b93881ecbec51935746f2df4acd20d4112345c7a59cba297800d090aeb9512777e9babd378a94df1c29b71cb81a5537768c057267120953d3709bc96e31d4219521fa43dc87719981719c48e0f42caa208e4870e85c33f34b3720c46bc30e4fa20cfd3e1eae31f4c3c234e74c9b213eb22c8b630a003dc980c8df52579cfed4d030e60501a4547aebb6a51ee47c107fa4a698a516caa3dd69d3a44b9c383a98df4b537f37a4d1ce742fbfe1f8ccc9414b497590a2b0bbc9318dbf7d9a8afbe81b0365e4ea54b4764be6a2cd6a4e6f24d688df176be195e8d8b6c95bdc4bf55a331d256d75d051c8c7ad1ce7b89002b855c6bd6ae7e516cc4b2a324a224e92de71773b9719dfe7952747a0d9bc782607f1ca610c3166cc21120751ba9a12d52217535daed059fb26cf30e4b7771dd050df01c1bc9f0df11ccc214bc41569a00a4be32a48152d800d1b4ca8c7c1da51b2ca80dfa60fe63b8cb67e14ed1f8a19e767c3aa1870d9136315fc62f16f6d2e1e8fb769213a39b4d29e3ded529c2e577668ee5f10fa08bca315bcc57f485d53f0df54091ea46def185062752e277b04d93d5ae66f393c9cb85c562354c19c50ffa0a543847c9a9b09e973d197ccf31421c8cd185b07655886d011de0badb31e0e24543458b1c02f2a8c4e2293ff8afa5bd16c9e9881daf899bc644625f2d107e11d18c4d81208bed87ad4c43cf1a51759bafb21a7ca64be1c5e19ab26adc1d8b83fde0ba28b6a38376073d423f02c70eb34e7be2880228e1eb918652121a9efc31dd885c6ed243c3bc12cb9700713e058bbf11e582cb1ca995470fa87b0f3c32a3fd28752e003db543cd6a35517fed4dd45529fab92617992d3a95e5fbb405e2b0bad8b4fb52b028c63e58d10abc094a5084a74a1abcf18d1fc565aa56df266cd036d61c623035c8f14b08534b01d7ee812da97e6a516077089ecab55235426256785cbcecb6c30e8f07c1b8e18cfecf30b9ee36132ae8f5ecc1e5a1d33ee31c64e5330225b452fd94eb06436a7ab88ee3e0a5936fd053a1ae1326d070f0f099f016a11b46324b7626c60b0e35e2d69e62d7198fb7de3d6330739b6bc09bae762a3308bc458852eefa91e9745b0a9aaf3bba5c2f5f640e1831e03413f716050467413ff2a0a160a66d58273426d170323e04346fb973eec04e9dd13720009cb361e785c063e437e16c487bb1cd543d134a17b6aa132c798039cddb05fce3d05c6a8a75fd0125f828b9a2464f9719062767f685b5ba9b052d1bc489c042e7b1174a6c90614ae9dece4f2471a6f0f0dfcb1b02eb676f4a41177dcbc78460e02d04969f281a7cce0a2bdef9edacbe03d3c8de9129e3ca7dfcf45e5526e8afb46ee7bab75bf1e9ae7812e9cb970f74c8a659ab5ae642b2b17e94496142fac93fb9c68424829fea4ec1e8a7d5661958314e947fae8d94bf1ffdc14b890b5717faf2c0a8c70f5149618edc0a6d8d183b01ddcb02fbb8b9229b10bfe01882945f9cfb7ce48f0fd73b5266b6ed2409740c96cbb22b312ac800403afc7cb1ca7661374f9203ba41c5803561667d9ae190417186386313f20276afc5fdd306fad68deaefb1012ad1df60b6afef9777000a08b3e293aae66d0e0f2a07d3ca3ff4685a26053804e042f487fe5eb13fd76b8a4180ed4cc66c42233c679364055eccfcb62d2373c8438819679cff84d4e7f128f45e3df169c089e1408457376664efe950b3f69473a75615368a96c322a7263194b90ebf6c520166bedb3b87d84f75fdde9b25769071675882e87a7fdf51b48dfca12e3af43da2ece14ab5ca87729ab84eaa93a50ccc6b6a5b721e8cd90d31ecd416ba238a86fd227c32677bade01f50472e1e32a0360dee7d8588b5aae66bed1f181bef6d9a226fa79f0404ca04048a750d30bbd8cc5c70fa4bc651c287bff05937d5a2691d4a0993cda891ea0906b22beff7b06", 0x1000}, {&(0x7f00000013c0)="78ac98", 0x3}], 0x3}}], 0x2, 0x20000095) [ 602.243333][T11751] FAULT_INJECTION: forcing a failure. [ 602.243333][T11751] name failslab, interval 1, probability 0, space 0, times 0 [ 602.256149][T11751] CPU: 1 PID: 11751 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 602.266577][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 602.266595][T11751] Call Trace: [ 602.266603][T11751] [ 602.266611][T11751] dump_stack_lvl+0xda/0x130 [ 602.287602][T11751] dump_stack+0x15/0x20 [ 602.291787][T11751] should_fail_ex+0x21f/0x230 [ 602.296473][T11751] __should_failslab+0x92/0xa0 [ 602.301323][T11751] should_failslab+0x9/0x20 [ 602.305831][T11751] slab_pre_alloc_hook+0x38/0x180 [ 602.310931][T11751] kmem_cache_alloc+0x52/0x220 [ 602.315755][T11751] ? __kernfs_new_node+0x6a/0x380 [ 602.320813][T11751] __kernfs_new_node+0x6a/0x380 [ 602.325750][T11751] ? rb_insert_color+0x263/0x290 [ 602.330721][T11751] ? up_write+0x30/0xe0 [ 602.334893][T11751] ? kernfs_activate+0x252/0x270 [ 602.339862][T11751] kernfs_new_node+0x5f/0xd0 [ 602.344482][T11751] __kernfs_create_file+0x49/0x180 [ 602.349650][T11751] ? dev_attr_show+0x90/0x90 [ 602.354313][T11751] sysfs_add_file_mode_ns+0x136/0x1b0 [ 602.359748][T11751] internal_create_group+0x2e4/0x800 [ 602.365074][T11751] sysfs_create_groups+0x3c/0xe0 [ 602.370111][T11751] device_add_attrs+0x69/0x400 [ 602.375036][T11751] ? kobject_put+0xd8/0x160 [ 602.379559][T11751] device_add+0x431/0x8b0 [ 602.384047][T11751] netdev_register_kobject+0xfc/0x230 [ 602.389476][T11751] register_netdevice+0x680/0xb40 [ 602.394572][T11751] ? rtnl_is_locked+0x15/0x20 [ 602.399259][T11751] ? netdev_rx_handler_register+0x11a/0x140 [ 602.405173][T11751] macvlan_common_newlink+0xa1b/0xbc0 [ 602.410648][T11751] macvtap_newlink+0xf6/0x150 [ 602.415370][T11751] ? macvtap_setup+0x30/0x30 [ 602.420036][T11751] rtnl_newlink+0xee5/0x1670 [ 602.424656][T11751] ? cgroup_rstat_updated+0x8c/0x1c0 [ 602.429971][T11751] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 602.436276][T11751] ? _raw_spin_unlock+0x26/0x40 [ 602.441132][T11751] ? __mutex_lock+0x21c/0x8d0 [ 602.445824][T11751] ? rtnl_setlink+0x300/0x300 [ 602.450566][T11751] rtnetlink_rcv_msg+0x807/0x8c0 [ 602.455591][T11751] ? memcg_list_lru_alloc+0xd5/0x750 [ 602.460897][T11751] ? should_fail_ex+0x2d/0x230 [ 602.465700][T11751] ? slab_post_alloc_hook+0x8c/0x340 [ 602.471026][T11751] ? xas_load+0x3ae/0x3c0 [ 602.475372][T11751] ? skb_release_data+0x53d/0x550 [ 602.480418][T11751] ? kmem_cache_free+0x1db/0x3a0 [ 602.485479][T11751] ? __kfree_skb+0x104/0x140 [ 602.490146][T11751] ? nlmon_xmit+0x4b/0x60 [ 602.494485][T11751] ? __kfree_skb+0x104/0x140 [ 602.499088][T11751] ? consume_skb+0x57/0x180 [ 602.503658][T11751] ? nlmon_xmit+0x4b/0x60 [ 602.507998][T11751] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 602.513363][T11751] ? __dev_queue_xmit+0xad9/0x1e20 [ 602.518503][T11751] ? ref_tracker_free+0x3a1/0x400 [ 602.523627][T11751] netlink_rcv_skb+0x126/0x220 [ 602.528492][T11751] ? rtnetlink_bind+0x60/0x60 [ 602.533230][T11751] rtnetlink_rcv+0x1c/0x20 [ 602.537670][T11751] netlink_unicast+0x589/0x650 [ 602.542467][T11751] netlink_sendmsg+0x66e/0x770 [ 602.547259][T11751] ? netlink_getsockopt+0x3e0/0x3e0 [ 602.552546][T11751] ____sys_sendmsg+0x37c/0x4d0 [ 602.557429][T11751] __sys_sendmsg+0x1e9/0x270 [ 602.562078][T11751] __x64_sys_sendmsg+0x46/0x50 [ 602.566885][T11751] do_syscall_64+0x41/0xc0 [ 602.571367][T11751] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 602.577360][T11751] RIP: 0033:0x7f7514d76ae9 [ 602.581842][T11751] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 602.601521][T11751] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 602.609981][T11751] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 602.617967][T11751] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 602.626033][T11751] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 602.634017][T11751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r0]}, 0x7c) (async) sendmmsg$inet(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="1bac95a2c8d1b8e95361c3db7da9ccfdfc678020b11947a4a0c4b46a7bb04d582944950cbda1c85c8af1de26a8fa31614e81b653621dc56e9a5b1d119bcf4a11c2b0b56543f7ca603a7e230147267252941187af1543861471ba913d998eb3d4ebe10380b29664b422efc731fb4366672315f09cd832b1f7a6e8315d1267f39297e1328c9b05cc256fa6a90a5dde43c2161c710fcdadc5a9ee3d5bce9de63790da7ba55b7ac38ec5598fbd6a427e3ae8c8d495edf64da23af1abbbdbf1394d2ff4559adb55ef9ef7dd1af78eab5efb51d4440c0f7e9847e17055c9a5da2f733b064026452179e4db96bb3a1a371472cd7d7713", 0xf3}], 0x1, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x80}}, {{&(0x7f0000000040)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000001400)=[{&(0x7f00000002c0)="f4c1bcc33e59255f7950dbf89a4bae83d896ae4ac4345c3b4c64d31890c8533e594008ff1c007e9d0c7d9f3fde81a50ab3e0438b8a4d40a12a512e64435b117e8132eee5090a654e22c16719764f6470071536eacf25b0104b4601f1839f6cbebee314f1f59a68b95a6773a5be4d7ac5850410a1f598f4a2da535cab015c9b559f55ffaec95d7f29a83539dae96baa75bdf799d5c38b6d710e9bcc1b62b4fdf3586b25b5f36b5b1e6b43b2e1322c099828782b8fd4de66d8466bcbf28664eda2b7948c57d202c2aee4d68c2cf918b5c4146e5b8df99e8f61", 0xd8}, {&(0x7f00000003c0)="a9ea862092e6e2b9bacf61d3b30febb696debb785404ccc8f255fcac7692d523fe68a3671e6849df80ee6de030281e3d3a3d7c48c006422ca694674c0db61a559b2b1e1da35cab903f6f5ad2fb3c7bcd5f1f84e300d3fb08d9b70554e060e7fa490bdc7e0c8bd3925dd32fed045595ccdfb29c8556138ef090ad6594562d4969624bd79ee6265b7753af3dbf0c2d5ce2d03c95611d7323270cbc55d4e7dc5caf991811e28b4c351953280909ae3417edea5fd5487c591f0896127d7f6ef1da317d41518ec0665ad0cc86ba3156a36cae340ff54bde26e5062a8119da02c876a19024f54326093746d8547ecda3331508b129173f6947130e50e6985b516b4f180a66e2e189590264a82f348f3a1cf11dcdf61a7b762cc137a958c73eedaa9e961592308fbc60134a6039376d014037af5372a4aaa845ad6a5865c9049c6b435552ad0af9bfd4b6a96ce746994526d696047f52357496555027dc3fdb7062d49a75b7bc439390409e614a11e6a441a631a47d67e02ca1b9abfb6ce92f9c3b472b1eba87757918cf512eead3c50ea6084104aefa5b777cd5a53b880c780c700174739990d3bb5d7c23430c3af3e1647b9b8e1abd1b956c90c1a4a068ab3400637c31467154caaf470411a077cca23058f4a8cda5c196d59c449ff136ca7d9ca45e32d37bb30ac23bd7fbc4ead235693c1c5fde9ebac92a19d93b714921a7f78fc10a0ec56cdebf46c1d8ad65c20487a529017610589f81f2d727339da59ed6e80c7f82f40ed3e151762b15b3e6aa305d7fc9419bc8b7348ba31f3e9f0fb46d0b2a36b86046613cd1053d5b2778e872f76f4e6b62ce0e2e2f44a20b76a7af70ba7f808aa0e41b56500f2088aff2eb5c196a79302f10485f5832f45df688797965a59a48e486497680399a694c1957ba7981699b02477cbb4476e59636e07c28fba46d23cc9db7220c1415965a07b5883e6094f77c90a7b66556db49601b53c85fc4a66a99caa669feed95d38e6c01c9cc422ececbc767589fd8b17635cefaeb9abb3f7f6c8ce8f14df0f4ddb143f8d97f759ac83599262de947935199d1ae9119d53471c02907fe436d01457af856bee47a21e05641c5fec7dcd3562dd4b3dfb9236a5205d1bef951bf5ee265f3490a841c1b74ced335b9e77cf845efb6af20d1eda4bf84c2d1ef7b64f89e0b4343c976bd544df7ca8d744b21ebd5b679e4378b02d5314ceb281092d773d79ab1c4a08d88769b051711dc8efa67e7c79d9d8af32efda9bfec715caab96c2bcaf8c9b129b8173ef28dccf6e1d99f636de9859a10cb2e7394c21c3264b15e2c2f7c0652be0023bf5840330c7234f15472cb6a8922b317513b1021e755c7a0ed30045cf9fa04410e4ac56b6015fa5a7e022aa848f5ebfcb64344df37aacec2843c4374022d9e6939dbe308bd9788780056beb3f94ef20e2a9cf0f6a3512d53ce447a362a2ca7f0f28c569697c0e70e6af0aff8b93b16c0923420f10d03d97d4b22d0040cd361f010149ba65b3df1b195ade290ee69b7f09727d8957090e241e2172520eb3c31cc42794decebc8b6d542bfb23bd28b80cb19b9d689d43523cf5197bb018a618d79e689eb6c1be8ba0b117d3987adad0d0a6aa9d9f86353ba0f1bce71cefa09bd6f99717621fcffc9f70c3b7e65d5dc5f70788553c99dfc1e35c6dc565c7c0a5f379042a3f04b7607bcd4d4deedc1d13f8bc4a47397841c92bca1465d2783f49be34761836f7a1a49249776aa7ec29f944c2695933bec9aaf63a7975ae521c95e87fffdbf0024ae9064f965b86b70a69ac235d7920615d2ac1fd3080b46f15ae3ea8abb43a75cf92d77b4e9974396efd31189bc33bf948555bb9dd6f279c5fb6ae48c5a9b7990e5b550b3191dbb9ec713e15d9cfc8df44b32cf62d8a5bc1063037f26314e067fb72333dbb4c6b639c171a28c6c814c3059cafc503a16711f4dac61225b7fd451b00979fc254a9abbadcce07eb847e5beda479d7004c6430ccac982d93dde93e0df4cffffd27e92a0e8ad7cf45b43659c60f868034f7e48dc9230ad684212c814bfe7f4eb40c08ee77fe090837b6ab48323eade5685997f7a4947da90dbb550257e847a833ee4e71bb1f245a233d2df19338675ef903f5ca77ab6d33eb3618a1cc63913d1901cf5f5edf8d21cc21af264d50cbd93756b0a2a71ca5a1a760a9f7849c301919f729569a47234259adc2bfc239a1aa8b946913e9a31e15c4f2893d58fdfd3bdc77f3a6eb1f82028d03ad2245ea83a8cf68e1fe93d314dbc40a4ba257cc43225218b9f0b03722e1b1627f257ad0bf27856eaf1e3e1b1632fe202190c186834ecff33cfac360d3f96434c8cd72a2e549ccc2a566d1c9edcf4195fa222af8bdc4a5395b5acc3ba61aab1d34e23c3212f1724f269ced2b4f0f641472f2e52363a28b68a51d35c5e49673ecce6fd388e388ba6424aef75f9c6196fe8869c3e2ffb5c900d462d8854b2846ad419a4df8da049f50cdef1d8208bb61854cfdfe32a92b06ef5143807eb2f58927dff863bfb00ef28ec99ff55248815bfb365696c91e09172622cdc6afc8fff8e0d8fbc0b066447eec6f58a0587b996a90a56454548319053370830d2e65877f08a142d84f3866b18ada004cd38f81ee7d15e80b5c2a19f4462ffc684ff67244f47ba8cd19c973b31677df9eeedfde95fbe84eb8425c0db0f9981e1b6f33b2062a2979e61d3050bdf78f9ca161a9a9931bddd728c7ae16eb988c81e81fefc79f1a753ee557feeb5f00fa518b043e192f8b7530647f6fce3dedb2b2a4074405c778e7889f84e86753e27aa9e7fbe81a5e6131d9707b18b5ed641fdf8bc55777f6154a660e4db9f0023d31910f70a2def63feb4f9f1df8c72c787adc69e5415e6fa7ef030d74b2ee22fb6d2a668b454716b5a92bf6e2fe740b0b6d419dfe5a8047f733689534be8662bf2dd7624458d6ab5df320d408689a32bd6e2a67c4a2aec69882489ccba38c1d0afdf83e7a6250cd87aa7da6698c417880da28dfca054ba38da36348d7255160a4f8d7091de1add2fefbf034fd32d36adc6d1226b231398c58abaa8859fcd7922a1d71b12984f8a48f677277e3591cc8a19e7aac336426bd404e13b1ac607d8fdd971064fcebb3c1eabccd0b288a40f408f1ba88bdf5ef7baeb0f0011396f52cecfbe0cdca4a4235f919a90f12c3b86a80dd4e0acbf54c4f173ea47c65b4d58882dae1a97984991de047756ecc025f396d880ddcb58b4dec2b221771a20f6b16431567f7a8f4b562e2aac43671173e56c818a2f05b21c923d5258ca4da6bb8d82faa64912a6ff17ed061075b84fa77873711f65cad6c9f73fce83129ae0cf7eb00ac7bac707014341396808b45e6ba6b7e4e7e66f16ffb78ad801e2d66787ed04220cf8b185b5136d9d43a2c56d04c879372bf76c20dda9ebbeabcb09b41a1cfda351d6aa25babca21bd000f1b73021b12ad1aa026a103f155c23fc1a05a0a97a2a1db5e2bb542a3c328596fdbc654b3bfd9ff606b7f20b83d8379e6c4ac3d577be89099688c8bdb63fd69325d2157eec4fb075ff17c407c6f730fc63f6381bffa1d8ebfb47588681cee577c2a8ca06e0514c2f1993123b3831f2ccd5db7516033cf03120acebad9615b8696e1604d48c8f5c96f4bbebc2e5a6b3a492ed86b20d17200aed865702a55bea5f7cd90591ce80f3629e8a25616c9367f4505850ca4c8d82166ff7c52df5f3c774f1275297055dd0660fdceefbc132693f54e2409a5c898b4f9bc3886a121c976f11bda737a4d93becde598a3587a42797eeaed42fba56ad503df98b93881ecbec51935746f2df4acd20d4112345c7a59cba297800d090aeb9512777e9babd378a94df1c29b71cb81a5537768c057267120953d3709bc96e31d4219521fa43dc87719981719c48e0f42caa208e4870e85c33f34b3720c46bc30e4fa20cfd3e1eae31f4c3c234e74c9b213eb22c8b630a003dc980c8df52579cfed4d030e60501a4547aebb6a51ee47c107fa4a698a516caa3dd69d3a44b9c383a98df4b537f37a4d1ce742fbfe1f8ccc9414b497590a2b0bbc9318dbf7d9a8afbe81b0365e4ea54b4764be6a2cd6a4e6f24d688df176be195e8d8b6c95bdc4bf55a331d256d75d051c8c7ad1ce7b89002b855c6bd6ae7e516cc4b2a324a224e92de71773b9719dfe7952747a0d9bc782607f1ca610c3166cc21120751ba9a12d52217535daed059fb26cf30e4b7771dd050df01c1bc9f0df11ccc214bc41569a00a4be32a48152d800d1b4ca8c7c1da51b2ca80dfa60fe63b8cb67e14ed1f8a19e767c3aa1870d9136315fc62f16f6d2e1e8fb769213a39b4d29e3ded529c2e577668ee5f10fa08bca315bcc57f485d53f0df54091ea46def185062752e277b04d93d5ae66f393c9cb85c562354c19c50ffa0a543847c9a9b09e973d197ccf31421c8cd185b07655886d011de0badb31e0e24543458b1c02f2a8c4e2293ff8afa5bd16c9e9881daf899bc644625f2d107e11d18c4d81208bed87ad4c43cf1a51759bafb21a7ca64be1c5e19ab26adc1d8b83fde0ba28b6a38376073d423f02c70eb34e7be2880228e1eb918652121a9efc31dd885c6ed243c3bc12cb9700713e058bbf11e582cb1ca995470fa87b0f3c32a3fd28752e003db543cd6a35517fed4dd45529fab92617992d3a95e5fbb405e2b0bad8b4fb52b028c63e58d10abc094a5084a74a1abcf18d1fc565aa56df266cd036d61c623035c8f14b08534b01d7ee812da97e6a516077089ecab55235426256785cbcecb6c30e8f07c1b8e18cfecf30b9ee36132ae8f5ecc1e5a1d33ee31c64e5330225b452fd94eb06436a7ab88ee3e0a5936fd053a1ae1326d070f0f099f016a11b46324b7626c60b0e35e2d69e62d7198fb7de3d6330739b6bc09bae762a3308bc458852eefa91e9745b0a9aaf3bba5c2f5f640e1831e03413f716050467413ff2a0a160a66d58273426d170323e04346fb973eec04e9dd13720009cb361e785c063e437e16c487bb1cd543d134a17b6aa132c798039cddb05fce3d05c6a8a75fd0125f828b9a2464f9719062767f685b5ba9b052d1bc489c042e7b1174a6c90614ae9dece4f2471a6f0f0dfcb1b02eb676f4a41177dcbc78460e02d04969f281a7cce0a2bdef9edacbe03d3c8de9129e3ca7dfcf45e5526e8afb46ee7bab75bf1e9ae7812e9cb970f74c8a659ab5ae642b2b17e94496142fac93fb9c68424829fea4ec1e8a7d5661958314e947fae8d94bf1ffdc14b890b5717faf2c0a8c70f5149618edc0a6d8d183b01ddcb02fbb8b9229b10bfe01882945f9cfb7ce48f0fd73b5266b6ed2409740c96cbb22b312ac800403afc7cb1ca7661374f9203ba41c5803561667d9ae190417186386313f20276afc5fdd306fad68deaefb1012ad1df60b6afef9777000a08b3e293aae66d0e0f2a07d3ca3ff4685a26053804e042f487fe5eb13fd76b8a4180ed4cc66c42233c679364055eccfcb62d2373c8438819679cff84d4e7f128f45e3df169c089e1408457376664efe950b3f69473a75615368a96c322a7263194b90ebf6c520166bedb3b87d84f75fdde9b25769071675882e87a7fdf51b48dfca12e3af43da2ece14ab5ca87729ab84eaa93a50ccc6b6a5b721e8cd90d31ecd416ba238a86fd227c32677bade01f50472e1e32a0360dee7d8588b5aae66bed1f181bef6d9a226fa79f0404ca04048a750d30bbd8cc5c70fa4bc651c287bff05937d5a2691d4a0993cda891ea0906b22beff7b06", 0x1000}, {&(0x7f00000013c0)="78ac98", 0x3}], 0x3}}], 0x2, 0x20000095) 03:42:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x12, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 32) 03:42:25 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 602.642046][T11751] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 602.650102][T11751] [ 602.670562][T11757] macvtap60: entered allmulticast mode [ 602.679983][T11757] 8021q: adding VLAN 0 to HW filter on device macvtap60 03:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x1], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r0]}, 0x7c) sendmmsg$inet(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="1bac95a2c8d1b8e95361c3db7da9ccfdfc678020b11947a4a0c4b46a7bb04d582944950cbda1c85c8af1de26a8fa31614e81b653621dc56e9a5b1d119bcf4a11c2b0b56543f7ca603a7e230147267252941187af1543861471ba913d998eb3d4ebe10380b29664b422efc731fb4366672315f09cd832b1f7a6e8315d1267f39297e1328c9b05cc256fa6a90a5dde43c2161c710fcdadc5a9ee3d5bce9de63790da7ba55b7ac38ec5598fbd6a427e3ae8c8d495edf64da23af1abbbdbf1394d2ff4559adb55ef9ef7dd1af78eab5efb51d4440c0f7e9847e17055c9a5da2f733b064026452179e4db96bb3a1a371472cd7d7713", 0xf3}], 0x1, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x80}}, {{&(0x7f0000000040)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000001400)=[{&(0x7f00000002c0)="f4c1bcc33e59255f7950dbf89a4bae83d896ae4ac4345c3b4c64d31890c8533e594008ff1c007e9d0c7d9f3fde81a50ab3e0438b8a4d40a12a512e64435b117e8132eee5090a654e22c16719764f6470071536eacf25b0104b4601f1839f6cbebee314f1f59a68b95a6773a5be4d7ac5850410a1f598f4a2da535cab015c9b559f55ffaec95d7f29a83539dae96baa75bdf799d5c38b6d710e9bcc1b62b4fdf3586b25b5f36b5b1e6b43b2e1322c099828782b8fd4de66d8466bcbf28664eda2b7948c57d202c2aee4d68c2cf918b5c4146e5b8df99e8f61", 0xd8}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="78ac98", 0x3}], 0x3}}], 0x2, 0x20000095) 03:42:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x179, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 602.714016][T11762] ipvlan12: entered promiscuous mode [ 602.728132][T11762] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 602.737454][T11762] team0: Device ipvlan12 is already an upper device of the team interface 03:42:25 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:25 executing program 4: bind$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x4}}, 0x18) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/606]}, 0x2d6) [ 602.777924][T11770] FAULT_INJECTION: forcing a failure. [ 602.777924][T11770] name failslab, interval 1, probability 0, space 0, times 0 [ 602.790773][T11770] CPU: 1 PID: 11770 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 602.801217][T11770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 602.811335][T11770] Call Trace: [ 602.814655][T11770] [ 602.817626][T11770] dump_stack_lvl+0xda/0x130 [ 602.822367][T11770] dump_stack+0x15/0x20 [ 602.826664][T11770] should_fail_ex+0x21f/0x230 [ 602.831369][T11770] __should_failslab+0x92/0xa0 [ 602.836149][T11770] should_failslab+0x9/0x20 [ 602.840656][T11770] slab_pre_alloc_hook+0x38/0x180 [ 602.845695][T11770] kmem_cache_alloc+0x52/0x220 [ 602.850483][T11770] ? __kernfs_new_node+0x6a/0x380 [ 602.855583][T11770] __kernfs_new_node+0x6a/0x380 [ 602.860495][T11770] ? rb_insert_color+0x263/0x290 [ 602.865476][T11770] ? up_write+0x30/0xe0 [ 602.869678][T11770] ? kernfs_activate+0x252/0x270 [ 602.874642][T11770] kernfs_new_node+0x5f/0xd0 [ 602.879361][T11770] __kernfs_create_file+0x49/0x180 [ 602.884653][T11770] ? dev_attr_show+0x90/0x90 [ 602.889247][T11770] sysfs_add_file_mode_ns+0x136/0x1b0 [ 602.894666][T11770] internal_create_group+0x2e4/0x800 [ 602.900048][T11770] sysfs_create_groups+0x3c/0xe0 [ 602.905061][T11770] device_add_attrs+0x69/0x400 [ 602.909850][T11770] ? kobject_put+0xd8/0x160 [ 602.914504][T11770] device_add+0x431/0x8b0 [ 602.918880][T11770] netdev_register_kobject+0xfc/0x230 [ 602.924295][T11770] register_netdevice+0x680/0xb40 [ 602.929433][T11770] ? rtnl_is_locked+0x15/0x20 [ 602.934146][T11770] ? netdev_rx_handler_register+0x11a/0x140 [ 602.940087][T11770] macvlan_common_newlink+0xa1b/0xbc0 [ 602.945568][T11770] macvtap_newlink+0xf6/0x150 [ 602.950272][T11770] ? macvtap_setup+0x30/0x30 [ 602.954905][T11770] rtnl_newlink+0xee5/0x1670 [ 602.959547][T11770] ? cgroup_rstat_updated+0x8c/0x1c0 [ 602.965038][T11770] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 602.971449][T11770] ? _raw_spin_unlock+0x26/0x40 [ 602.976350][T11770] ? __mutex_lock+0x21c/0x8d0 [ 602.981061][T11770] ? rtnl_setlink+0x300/0x300 [ 602.985764][T11770] rtnetlink_rcv_msg+0x807/0x8c0 [ 602.990732][T11770] ? memcg_list_lru_alloc+0xd5/0x750 [ 602.996058][T11770] ? should_fail_ex+0x2d/0x230 [ 603.000912][T11770] ? slab_post_alloc_hook+0x8c/0x340 [ 603.006295][T11770] ? xas_load+0x3ae/0x3c0 [ 603.010693][T11770] ? skb_release_data+0x53d/0x550 [ 603.015748][T11770] ? kmem_cache_free+0x1db/0x3a0 [ 603.020766][T11770] ? __kfree_skb+0x104/0x140 [ 603.025429][T11770] ? nlmon_xmit+0x4b/0x60 [ 603.029857][T11770] ? __kfree_skb+0x104/0x140 [ 603.034464][T11770] ? consume_skb+0x57/0x180 [ 603.039017][T11770] ? nlmon_xmit+0x4b/0x60 [ 603.043389][T11770] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 603.048708][T11770] ? __dev_queue_xmit+0xad9/0x1e20 [ 603.053877][T11770] ? ref_tracker_free+0x3a1/0x400 [ 603.059011][T11770] netlink_rcv_skb+0x126/0x220 [ 603.063798][T11770] ? rtnetlink_bind+0x60/0x60 [ 603.068509][T11770] rtnetlink_rcv+0x1c/0x20 [ 603.072978][T11770] netlink_unicast+0x589/0x650 [ 603.077775][T11770] netlink_sendmsg+0x66e/0x770 [ 603.082556][T11770] ? netlink_getsockopt+0x3e0/0x3e0 [ 603.087903][T11770] ____sys_sendmsg+0x37c/0x4d0 [ 603.092741][T11770] __sys_sendmsg+0x1e9/0x270 [ 603.097391][T11770] __x64_sys_sendmsg+0x46/0x50 [ 603.102232][T11770] do_syscall_64+0x41/0xc0 [ 603.106721][T11770] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 603.112680][T11770] RIP: 0033:0x7f7514d76ae9 [ 603.117119][T11770] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 603.136744][T11770] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 603.145212][T11770] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 603.153228][T11770] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 603.161202][T11770] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 603.169188][T11770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:26 executing program 4: bind$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x4}}, 0x18) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000af95d00a03baffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000092955c0491c0cc3500000000000000000000000000000000000000000000000000636c7573746572000664c2de000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/606]}, 0x2d6) 03:42:26 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 33) [ 603.177212][T11770] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 603.185197][T11770] [ 603.194935][T11772] ipvlan8: entered promiscuous mode 03:42:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x21, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:26 executing program 4: bind$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={0x1d, 0x0, 0x3, {0x1, 0xf0, 0x4}}, 0x18) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/606]}, 0x2d6) 03:42:26 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 603.237403][T11775] macvtap61: entered allmulticast mode [ 603.263893][T11775] 8021q: adding VLAN 0 to HW filter on device macvtap61 [ 603.277478][T11791] FAULT_INJECTION: forcing a failure. 03:42:26 executing program 4: setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0xea60}}, 0x0) setitimer(0x0, &(0x7f0000000980)={{}, {0x0, 0x2710}}, &(0x7f00000009c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000380)={@rand_addr, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getnexthop={0x28, 0x6a, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NHA_OIF={0x8, 0x5, r1}, @NHA_MASTER={0x8, 0xa, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400005c}, 0x44010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @private=0xa010100}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="eddede50", 0x4}], 0x1, &(0x7f00000005c0)=[{0x68, 0x10c, 0x7, "e300fb3f3f1aed96946ac9412223e84018540739258d4d02cdfda73bc2b0f8553fd88a40232cd09944e7ffcb2b6d7199c4bd6b06f1b9923f8319a9abff26ad6ec4d27b20c6c1d90bd32ce2f3e64183b04ef0ba90a6bf"}, {0xe8, 0x101, 0x1ff, "b476423ff2e74e87bf75f68ae7cc5c0bc7daf74e62f2cbab2eeb57f82f566aaeac5c2ae37831ec7685fd23c5b30ba0292885b51245544ff6fe30ebbf318cceadc1497beefc01a63b4a4de97b8afd7809d25243c2ed4e6f6b12d283bd5794797a29dda7bc7453ee2cd4004c17213336dd96cd4adf1d8720d38b70f6c1faf029e91bd20c790802b69da045a394d2058068d2c85844858d4f95ed8f54adb199eda566bddac4be8a87ec1973e65c6c2e21447740cf3ae2fe9f3a78fd49fbdbd71accb2190cbab84be1adcbf2e5496ef42df04c"}, {0x30, 0x111, 0x7fffffff, "076acfc126811a3459b716ae05b091e779a38adb55b9718778724218"}, {0x40, 0x11, 0xfffffff9, "7a009f0fa078c1fcdef15d67816be08e8644dcdb49e5ac1aed52cfb9904e42c46e6150e5bf5ed2a5a6"}, {0x40, 0x1, 0x5, "2d055d79bc9e1b97a928e923d6812367a1c28c19ecfd342d999459c43991fed672f68368ef21f00d3118"}, {0x90, 0x113, 0x2972, "af2c5278d7b3e7670a6c6fb0f7d8648264074e6438714194cf0154c8e068ad388124bd2ecdd69cfc307b5e43db45cd331647778d2ab4eb0ca5bd845514869186f1c304919e48c89f88bd2ade5c8fd11856a24d628fa55778868e83416482b0bc00ea0e2556c0e4ea4bccc2783d38fccff8413ddb883fa9ecca85875b8401"}, {0xc8, 0x108, 0xc, "182e1be7cb799ec91a6fa6071ce23b833aec402ff29544f14188dc2c47fe474a6228b9521ecae7a8a498b027cb2cdca675521db4b2103ac08207d404f27afa90be857f136b6a60f884b38b492af40d21eb9ffc6ced0b523acea9b51339e1450672c946c86a06e10fd698b621e08595e7ed0e50bc7dfcd50b0fa285543a7669da78cb89c1be8c2a0c5636f0099f5ded078f346403798eaaeabc61aa8dc13892ffed13fa6d375bfacb9fac2ace7dd7467e65d9ced9bdd605"}], 0x358}, 0x40) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r4, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c0005"], 0x3}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000f00)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000c00)=@newqdisc={0x290, 0x24, 0x10, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xfff1, 0xffff}, {0xfff1, 0x4}, {0xa, 0x2}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x178, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x3f, 0xfff, 0x0, 0x1, 0x6, 0x1f, 0x2}}, {0x8, 0x2, [0x1, 0x80]}}, {{0x1c, 0x1, {0x7, 0x40, 0x9, 0x9, 0x1, 0x1, 0x80, 0x6}}, {0x10, 0x2, [0x0, 0x5, 0x6, 0x5916, 0x3, 0x8000]}}, {{0x1c, 0x1, {0x1, 0x29, 0x81, 0x2, 0x0, 0x7f, 0x400, 0x3}}, {0xa, 0x2, [0x81, 0x6, 0x5]}}, {{0x1c, 0x1, {0x47, 0x2, 0x0, 0x3ff, 0x0, 0x78, 0x1dc, 0x5}}, {0xe, 0x2, [0x263, 0x7, 0x4517, 0x401, 0x81]}}, {{0x1c, 0x1, {0x4, 0xd3, 0x6, 0x8, 0x1, 0x5, 0x5, 0x3}}, {0xa, 0x2, [0x2, 0x1f, 0x4]}}, {{0x1c, 0x1, {0x4, 0x4, 0x8, 0x9, 0x2, 0x8, 0x20, 0x5}}, {0xe, 0x2, [0x81, 0x769, 0x0, 0x0, 0x8f]}}, {{0x1c, 0x1, {0x7f, 0x3f, 0x400, 0x8, 0x5, 0xfffffeff, 0xd3, 0x8}}, {0x14, 0x2, [0x8, 0x1, 0xfffd, 0x2, 0x7, 0x9, 0xb6, 0x3]}}, {{0x1c, 0x1, {0xd6, 0x7, 0x1000, 0x373d, 0x2, 0xd87, 0x30000, 0x2}}, {0x8, 0x2, [0x77f8, 0x1]}}, {{0x1c, 0x1, {0xf7, 0xc5, 0x2, 0x9, 0x1, 0x81, 0x1000, 0x4}}, {0xc, 0x2, [0x3, 0xfff, 0xee52, 0x8]}}]}, @TCA_STAB={0x90, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xff, 0x0, 0x0, 0x200, 0x2, 0x0, 0xffff15c3}}, {0x4}}, {{0x1c, 0x1, {0x1, 0x81, 0x7ff, 0xffffffd3, 0x0, 0x200, 0xfffffffb, 0x2}}, {0x8, 0x2, [0x9000, 0x8]}}, {{0x1c, 0x1, {0xfd, 0x40, 0x3, 0x8001, 0x1, 0x0, 0xb5, 0x3}}, {0xa, 0x2, [0xffff, 0xa7, 0x2]}}, {{0x1c, 0x1, {0x3, 0x5, 0xfff8, 0x1000, 0x0, 0x0, 0x1}}, {0x4}}]}, @TCA_RATE={0x6, 0x5, {0x4c, 0x2}}, @qdisc_kind_options=@q_cake={{0x9}, {0x48, 0x2, [@TCA_CAKE_INGRESS={0x8}, @TCA_CAKE_MPU={0x8, 0xe, 0xee}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_NAT={0x8, 0xb, 0x1}, @TCA_CAKE_ACK_FILTER={0x8, 0x10, 0x2}, @TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_SPLIT_GSO={0x8}]}}]}, 0x290}, 0x1, 0x0, 0x0, 0x1}, 0x20008080) socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000b00)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @private=0xa010100}, {0x2, 0x4e21, @private=0xa010100}, 0x140, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffff, 0x4, 0x100}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) ppoll(&(0x7f0000000a40)=[{r5, 0x4080}], 0x1, &(0x7f0000000a80)={0x0, 0x3938700}, &(0x7f0000000ac0)={[0xbc6]}, 0x8) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000b80)={0xc, @broadcast, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x2, 0x4a}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) [ 603.277478][T11791] name failslab, interval 1, probability 0, space 0, times 0 [ 603.290288][T11791] CPU: 1 PID: 11791 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 603.300736][T11791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 603.310816][T11791] Call Trace: [ 603.314128][T11791] [ 603.317110][T11791] dump_stack_lvl+0xda/0x130 [ 603.321752][T11791] dump_stack+0x15/0x20 [ 603.325957][T11791] should_fail_ex+0x21f/0x230 [ 603.330641][T11791] __should_failslab+0x92/0xa0 [ 603.335508][T11791] should_failslab+0x9/0x20 [ 603.340030][T11791] slab_pre_alloc_hook+0x38/0x180 [ 603.345067][T11791] kmem_cache_alloc+0x52/0x220 [ 603.349875][T11791] ? __kernfs_new_node+0x6a/0x380 [ 603.355025][T11791] __kernfs_new_node+0x6a/0x380 [ 603.359888][T11791] ? rb_insert_color+0x280/0x290 [ 603.364836][T11791] ? up_write+0x30/0xe0 [ 603.369023][T11791] ? kernfs_activate+0x252/0x270 [ 603.374025][T11791] kernfs_new_node+0x5f/0xd0 [ 603.378652][T11791] __kernfs_create_file+0x49/0x180 [ 603.383839][T11791] ? dev_attr_show+0x90/0x90 [ 603.388443][T11791] sysfs_add_file_mode_ns+0x136/0x1b0 [ 603.393885][T11791] internal_create_group+0x2e4/0x800 [ 603.399196][T11791] sysfs_create_groups+0x3c/0xe0 [ 603.404161][T11791] device_add_attrs+0x69/0x400 [ 603.409022][T11791] ? kobject_put+0xd8/0x160 [ 603.413583][T11791] device_add+0x431/0x8b0 [ 603.417978][T11791] netdev_register_kobject+0xfc/0x230 [ 603.423498][T11791] register_netdevice+0x680/0xb40 [ 603.428622][T11791] ? rtnl_is_locked+0x15/0x20 [ 603.433330][T11791] ? netdev_rx_handler_register+0x11a/0x140 [ 603.439320][T11791] macvlan_common_newlink+0xa1b/0xbc0 [ 603.444713][T11791] macvtap_newlink+0xf6/0x150 [ 603.449415][T11791] ? macvtap_setup+0x30/0x30 [ 603.454012][T11791] rtnl_newlink+0xee5/0x1670 [ 603.458700][T11791] ? cgroup_rstat_updated+0x8c/0x1c0 [ 603.464012][T11791] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 603.470287][T11791] ? _raw_spin_unlock+0x26/0x40 [ 603.475225][T11791] ? __mutex_lock+0x21c/0x8d0 [ 603.479921][T11791] ? rtnl_setlink+0x300/0x300 [ 603.484677][T11791] rtnetlink_rcv_msg+0x807/0x8c0 [ 603.489658][T11791] ? memcg_list_lru_alloc+0xd5/0x750 [ 603.495005][T11791] ? should_fail_ex+0x2d/0x230 [ 603.499865][T11791] ? slab_post_alloc_hook+0x8c/0x340 [ 603.505282][T11791] ? xas_load+0x3ae/0x3c0 [ 603.509612][T11791] ? skb_release_data+0x53d/0x550 [ 603.514682][T11791] ? kmem_cache_free+0x1db/0x3a0 [ 603.519627][T11791] ? __kfree_skb+0x104/0x140 [ 603.524252][T11791] ? nlmon_xmit+0x4b/0x60 [ 603.528623][T11791] ? __kfree_skb+0x104/0x140 [ 603.533293][T11791] ? consume_skb+0x57/0x180 [ 603.537903][T11791] ? nlmon_xmit+0x4b/0x60 [ 603.542261][T11791] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 603.547657][T11791] ? __dev_queue_xmit+0xad9/0x1e20 [ 603.552794][T11791] ? ref_tracker_free+0x3a1/0x400 [ 603.557841][T11791] netlink_rcv_skb+0x126/0x220 [ 603.562629][T11791] ? rtnetlink_bind+0x60/0x60 [ 603.567378][T11791] rtnetlink_rcv+0x1c/0x20 [ 603.571819][T11791] netlink_unicast+0x589/0x650 [ 603.576604][T11791] netlink_sendmsg+0x66e/0x770 [ 603.581437][T11791] ? netlink_getsockopt+0x3e0/0x3e0 [ 603.586652][T11791] ____sys_sendmsg+0x37c/0x4d0 [ 603.591445][T11791] __sys_sendmsg+0x1e9/0x270 [ 603.596068][T11791] __x64_sys_sendmsg+0x46/0x50 [ 603.600884][T11791] do_syscall_64+0x41/0xc0 [ 603.605325][T11791] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 603.611260][T11791] RIP: 0033:0x7f7514d76ae9 [ 603.615689][T11791] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 603.635337][T11791] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 603.643778][T11791] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 603.651751][T11791] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 603.659730][T11791] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 603.667728][T11791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 603.675765][T11791] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 603.683749][T11791] 03:42:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1b3, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 34) 03:42:26 executing program 4: setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0xea60}}, 0x0) setitimer(0x0, &(0x7f0000000980)={{}, {0x0, 0x2710}}, &(0x7f00000009c0)) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000380)={@rand_addr, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getnexthop={0x28, 0x6a, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NHA_OIF={0x8, 0x5, r1}, @NHA_MASTER={0x8, 0xa, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400005c}, 0x44010) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @private=0xa010100}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="eddede50", 0x4}], 0x1, &(0x7f00000005c0)=[{0x68, 0x10c, 0x7, "e300fb3f3f1aed96946ac9412223e84018540739258d4d02cdfda73bc2b0f8553fd88a40232cd09944e7ffcb2b6d7199c4bd6b06f1b9923f8319a9abff26ad6ec4d27b20c6c1d90bd32ce2f3e64183b04ef0ba90a6bf"}, {0xe8, 0x101, 0x1ff, "b476423ff2e74e87bf75f68ae7cc5c0bc7daf74e62f2cbab2eeb57f82f566aaeac5c2ae37831ec7685fd23c5b30ba0292885b51245544ff6fe30ebbf318cceadc1497beefc01a63b4a4de97b8afd7809d25243c2ed4e6f6b12d283bd5794797a29dda7bc7453ee2cd4004c17213336dd96cd4adf1d8720d38b70f6c1faf029e91bd20c790802b69da045a394d2058068d2c85844858d4f95ed8f54adb199eda566bddac4be8a87ec1973e65c6c2e21447740cf3ae2fe9f3a78fd49fbdbd71accb2190cbab84be1adcbf2e5496ef42df04c"}, {0x30, 0x111, 0x7fffffff, "076acfc126811a3459b716ae05b091e779a38adb55b9718778724218"}, {0x40, 0x11, 0xfffffff9, "7a009f0fa078c1fcdef15d67816be08e8644dcdb49e5ac1aed52cfb9904e42c46e6150e5bf5ed2a5a6"}, {0x40, 0x1, 0x5, "2d055d79bc9e1b97a928e923d6812367a1c28c19ecfd342d999459c43991fed672f68368ef21f00d3118"}, {0x90, 0x113, 0x2972, "af2c5278d7b3e7670a6c6fb0f7d8648264074e6438714194cf0154c8e068ad388124bd2ecdd69cfc307b5e43db45cd331647778d2ab4eb0ca5bd845514869186f1c304919e48c89f88bd2ade5c8fd11856a24d628fa55778868e83416482b0bc00ea0e2556c0e4ea4bccc2783d38fccff8413ddb883fa9ecca85875b8401"}, {0xc8, 0x108, 0xc, "182e1be7cb799ec91a6fa6071ce23b833aec402ff29544f14188dc2c47fe474a6228b9521ecae7a8a498b027cb2cdca675521db4b2103ac08207d404f27afa90be857f136b6a60f884b38b492af40d21eb9ffc6ced0b523acea9b51339e1450672c946c86a06e10fd698b621e08595e7ed0e50bc7dfcd50b0fa285543a7669da78cb89c1be8c2a0c5636f0099f5ded078f346403798eaaeabc61aa8dc13892ffed13fa6d375bfacb9fac2ace7dd7467e65d9ced9bdd605"}], 0x358}, 0x40) (async) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) (async, rerun: 32) close(r3) (rerun: 32) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r4, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c0005"], 0x3}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000f00)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000c00)=@newqdisc={0x290, 0x24, 0x10, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xfff1, 0xffff}, {0xfff1, 0x4}, {0xa, 0x2}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x178, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x3f, 0xfff, 0x0, 0x1, 0x6, 0x1f, 0x2}}, {0x8, 0x2, [0x1, 0x80]}}, {{0x1c, 0x1, {0x7, 0x40, 0x9, 0x9, 0x1, 0x1, 0x80, 0x6}}, {0x10, 0x2, [0x0, 0x5, 0x6, 0x5916, 0x3, 0x8000]}}, {{0x1c, 0x1, {0x1, 0x29, 0x81, 0x2, 0x0, 0x7f, 0x400, 0x3}}, {0xa, 0x2, [0x81, 0x6, 0x5]}}, {{0x1c, 0x1, {0x47, 0x2, 0x0, 0x3ff, 0x0, 0x78, 0x1dc, 0x5}}, {0xe, 0x2, [0x263, 0x7, 0x4517, 0x401, 0x81]}}, {{0x1c, 0x1, {0x4, 0xd3, 0x6, 0x8, 0x1, 0x5, 0x5, 0x3}}, {0xa, 0x2, [0x2, 0x1f, 0x4]}}, {{0x1c, 0x1, {0x4, 0x4, 0x8, 0x9, 0x2, 0x8, 0x20, 0x5}}, {0xe, 0x2, [0x81, 0x769, 0x0, 0x0, 0x8f]}}, {{0x1c, 0x1, {0x7f, 0x3f, 0x400, 0x8, 0x5, 0xfffffeff, 0xd3, 0x8}}, {0x14, 0x2, [0x8, 0x1, 0xfffd, 0x2, 0x7, 0x9, 0xb6, 0x3]}}, {{0x1c, 0x1, {0xd6, 0x7, 0x1000, 0x373d, 0x2, 0xd87, 0x30000, 0x2}}, {0x8, 0x2, [0x77f8, 0x1]}}, {{0x1c, 0x1, {0xf7, 0xc5, 0x2, 0x9, 0x1, 0x81, 0x1000, 0x4}}, {0xc, 0x2, [0x3, 0xfff, 0xee52, 0x8]}}]}, @TCA_STAB={0x90, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xff, 0x0, 0x0, 0x200, 0x2, 0x0, 0xffff15c3}}, {0x4}}, {{0x1c, 0x1, {0x1, 0x81, 0x7ff, 0xffffffd3, 0x0, 0x200, 0xfffffffb, 0x2}}, {0x8, 0x2, [0x9000, 0x8]}}, {{0x1c, 0x1, {0xfd, 0x40, 0x3, 0x8001, 0x1, 0x0, 0xb5, 0x3}}, {0xa, 0x2, [0xffff, 0xa7, 0x2]}}, {{0x1c, 0x1, {0x3, 0x5, 0xfff8, 0x1000, 0x0, 0x0, 0x1}}, {0x4}}]}, @TCA_RATE={0x6, 0x5, {0x4c, 0x2}}, @qdisc_kind_options=@q_cake={{0x9}, {0x48, 0x2, [@TCA_CAKE_INGRESS={0x8}, @TCA_CAKE_MPU={0x8, 0xe, 0xee}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_NAT={0x8, 0xb, 0x1}, @TCA_CAKE_ACK_FILTER={0x8, 0x10, 0x2}, @TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_SPLIT_GSO={0x8}]}}]}, 0x290}, 0x1, 0x0, 0x0, 0x1}, 0x20008080) (async) socket$igmp6(0xa, 0x3, 0x2) (async, rerun: 32) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000b00)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @private=0xa010100}, {0x2, 0x4e21, @private=0xa010100}, 0x140, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffff, 0x4, 0x100}) (async, rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (rerun: 64) socket$inet_tcp(0x2, 0x1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) ppoll(&(0x7f0000000a40)=[{r5, 0x4080}], 0x1, &(0x7f0000000a80)={0x0, 0x3938700}, &(0x7f0000000ac0)={[0xbc6]}, 0x8) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000b80)={0xc, @broadcast, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x2, 0x4a}, 0x2c) (async) socket$inet6_udp(0xa, 0x2, 0x0) 03:42:26 executing program 4: setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0xea60}}, 0x0) setitimer(0x0, &(0x7f0000000980)={{}, {0x0, 0x2710}}, &(0x7f00000009c0)) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000380)={@rand_addr, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@getnexthop={0x28, 0x6a, 0x10, 0x70bd28, 0x25dfdbff, {}, [@NHA_OIF={0x8, 0x5, r1}, @NHA_MASTER={0x8, 0xa, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x2400005c}, 0x44010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @private=0xa010100}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="eddede50", 0x4}], 0x1, &(0x7f00000005c0)=[{0x68, 0x10c, 0x7, "e300fb3f3f1aed96946ac9412223e84018540739258d4d02cdfda73bc2b0f8553fd88a40232cd09944e7ffcb2b6d7199c4bd6b06f1b9923f8319a9abff26ad6ec4d27b20c6c1d90bd32ce2f3e64183b04ef0ba90a6bf"}, {0xe8, 0x101, 0x1ff, "b476423ff2e74e87bf75f68ae7cc5c0bc7daf74e62f2cbab2eeb57f82f566aaeac5c2ae37831ec7685fd23c5b30ba0292885b51245544ff6fe30ebbf318cceadc1497beefc01a63b4a4de97b8afd7809d25243c2ed4e6f6b12d283bd5794797a29dda7bc7453ee2cd4004c17213336dd96cd4adf1d8720d38b70f6c1faf029e91bd20c790802b69da045a394d2058068d2c85844858d4f95ed8f54adb199eda566bddac4be8a87ec1973e65c6c2e21447740cf3ae2fe9f3a78fd49fbdbd71accb2190cbab84be1adcbf2e5496ef42df04c"}, {0x30, 0x111, 0x7fffffff, "076acfc126811a3459b716ae05b091e779a38adb55b9718778724218"}, {0x40, 0x11, 0xfffffff9, "7a009f0fa078c1fcdef15d67816be08e8644dcdb49e5ac1aed52cfb9904e42c46e6150e5bf5ed2a5a6"}, {0x40, 0x1, 0x5, "2d055d79bc9e1b97a928e923d6812367a1c28c19ecfd342d999459c43991fed672f68368ef21f00d3118"}, {0x90, 0x113, 0x2972, "af2c5278d7b3e7670a6c6fb0f7d8648264074e6438714194cf0154c8e068ad388124bd2ecdd69cfc307b5e43db45cd331647778d2ab4eb0ca5bd845514869186f1c304919e48c89f88bd2ade5c8fd11856a24d628fa55778868e83416482b0bc00ea0e2556c0e4ea4bccc2783d38fccff8413ddb883fa9ecca85875b8401"}, {0xc8, 0x108, 0xc, "182e1be7cb799ec91a6fa6071ce23b833aec402ff29544f14188dc2c47fe474a6228b9521ecae7a8a498b027cb2cdca675521db4b2103ac08207d404f27afa90be857f136b6a60f884b38b492af40d21eb9ffc6ced0b523acea9b51339e1450672c946c86a06e10fd698b621e08595e7ed0e50bc7dfcd50b0fa285543a7669da78cb89c1be8c2a0c5636f0099f5ded078f346403798eaaeabc61aa8dc13892ffed13fa6d375bfacb9fac2ace7dd7467e65d9ced9bdd605"}], 0x358}, 0x40) (async) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) (async, rerun: 32) close(r3) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r4, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c0005"], 0x3}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000f00)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000c00)=@newqdisc={0x290, 0x24, 0x10, 0x70bd27, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xfff1, 0xffff}, {0xfff1, 0x4}, {0xa, 0x2}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x178, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x3f, 0xfff, 0x0, 0x1, 0x6, 0x1f, 0x2}}, {0x8, 0x2, [0x1, 0x80]}}, {{0x1c, 0x1, {0x7, 0x40, 0x9, 0x9, 0x1, 0x1, 0x80, 0x6}}, {0x10, 0x2, [0x0, 0x5, 0x6, 0x5916, 0x3, 0x8000]}}, {{0x1c, 0x1, {0x1, 0x29, 0x81, 0x2, 0x0, 0x7f, 0x400, 0x3}}, {0xa, 0x2, [0x81, 0x6, 0x5]}}, {{0x1c, 0x1, {0x47, 0x2, 0x0, 0x3ff, 0x0, 0x78, 0x1dc, 0x5}}, {0xe, 0x2, [0x263, 0x7, 0x4517, 0x401, 0x81]}}, {{0x1c, 0x1, {0x4, 0xd3, 0x6, 0x8, 0x1, 0x5, 0x5, 0x3}}, {0xa, 0x2, [0x2, 0x1f, 0x4]}}, {{0x1c, 0x1, {0x4, 0x4, 0x8, 0x9, 0x2, 0x8, 0x20, 0x5}}, {0xe, 0x2, [0x81, 0x769, 0x0, 0x0, 0x8f]}}, {{0x1c, 0x1, {0x7f, 0x3f, 0x400, 0x8, 0x5, 0xfffffeff, 0xd3, 0x8}}, {0x14, 0x2, [0x8, 0x1, 0xfffd, 0x2, 0x7, 0x9, 0xb6, 0x3]}}, {{0x1c, 0x1, {0xd6, 0x7, 0x1000, 0x373d, 0x2, 0xd87, 0x30000, 0x2}}, {0x8, 0x2, [0x77f8, 0x1]}}, {{0x1c, 0x1, {0xf7, 0xc5, 0x2, 0x9, 0x1, 0x81, 0x1000, 0x4}}, {0xc, 0x2, [0x3, 0xfff, 0xee52, 0x8]}}]}, @TCA_STAB={0x90, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xff, 0x0, 0x0, 0x200, 0x2, 0x0, 0xffff15c3}}, {0x4}}, {{0x1c, 0x1, {0x1, 0x81, 0x7ff, 0xffffffd3, 0x0, 0x200, 0xfffffffb, 0x2}}, {0x8, 0x2, [0x9000, 0x8]}}, {{0x1c, 0x1, {0xfd, 0x40, 0x3, 0x8001, 0x1, 0x0, 0xb5, 0x3}}, {0xa, 0x2, [0xffff, 0xa7, 0x2]}}, {{0x1c, 0x1, {0x3, 0x5, 0xfff8, 0x1000, 0x0, 0x0, 0x1}}, {0x4}}]}, @TCA_RATE={0x6, 0x5, {0x4c, 0x2}}, @qdisc_kind_options=@q_cake={{0x9}, {0x48, 0x2, [@TCA_CAKE_INGRESS={0x8}, @TCA_CAKE_MPU={0x8, 0xe, 0xee}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_NAT={0x8, 0xb, 0x1}, @TCA_CAKE_ACK_FILTER={0x8, 0x10, 0x2}, @TCA_CAKE_BASE_RATE64={0xc, 0x2, 0x2}, @TCA_CAKE_WASH={0x8, 0xd, 0x1}, @TCA_CAKE_SPLIT_GSO={0x8}]}}]}, 0x290}, 0x1, 0x0, 0x0, 0x1}, 0x20008080) (async, rerun: 64) socket$igmp6(0xa, 0x3, 0x2) (async, rerun: 64) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000b00)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e21, @private=0xa010100}, {0x2, 0x4e21, @private=0xa010100}, 0x140, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffff, 0x4, 0x100}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (async) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async) ppoll(&(0x7f0000000a40)=[{r5, 0x4080}], 0x1, &(0x7f0000000a80)={0x0, 0x3938700}, &(0x7f0000000ac0)={[0xbc6]}, 0x8) (async, rerun: 32) r6 = socket$inet_tcp(0x2, 0x1, 0x0) (rerun: 32) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000b80)={0xc, @broadcast, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x2, 0x4a}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) [ 603.699145][T11793] ipvlan12: entered promiscuous mode [ 603.709650][T11802] IPVS: set_ctl: invalid protocol: 12 255.255.255.255:20003 [ 603.715263][T11793] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 603.726601][T11793] team0: Device ipvlan12 is already an upper device of the team interface 03:42:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x29, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:26 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 603.771704][T11800] ipvlan8: entered promiscuous mode 03:42:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002004000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000004155444954000000000000009ad8def09eb958dd0000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000001100000000b993000000766c616e3000000000000000fc0000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a00000004155444954000000000000000000000000000000000000000000000000000800e90000000000000000000000de200000c1560befab43f773f80f5aef6c2917194f0725037aa431eb9db86bf606627e03fbc0d621c6740a9a79409f54f9a90aaad91b179eb2c234594d96eee2a5e09f78dc7ae34206c2c3a8306960474dcfe230ca32088490db945b867c46b8ffe031b808266c1cc026a3b1a5259b7eb98cc172a8a9c8febcffadd300"/709]}, 0x33d) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000140)={0x6, 'caif0\x00', {0x3f}, 0xf001}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000100)=0x1, 0x4) [ 603.818369][T11805] FAULT_INJECTION: forcing a failure. [ 603.818369][T11805] name failslab, interval 1, probability 0, space 0, times 0 [ 603.831114][T11805] CPU: 0 PID: 11805 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 603.835649][ T27] audit: type=1400 audit(1698205346.865:716): avc: denied { ioctl } for pid=11822 comm="syz-executor.4" path="socket:[140204]" dev="sockfs" ino=140204 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 603.841565][T11805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 603.841583][T11805] Call Trace: [ 603.841591][T11805] [ 603.883027][T11805] dump_stack_lvl+0xda/0x130 [ 603.887720][T11805] dump_stack+0x15/0x20 [ 603.891919][T11805] should_fail_ex+0x21f/0x230 [ 603.896639][T11805] __should_failslab+0x92/0xa0 [ 603.901446][T11805] should_failslab+0x9/0x20 [ 603.905976][T11805] slab_pre_alloc_hook+0x38/0x180 [ 603.911025][T11805] kmem_cache_alloc+0x52/0x220 [ 603.915874][T11805] ? __kernfs_new_node+0x6a/0x380 [ 603.921020][T11805] __kernfs_new_node+0x6a/0x380 [ 603.925900][T11805] ? rb_insert_color+0x280/0x290 [ 603.930888][T11805] ? up_write+0x30/0xe0 [ 603.935067][T11805] ? kernfs_activate+0x252/0x270 [ 603.940098][T11805] kernfs_new_node+0x5f/0xd0 [ 603.944747][T11805] __kernfs_create_file+0x49/0x180 [ 603.949899][T11805] ? dev_attr_show+0x90/0x90 [ 603.954555][T11805] sysfs_add_file_mode_ns+0x136/0x1b0 [ 603.959946][T11805] internal_create_group+0x2e4/0x800 [ 603.965272][T11805] sysfs_create_groups+0x3c/0xe0 [ 603.970306][T11805] device_add_attrs+0x69/0x400 [ 603.975087][T11805] ? kobject_put+0xd8/0x160 [ 603.979688][T11805] device_add+0x431/0x8b0 [ 603.984116][T11805] netdev_register_kobject+0xfc/0x230 [ 603.989538][T11805] register_netdevice+0x680/0xb40 [ 603.994644][T11805] ? rtnl_is_locked+0x15/0x20 [ 603.999343][T11805] ? netdev_rx_handler_register+0x11a/0x140 [ 604.005296][T11805] macvlan_common_newlink+0xa1b/0xbc0 [ 604.010702][T11805] macvtap_newlink+0xf6/0x150 [ 604.015443][T11805] ? macvtap_setup+0x30/0x30 [ 604.020122][T11805] rtnl_newlink+0xee5/0x1670 [ 604.024730][T11805] ? cgroup_rstat_updated+0x8c/0x1c0 [ 604.030049][T11805] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 604.036385][T11805] ? _raw_spin_unlock+0x26/0x40 [ 604.041258][T11805] ? __mutex_lock+0x21c/0x8d0 [ 604.046006][T11805] ? rtnl_setlink+0x300/0x300 [ 604.050732][T11805] rtnetlink_rcv_msg+0x807/0x8c0 [ 604.055736][T11805] ? memcg_list_lru_alloc+0xd5/0x750 [ 604.061112][T11805] ? should_fail_ex+0x2d/0x230 [ 604.065908][T11805] ? slab_post_alloc_hook+0x8c/0x340 [ 604.071226][T11805] ? try_charge_memcg+0xb49/0xd30 [ 604.076277][T11805] ? xas_load+0x3ae/0x3c0 [ 604.080668][T11805] ? skb_release_data+0x53d/0x550 [ 604.085717][T11805] ? kmem_cache_free+0x1db/0x3a0 [ 604.090734][T11805] ? __kfree_skb+0x104/0x140 [ 604.095413][T11805] ? nlmon_xmit+0x4b/0x60 [ 604.099747][T11805] ? __kfree_skb+0x104/0x140 [ 604.104363][T11805] ? consume_skb+0x57/0x180 [ 604.109053][T11805] ? nlmon_xmit+0x4b/0x60 [ 604.113389][T11805] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 604.118681][T11805] ? __dev_queue_xmit+0xad9/0x1e20 [ 604.123798][T11805] ? ref_tracker_free+0x3a1/0x400 [ 604.128952][T11805] netlink_rcv_skb+0x126/0x220 [ 604.133757][T11805] ? rtnetlink_bind+0x60/0x60 [ 604.138453][T11805] rtnetlink_rcv+0x1c/0x20 [ 604.142885][T11805] netlink_unicast+0x589/0x650 [ 604.147668][T11805] netlink_sendmsg+0x66e/0x770 [ 604.152487][T11805] ? netlink_getsockopt+0x3e0/0x3e0 [ 604.157833][T11805] ____sys_sendmsg+0x37c/0x4d0 [ 604.162625][T11805] __sys_sendmsg+0x1e9/0x270 [ 604.167290][T11805] __x64_sys_sendmsg+0x46/0x50 [ 604.172079][T11805] do_syscall_64+0x41/0xc0 [ 604.176512][T11805] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 604.182415][T11805] RIP: 0033:0x7f7514d76ae9 [ 604.186876][T11805] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 604.206506][T11805] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 604.214973][T11805] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 604.222944][T11805] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 604.230972][T11805] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 604.238957][T11805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 604.246955][T11805] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 604.255042][T11805] 03:42:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 35) 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x3b, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1cc, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 604.270344][T11812] macvtap62: entered allmulticast mode [ 604.279800][T11812] 8021q: adding VLAN 0 to HW filter on device macvtap62 [ 604.300757][T11821] ipvlan12: entered promiscuous mode [ 604.310084][T11829] selinux_netlink_send: 4 callbacks suppressed 03:42:27 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4d, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x4a, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x7b, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 604.310102][T11829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59 sclass=netlink_route_socket pid=11829 comm=syz-executor.1 [ 604.333231][T11821] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 604.342614][T11821] team0: Device ipvlan12 is already an upper device of the team interface [ 604.377885][T11827] FAULT_INJECTION: forcing a failure. [ 604.377885][T11827] name failslab, interval 1, probability 0, space 0, times 0 [ 604.390546][T11827] CPU: 1 PID: 11827 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 604.390573][T11827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 604.411076][T11827] Call Trace: [ 604.414388][T11827] [ 604.417323][T11827] dump_stack_lvl+0xda/0x130 [ 604.422065][T11827] dump_stack+0x15/0x20 [ 604.426246][T11827] should_fail_ex+0x21f/0x230 [ 604.430946][T11827] __should_failslab+0x92/0xa0 [ 604.435736][T11827] should_failslab+0x9/0x20 [ 604.440253][T11827] slab_pre_alloc_hook+0x38/0x180 [ 604.445339][T11827] kmem_cache_alloc+0x52/0x220 [ 604.450116][T11827] ? __kernfs_new_node+0x6a/0x380 [ 604.455195][T11827] __kernfs_new_node+0x6a/0x380 [ 604.460111][T11827] ? rb_insert_color+0x263/0x290 [ 604.465068][T11827] ? up_write+0x30/0xe0 [ 604.469277][T11827] ? kernfs_activate+0x252/0x270 [ 604.474247][T11827] kernfs_new_node+0x5f/0xd0 [ 604.478955][T11827] __kernfs_create_file+0x49/0x180 [ 604.484167][T11827] ? dev_attr_show+0x90/0x90 [ 604.488767][T11827] sysfs_add_file_mode_ns+0x136/0x1b0 [ 604.494183][T11827] internal_create_group+0x2e4/0x800 [ 604.499500][T11827] sysfs_create_groups+0x3c/0xe0 [ 604.504449][T11827] device_add_attrs+0x69/0x400 [ 604.509306][T11827] ? kobject_put+0xd8/0x160 [ 604.513831][T11827] device_add+0x431/0x8b0 [ 604.518184][T11827] netdev_register_kobject+0xfc/0x230 [ 604.523580][T11827] register_netdevice+0x680/0xb40 [ 604.528642][T11827] ? rtnl_is_locked+0x15/0x20 [ 604.533388][T11827] ? netdev_rx_handler_register+0x11a/0x140 [ 604.539307][T11827] macvlan_common_newlink+0xa1b/0xbc0 [ 604.544696][T11827] macvtap_newlink+0xf6/0x150 [ 604.549415][T11827] ? macvtap_setup+0x30/0x30 [ 604.554016][T11827] rtnl_newlink+0xee5/0x1670 [ 604.558696][T11827] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 604.565089][T11827] ? _raw_spin_unlock+0x26/0x40 [ 604.569952][T11827] ? __mutex_lock+0x21c/0x8d0 [ 604.574659][T11827] ? rtnl_setlink+0x300/0x300 [ 604.579381][T11827] rtnetlink_rcv_msg+0x807/0x8c0 [ 604.584412][T11827] ? memcg_list_lru_alloc+0xd5/0x750 [ 604.589720][T11827] ? should_fail_ex+0x2d/0x230 [ 604.594501][T11827] ? slab_post_alloc_hook+0x8c/0x340 [ 604.599808][T11827] ? xas_load+0x3ae/0x3c0 [ 604.604287][T11827] ? skb_release_data+0x53d/0x550 [ 604.609331][T11827] ? kmem_cache_free+0x1db/0x3a0 [ 604.614280][T11827] ? __kfree_skb+0x104/0x140 [ 604.618889][T11827] ? nlmon_xmit+0x4b/0x60 [ 604.623347][T11827] ? __kfree_skb+0x104/0x140 [ 604.628088][T11827] ? consume_skb+0x57/0x180 [ 604.632687][T11827] ? nlmon_xmit+0x4b/0x60 [ 604.637030][T11827] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 604.642334][T11827] ? __dev_queue_xmit+0xad9/0x1e20 [ 604.647547][T11827] ? ref_tracker_free+0x3a1/0x400 [ 604.652588][T11827] netlink_rcv_skb+0x126/0x220 [ 604.657408][T11827] ? rtnetlink_bind+0x60/0x60 [ 604.662124][T11827] rtnetlink_rcv+0x1c/0x20 [ 604.666563][T11827] netlink_unicast+0x589/0x650 [ 604.671344][T11827] netlink_sendmsg+0x66e/0x770 [ 604.676165][T11827] ? netlink_getsockopt+0x3e0/0x3e0 [ 604.681382][T11827] ____sys_sendmsg+0x37c/0x4d0 [ 604.686254][T11827] __sys_sendmsg+0x1e9/0x270 [ 604.690876][T11827] __x64_sys_sendmsg+0x46/0x50 [ 604.695731][T11827] do_syscall_64+0x41/0xc0 [ 604.700218][T11827] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 604.706169][T11827] RIP: 0033:0x7f7514d76ae9 [ 604.710590][T11827] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 604.730319][T11827] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 604.738819][T11827] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 604.746853][T11827] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 604.754830][T11827] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 604.762807][T11827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 604.770785][T11827] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/709]}, 0x33d) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000140)={0x6, 'caif0\x00', {0x3f}, 0xf001}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000100)=0x1, 0x4) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002004000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000004155444954000000000000009ad8def09eb958dd0000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000001100000000b993000000766c616e3000000000000000fc0000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a00000004155444954000000000000000000000000000000000000000000000000000800e90000000000000000000000de200000c1560befab43f773f80f5aef6c2917194f0725037aa431eb9db86bf606627e03fbc0d621c6740a9a79409f54f9a90aaad91b179eb2c234594d96eee2a5e09f78dc7ae34206c2c3a8306960474dcfe230ca32088490db945b867c46b8ffe031b808266c1cc026a3b1a5259b7eb98cc172a8a9c8febcffadd300"/709]}, 0x33d) (async) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) (async) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000140)={0x6, 'caif0\x00', {0x3f}, 0xf001}) (async) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r2, 0x0, 0x0) (async) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000100)=0x1, 0x4) (async) 03:42:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 36) 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x9c, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 604.778869][T11827] [ 604.792158][T11837] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=11837 comm=syz-executor.1 03:42:27 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/709]}, 0x33d) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000140)={0x6, 'caif0\x00', {0x3f}, 0xf001}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000100)=0x1, 0x4) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/709]}, 0x33d) (async) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) (async) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000140)={0x6, 'caif0\x00', {0x3f}, 0xf001}) (async) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r2, 0x0, 0x0) (async) setsockopt$sock_int(r2, 0x1, 0x2e, &(0x7f0000000100)=0x1, 0x4) (async) 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x7c3, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 604.831118][T11831] ipvlan8: entered promiscuous mode [ 604.833628][T11844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=156 sclass=netlink_route_socket pid=11844 comm=syz-executor.1 03:42:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xdf8, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 604.891933][T11833] macvtap63: entered allmulticast mode [ 604.896748][T11853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1987 sclass=netlink_route_socket pid=11853 comm=syz-executor.1 [ 604.905361][T11833] 8021q: adding VLAN 0 to HW filter on device macvtap63 [ 604.920120][T11842] FAULT_INJECTION: forcing a failure. [ 604.920120][T11842] name failslab, interval 1, probability 0, space 0, times 0 [ 604.932767][T11842] CPU: 0 PID: 11842 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 604.939165][T11856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3576 sclass=netlink_route_socket pid=11856 comm=syz-executor.1 [ 604.943188][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 604.943206][T11842] Call Trace: [ 604.943215][T11842] [ 604.943224][T11842] dump_stack_lvl+0xda/0x130 [ 604.977286][T11842] dump_stack+0x15/0x20 [ 604.981503][T11842] should_fail_ex+0x21f/0x230 [ 604.986241][T11842] __should_failslab+0x92/0xa0 [ 604.991075][T11842] should_failslab+0x9/0x20 [ 604.995621][T11842] slab_pre_alloc_hook+0x38/0x180 [ 605.000747][T11842] kmem_cache_alloc+0x52/0x220 [ 605.005514][T11842] ? __kernfs_new_node+0x6a/0x380 [ 605.010630][T11842] __kernfs_new_node+0x6a/0x380 [ 605.015515][T11842] ? rb_insert_color+0x6a/0x290 [ 605.020397][T11842] ? up_write+0x30/0xe0 [ 605.024567][T11842] ? kernfs_activate+0x252/0x270 [ 605.029583][T11842] kernfs_new_node+0x5f/0xd0 [ 605.034269][T11842] __kernfs_create_file+0x49/0x180 [ 605.039501][T11842] ? dev_attr_show+0x90/0x90 [ 605.044099][T11842] sysfs_add_file_mode_ns+0x136/0x1b0 [ 605.049497][T11842] internal_create_group+0x2e4/0x800 [ 605.054803][T11842] sysfs_create_groups+0x3c/0xe0 [ 605.059761][T11842] device_add_attrs+0x69/0x400 [ 605.064587][T11842] ? kobject_put+0xd8/0x160 [ 605.069133][T11842] device_add+0x431/0x8b0 [ 605.073491][T11842] netdev_register_kobject+0xfc/0x230 [ 605.078899][T11842] register_netdevice+0x680/0xb40 [ 605.083982][T11842] ? rtnl_is_locked+0x15/0x20 [ 605.088727][T11842] ? netdev_rx_handler_register+0x11a/0x140 [ 605.094680][T11842] macvlan_common_newlink+0xa1b/0xbc0 [ 605.100106][T11842] macvtap_newlink+0xf6/0x150 [ 605.104882][T11842] ? macvtap_setup+0x30/0x30 [ 605.109480][T11842] rtnl_newlink+0xee5/0x1670 [ 605.114126][T11842] ? cgroup_rstat_updated+0x8c/0x1c0 [ 605.119448][T11842] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 605.125717][T11842] ? _raw_spin_unlock+0x26/0x40 [ 605.130636][T11842] ? __mutex_lock+0x21c/0x8d0 [ 605.135393][T11842] ? rtnl_setlink+0x300/0x300 [ 605.140237][T11842] rtnetlink_rcv_msg+0x807/0x8c0 [ 605.145236][T11842] ? memcg_list_lru_alloc+0xd5/0x750 [ 605.150534][T11842] ? should_fail_ex+0x2d/0x230 [ 605.155314][T11842] ? slab_post_alloc_hook+0x8c/0x340 [ 605.160699][T11842] ? xas_load+0x3ae/0x3c0 [ 605.165192][T11842] ? skb_release_data+0x53d/0x550 [ 605.170259][T11842] ? kmem_cache_free+0x1db/0x3a0 [ 605.175204][T11842] ? __kfree_skb+0x104/0x140 [ 605.179874][T11842] ? nlmon_xmit+0x4b/0x60 [ 605.184208][T11842] ? __kfree_skb+0x104/0x140 [ 605.188825][T11842] ? consume_skb+0x57/0x180 [ 605.193472][T11842] ? nlmon_xmit+0x4b/0x60 [ 605.197947][T11842] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 605.203250][T11842] ? __dev_queue_xmit+0xad9/0x1e20 [ 605.208407][T11842] ? ref_tracker_free+0x3a1/0x400 [ 605.213468][T11842] netlink_rcv_skb+0x126/0x220 [ 605.218254][T11842] ? rtnetlink_bind+0x60/0x60 [ 605.223089][T11842] rtnetlink_rcv+0x1c/0x20 [ 605.227524][T11842] netlink_unicast+0x589/0x650 [ 605.232304][T11842] netlink_sendmsg+0x66e/0x770 [ 605.237162][T11842] ? netlink_getsockopt+0x3e0/0x3e0 [ 605.242455][T11842] ____sys_sendmsg+0x37c/0x4d0 [ 605.247238][T11842] __sys_sendmsg+0x1e9/0x270 [ 605.251864][T11842] __x64_sys_sendmsg+0x46/0x50 [ 605.256672][T11842] do_syscall_64+0x41/0xc0 [ 605.261110][T11842] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 605.267112][T11842] RIP: 0033:0x7f7514d76ae9 [ 605.271529][T11842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 605.291168][T11842] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 605.299670][T11842] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 605.307651][T11842] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 605.315656][T11842] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 605.323667][T11842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 605.331640][T11842] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 605.339650][T11842] 03:42:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0xea0, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1ed, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 605.352293][T11854] ipvlan12: entered promiscuous mode [ 605.362826][T11854] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 605.377132][T11854] team0: Device ipvlan12 is already an upper device of the team interface 03:42:28 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x55, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 37) 03:42:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x402, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 605.390108][T11867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3744 sclass=netlink_route_socket pid=11867 comm=syz-executor.1 03:42:28 executing program 4: r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x84, r2, 0x5, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@ibss={0x6, 0x2}]}, @NL80211_ATTR_FTM_RESPONDER={0x4}, @NL80211_ATTR_BEACON_HEAD={0x55, 0xe, {@wo_ht={{}, {}, @device_b, @broadcast, @from_mac=@device_b}, 0x0, @random, 0x0, @val={0x0, 0xffffffffffffff73, @default_ibss_ssid}, @void, @void, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @void, @val={0x2d, 0x1a}, @void, @void}}]}, 0x84}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x1260, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5d}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x90, 0xfa, "894846701071efc869f57df58c5501ab00f7630a5d8106c7ec2050b32568479bd50b9fd1b9f72926f2614ad61a800b560dab7ecfce391c9e537a1110daa2ab0affa8e7e8f2c36999f96bd885643e36f4bccf54508402089c00383f0f52d5117a4898435bc5a4878ccfe1b8c5081d246c81b170e0a4cd98f1dcab4281410f0a185607ff20969f10660b0f0723"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x4}, @NL80211_ATTR_FILS_ERP_RRK={0x5b, 0xfc, "6c223e62664a8ca19cf0b339c6711bfe4669f9aad159cfc4b8a6197227ecca053e15f846b3b42d746c10c41d937c6e58b008da35bf943e2c8e1f07e12d02122523f62c276c94e2cc47d9a290b084e2fb71e86a0bb59dc1"}, @NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "8f4760e6551ebeef0ec994d12bbaace2fb53757cfa9bd03ccd9e21dc1f61585415b128de4aa43cd951521371a1621dfef7149fb384ce52edfde549a026ea315c7c8cade3f3082191596543f797330fa833b74e38b3d98ce58eeae2831d87570580bb1ee7e24a46c8f5c8da5b69e27a09bfa9a7af8f4cfdff2680c5f0e4343b00ff0c9ace7c199b1272a02c95186fda929e215e5220dacee28e32a0889ade88b7b22469658f75ff1ed0d838d5ed976f68b96c91128e4aa57ac0288899059676d2e8e71fff4ec292bd11a17114e4cd3c833dcafd74427d12a5ed7a09905fe3380e31e650d2f82dbfed34b3e84997d6f952c883e31cbe93203f2076d4c5d6d6f8ec5234cfe668782c6f588110eaa2005423d58a9273b52c4bbc566189feefdf0eafeef3056a524a62c3e0270750052462db73e8dd9c2f336e157b2fa773dba0745fa8a58c3e09b463e477d3211bc55c14c39d4e624e036277e1f3d8e3094f3a71ac5915c37fc615cd186fd73152938e771f6f76391373384cf2c8ec2ce5b8eae941f6dff95bd4f79499d4322096aadb5e61f2605670e8fc25f2201d1efb64528c79e619336e2dc286d9e2361a897a5d4821b01efceecaceabf3da9f2d885aef9f0b69f1aca065645b20c2586ce45eaa1d03a2ca9fe4076be7fe3fc21151b9b1662d5fe80d7eb651872bfbf47a2927fef39e1a41ee747fc64ebe6135a864392abc686520ef065b21f96acbc113c4780f9c6a08507a38e0124a863e1d39b604142841eddac9a86bfce0ffeacbcd9ac20c738b1d46a30d448809f7020cb52758e75165ed990bd3c957a002f7477680156b50f842a31775a8156a00a6cc1a7d4dd885a40afd34b86cc25285ab88a90fc4fb1d6dffce91bd1b97529ab790b451b4ece28cd1975484b8b0129d44dc5ecd48d6e9e05595937e2927e5927e1dd24681db38daeea04349790a8d7f576314b52e73fabf313451e647b9a815c3c4ba3711d263c8ddcf05de391196a1bcb5fa966bd5f85fb411a03bed636382a08749501999aa1c0f3c981bfea27e599f6c582ac09444044fbe3b2d598434165e9c7d1408afb6a6c283a67ee97ee51f969a0b95fba99375d5f6327e51009bb993545b185aefe185512750c8fb72d05b28af311e844198650ceb4f0c257ea1cd7af35b2d7dfb1ba4726e199c3b04763eabeb554cfe513a1ae9d1b6ca66e996c179cb0d4d560e58a22c11897feed584c281b6b6bc7ea1fb5a2f9c71eae4b87ea8e7358799efd2aa0b600439e3087d5a32c1bfe1ba7517c75675ae3483b826c58dcdec4f3a6ebc369286e2d39c338c0c5c65a03997a2969fd52850ee47acf0ec81573b6d63f0a01f53d4f4b317fc14d218edf5174ec688f2d23e16e3781785035f8de89ab3815517ee3fae6d753281fc37b4c11ef32c77fb9d7d65ad811723959e77bd67bc7c4d0e2a1e822c69f0e05e164c7926f87150d167c4bf72704c9572c0bec32365859bb5fd66819798e2ad215e12ff39b9c278f3844ff00b5734e2710f1d3901ebcfea6ff84e196a055dacaa9dc2f41d822c719a35e661e2986389c2d873534f8f77baba9f3bd9d811eb605362838c90855cf37860f3a74a6992385bc3dfbb6dbbd1a6e3e935f944dde6c4b86973b5cf49a5625dc85203127e6c12755c3f76e73aa2c77db5f08081fddb5829bdd5446c65a6beb578359e587cb19d8db228801e8670283ba9d35d085b09fe759709014a315f0d0d1e2265b2ceae4eae8aa9a246cb3aa915c46a939a9c282923473becb6e2896b356c84d22d969d17137b558707a0cf6452ea3dc0af268ba5a2ec028b73962f770c3f5f6f69742399f522da06b138cad419ae36c99dab81e3362e75b85a8e3b7dfb6a0e07bd84fb462fc2e65c4f52536d9502c1e80c09fab23c107c7564c28014efbeb68947c38a91c2083a3f082532e2175cb98cdfcc1748a958727fe94b390b2f8f966d5729128719e6b7dea4eb753e79ca87437045db6293837311daf1fc690cefd584056a5c8792325dcee24c45c107cf376b9f4d82e250214895c3e58bdde26686a64ae8e7711aa289e291c374fe61e18abe1e465136600f69de3c9d286c836a464548ed1388a65dcc919a39040a196d225b49ba4c09806f498a5cbce302008a729e1652c2eeb7f0348b26249fbffdbc4f586e6023a973781b8e1eaa366f3a7b3a2c085b177726fa276fef63374ecae13412876589f5b1e217f25477c0bda658c51a42b4318442c4160f6bdce4526c3a197b7def05f77ee483054f7cca4f0a12686f69242d8f50b4cde332e10f8e3e0e41e3f238a4e8a80f8160387a75034adc1c2bfd2c628908671c95e56fe7ee0996112e053ad633e62ce5f098676368c2c8ba929ba4284c72b1bd74fdaadc6b615a093f8a6317062554277a510fbedff7ed30190403d744bac47597243ba0467d1d3f5eb736483ad39d2e1968edb7ed5e5489d428b07eadf93fcbd69a0e440b56b8648b222eb1cbf119129cdb409c61d26b7134dab6cdc266c0e631c4ff8460b8f00bf49cf1abecab8c34a0f1cce25438325ba7d420fdb15b9cf93a148ed372190ed94387115a8d0f30fc72a14f71446ced46e6e135b437805a845dbe8f21d68110eb60b66bde54cc7db0ccf2f54719bff10d46121b071872d36b8ba51fe11c3947d31896f5c9cf7c5240407a61581cce9e7dab5716d1990a82163399024f8eb281a5b9d77f1099b77d20762420ede258189eceb2018006f5cc883543ecd4f86b84b0c79b9556655cee2722377dbecb2a18e3500315f4da0f5f9430a083f2d53cb07a10e61b4b809d2c435ee35e47d0d5138b9688c9be62218b7bd304dd2c30b7e598f919041211316c51a5c7967750fa2b3d69f67eb643fe4fe8f4e92002a33109d611815c981de3ae55a91650dc66c63e9655dc8363c58e346ec66365ca4436c2f179ed26565dc0c47b35d73cfb56dc5f5321309b9900eadcc197aca5598ab28f4890a12e3f35a7cae5e11aa1922160f3af02b3795995450008d7f092b545d60e497ba635c47b918e628a36dc8e1c977473db73ad6defcaa3c22fa4b1af23fd02b00511e00b837c22756baa59bff5e7789be86e0804525dce8d8c530872591d72931cbeb7f8ffea78d2d8b20d3bde0bd4f31aebc825a6192ad25903460cfdd96bfbd688a7fd9ce991c0ccaa15873cb158dc773d48a454e7b9c228ceca4c5066e64191d15efda48e077b143a6846eff87177339d425084c3efe14f4fa301d9ab036bc8cd0d84db9826c93904a7fff9906223da1459a053e2584679e5b6965984059d4e8c25be3762bd4ed6b31b522898bf961a2a6cd34f9d8c9b15441c48510f41eb7650e1678b1afc799cd848072bf523c322466ef1a5f58efbaae19e014a126ce84bf45e6505217aa1f9a3d3e6ed7732b61d9ca4e720178ac87718094ea72a71b7fbecce3a7d20c715637e16f61c1144e9923ac5188cde018033fbcc304006d2d852544d5dd1d00e9b80819a22314a2ab8a637c6d06bd3560477f8932a7526dfec8910b498a1f9596b4cba5c63da9b571753ec5a41081f00c459cff9a43abd5712b3f74de15cd10730e649bbada56805b5f4925265f271173cbf000e61b173a93913c8f4a7ad73ea1118cc0e6f2bf28e546eddc1e7933b2c5669bdf67d3ba90a7309f660d93d8025b729d82c866c6d0f9c25184a87dfc2de9153b4e04b090d30b8b01e3c7e05bcef3162abbc6d437c4dabe1f4062566da03f162bddaeb3935cc35457fdf8cd4534a3712fabd05c889a9c1c5cf5724f43a9040055f6e181caf69aba444f201a7e592c0a0b413602b077d92e89686cf2559e15ec209d8a1a8ab5ad48ac179fbc056c3e39ad48ded9134b6d48bcbaee2a2d2d9e58c1236dff94094a65fdcfc4162f935e03a5487afc2e99aba60367da46344bb8910fe6a8060dd4c5c2834f8ddbd2a946b6eb38fef8cb2594080bcfba03f2a5f9383eebc14ca17fc2273ac8a51506b43f0eecc3ced6c8566c424dced9ac1d84544155fd90b4997ee65dd16db5ed124fbf9017f44322f948682b1519ab4c0f7424e86f4247ced53afa06e8415ee15e73ef3cbbbfacf447b856356f26fc141f49d3e8106ad951847e71578ef79e2bd8ca43cf50abcd37b9c59a7499e20326e2d99c41dc9911789ce26f74dea8d8e87b28866f420b196b0dc4683d61018429f3480a704bdfc65706cf3f4e2c9fe11e921d37e360a100397cc6f7d1bf9b21ff04e516dc439d6d700fd1d02c8ea31b3031c73d3895ff923572bf7b14203c31d59ecc2adf943a22eda33a095a72e71fac42a5a1e0826f48791a5c6df97ed4c84bcbeabc8663be3cff65e8aab94ce19cd704dc5e0151e11ee5ff4d0a35a397cf524a66fbbe882f7b1134b72f0d4d9748e941a4392ff72c2b4a6a1ae41523757e37ed1e854c8fb247ef086a63979fe33f785c828299841a1cae5f309a332c0e9075f2d23fdf4da1dac42edb4982c4a991c342c05b50b8f76d888a79b56f33ad60d1deae20efaeb87f87d860f629da9785db394e5c39c4950fe84996b4c0f98716d516643db1bd46cbba4e195f6a1128e1dfe8e66e353c02a40e1bd17d5e8e9ef64ecec13353b10f54a396301b5fcfa8687723b866368813f9e61a9bfe2d1200e25ed945d7932f77716d3c1d69bf634046b02ebad63620da4ce3658c5882c2efd9654a6881d27e0c89d32eb7951a011e80ddb7fa1459cf4287404ad32167742b0bb9f493352f34bfd0a2ff39a2f7f567bdfef5a87a90f6f32b99aad06d227517dd7d34fa4539069f22291f3fed6764b15140e133c570858ebb03049c727f5759f7221e55cab1854566ce2e1167c50bd123a73a31d12c930c78932a9b2d8741ae55af47a701b15e49abf70760c786cce98a83219e4e48e3e1eb68d0308c1b4375d3855f6e36bb7c1c63d513439d9d1248687548f590e9716a3b0362945ebe811d4d0129ccce7e900564287c9d390c462cbacf09029093ff8e471e6920a4a541c2df4b50cffa32cfa99c96c87a10ccd5fae95d776fa5199e48e28f21944acab0e77a39f8393b1205e72143a294ca8522a40e7b82724bf2738e45f6aa268944a5230d95b2ced667f72cc297122affb00a9f6b4d8131cbdb1ec6f553526a5dd324373d4cbb20780edb29e0cec3b43ae00994c41022e6eac7a85f084c757d295c4c3d0d1d3b9dba392eb27e20fbbf55bf50f420fc0e7c571c92942b561b28470b6cdb337e0e35f0695c1e2dbd5a49a86b1e9a97975380c708dd79841611eb85fb0c3b217791b6eade0b2bd0e3d333d82c0e72fe3017d1f7bad598bab315ad76c9aba2ce6b5788c4de9b4c2e59eebc27236822d09fc1852d7765fd9dee9221fc7ca9b6fe996d39e23f5c7f161f7f6f5a8f4cc7ae0899bcf9ced7cf81d62d8d4b0a53ecd00fb1b52162605a0320a870fe6bf3a2c75310566e6724a9e54d252ff3591418e2cd4cb5d60cf1d821dc26b57658fd0d9a314e18f56e8be112dd23004801b0ecfe348358c4fb4290242160cc19c1137ae76c07915698e9180d565b2c46fdcfe2fa0e88a4b968c4323237041a972a7add0ab5175ff7897bb602c8f42d16d9ea5cae259f439b8bcc73472a9fce104c632aca291678c6f75c77a7d89dc76c1d82fc17dc9198c9cd980fa2a355ff52faac6d8c12ab6727605cb63ee58045a33f75f5a51c95d2838cf03c66d8d47d72829acf49f8ad28b567eb03ef58f50c4378c1cdd22836d3367bb111f4955f69b8c956243a1027bb72c62137e7e6400b7aadf5205cfd66c07875db3ba49519bb1"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x3}], @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_REALM={0xe6, 0xfa, "c3975dee7fbdfdd59d59b38f68b0cdb6ac81bcc58faf1485bc5081877eb5733dd1e0caa3a75a438626334352f55b5bb96daa88da4ef9532a35c800a6bbffb15b179a1ce5e7c80d4973ce71a28dc5d9d6f3c5d8872bd73fdb7feb64e5d24e3e3dd2169459a3f576b1eba52c1c69984fd913473a06785599e87a2114d467b9cc8a775a2471c3ab37c60722ca04c18207f5baf27b98ac7b055905612cad72a94d6050423a6f1a388ecef26212b9271f12b88ef5dce3d582e9d82017608c149929d676213595535b8fddc03e545380680e554c50487abcbc702897df1f22bbb2a2827791"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "e0e95eeca429074b6002127b9b1ca213"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "a97b259d0756"}], @NL80211_ATTR_IE={0x17, 0x2a, [@cf={0x4, 0x6, {0x80, 0xd2, 0x400, 0xff}}, @mesh_id={0x72, 0x6}, @dsss={0x3, 0x1, 0x155}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@mesh_chsw={0x76, 0x6, {0x20, 0x8, 0x3, 0x810}}, @gcr_ga={0xbd, 0x6, @device_b}]}]}, 0x1260}, 0x1, 0x0, 0x0, 0x4000}, 0x400) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:28 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x4d, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 605.450780][T11866] macvtap64: entered allmulticast mode [ 605.460155][T11866] 8021q: adding VLAN 0 to HW filter on device macvtap64 [ 605.472060][T11871] ipvlan8: entered promiscuous mode 03:42:28 executing program 4: r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x84, r2, 0x5, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@ibss={0x6, 0x2}]}, @NL80211_ATTR_FTM_RESPONDER={0x4}, @NL80211_ATTR_BEACON_HEAD={0x55, 0xe, {@wo_ht={{}, {}, @device_b, @broadcast, @from_mac=@device_b}, 0x0, @random, 0x0, @val={0x0, 0xffffffffffffff73, @default_ibss_ssid}, @void, @void, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @void, @val={0x2d, 0x1a}, @void, @void}}]}, 0x84}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x1260, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5d}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x90, 0xfa, "894846701071efc869f57df58c5501ab00f7630a5d8106c7ec2050b32568479bd50b9fd1b9f72926f2614ad61a800b560dab7ecfce391c9e537a1110daa2ab0affa8e7e8f2c36999f96bd885643e36f4bccf54508402089c00383f0f52d5117a4898435bc5a4878ccfe1b8c5081d246c81b170e0a4cd98f1dcab4281410f0a185607ff20969f10660b0f0723"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x4}, @NL80211_ATTR_FILS_ERP_RRK={0x5b, 0xfc, "6c223e62664a8ca19cf0b339c6711bfe4669f9aad159cfc4b8a6197227ecca053e15f846b3b42d746c10c41d937c6e58b008da35bf943e2c8e1f07e12d02122523f62c276c94e2cc47d9a290b084e2fb71e86a0bb59dc1"}, @NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x3}], @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_REALM={0xe6, 0xfa, "c3975dee7fbdfdd59d59b38f68b0cdb6ac81bcc58faf1485bc5081877eb5733dd1e0caa3a75a438626334352f55b5bb96daa88da4ef9532a35c800a6bbffb15b179a1ce5e7c80d4973ce71a28dc5d9d6f3c5d8872bd73fdb7feb64e5d24e3e3dd2169459a3f576b1eba52c1c69984fd913473a06785599e87a2114d467b9cc8a775a2471c3ab37c60722ca04c18207f5baf27b98ac7b055905612cad72a94d6050423a6f1a388ecef26212b9271f12b88ef5dce3d582e9d82017608c149929d676213595535b8fddc03e545380680e554c50487abcbc702897df1f22bbb2a2827791"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "e0e95eeca429074b6002127b9b1ca213"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "a97b259d0756"}], @NL80211_ATTR_IE={0x17, 0x2a, [@cf={0x4, 0x6, {0x80, 0xd2, 0x400, 0xff}}, @mesh_id={0x72, 0x6}, @dsss={0x3, 0x1, 0x155}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@mesh_chsw={0x76, 0x6, {0x20, 0x8, 0x3, 0x810}}, @gcr_ga={0xbd, 0x6, @device_b}]}]}, 0x1260}, 0x1, 0x0, 0x0, 0x4000}, 0x400) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x210, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 605.511722][T11869] FAULT_INJECTION: forcing a failure. [ 605.511722][T11869] name failslab, interval 1, probability 0, space 0, times 0 [ 605.524445][T11869] CPU: 0 PID: 11869 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 605.534892][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 605.545020][T11869] Call Trace: [ 605.548323][T11869] [ 605.551339][T11869] dump_stack_lvl+0xda/0x130 [ 605.556005][T11869] dump_stack+0x15/0x20 [ 605.556048][T11869] should_fail_ex+0x21f/0x230 [ 605.556117][T11869] __should_failslab+0x92/0xa0 [ 605.569792][T11869] should_failslab+0x9/0x20 [ 605.574328][T11869] slab_pre_alloc_hook+0x38/0x180 [ 605.579386][T11869] kmem_cache_alloc+0x52/0x220 [ 605.584170][T11869] ? __kernfs_new_node+0x6a/0x380 [ 605.589329][T11869] __kernfs_new_node+0x6a/0x380 [ 605.594201][T11869] ? rb_insert_color+0x6a/0x290 [ 605.599129][T11869] ? up_write+0x30/0xe0 [ 605.603362][T11869] ? kernfs_activate+0x252/0x270 [ 605.608339][T11869] kernfs_new_node+0x5f/0xd0 [ 605.612982][T11869] __kernfs_create_file+0x49/0x180 [ 605.618131][T11869] ? dev_attr_show+0x90/0x90 [ 605.622736][T11869] sysfs_add_file_mode_ns+0x136/0x1b0 [ 605.628161][T11869] internal_create_group+0x2e4/0x800 [ 605.633508][T11869] sysfs_create_groups+0x3c/0xe0 [ 605.638462][T11869] device_add_attrs+0x69/0x400 [ 605.643240][T11869] ? kobject_put+0xd8/0x160 [ 605.647817][T11869] device_add+0x431/0x8b0 [ 605.652189][T11869] netdev_register_kobject+0xfc/0x230 [ 605.657628][T11869] register_netdevice+0x680/0xb40 [ 605.662744][T11869] ? rtnl_is_locked+0x15/0x20 [ 605.667432][T11869] ? netdev_rx_handler_register+0x11a/0x140 [ 605.673338][T11869] macvlan_common_newlink+0xa1b/0xbc0 [ 605.678738][T11869] macvtap_newlink+0xf6/0x150 [ 605.683511][T11869] ? macvtap_setup+0x30/0x30 [ 605.688185][T11869] rtnl_newlink+0xee5/0x1670 [ 605.692849][T11869] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 605.699155][T11869] ? _raw_spin_unlock+0x26/0x40 [ 605.704011][T11869] ? __mutex_lock+0x21c/0x8d0 [ 605.708723][T11869] ? rtnl_setlink+0x300/0x300 [ 605.713467][T11869] rtnetlink_rcv_msg+0x807/0x8c0 [ 605.718601][T11869] ? memcg_list_lru_alloc+0xd5/0x750 [ 605.723923][T11869] ? should_fail_ex+0x2d/0x230 [ 605.728701][T11869] ? slab_post_alloc_hook+0x8c/0x340 [ 605.734012][T11869] ? xas_load+0x3ae/0x3c0 [ 605.738429][T11869] ? skb_release_data+0x53d/0x550 [ 605.743474][T11869] ? kmem_cache_free+0x1db/0x3a0 [ 605.748445][T11869] ? __kfree_skb+0x104/0x140 [ 605.753049][T11869] ? nlmon_xmit+0x4b/0x60 [ 605.757388][T11869] ? __kfree_skb+0x104/0x140 [ 605.762079][T11869] ? consume_skb+0x57/0x180 [ 605.766631][T11869] ? nlmon_xmit+0x4b/0x60 [ 605.770975][T11869] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 605.776323][T11869] ? __dev_queue_xmit+0xad9/0x1e20 [ 605.781458][T11869] ? ref_tracker_free+0x3a1/0x400 [ 605.786583][T11869] netlink_rcv_skb+0x126/0x220 [ 605.791377][T11869] ? rtnetlink_bind+0x60/0x60 [ 605.796093][T11869] rtnetlink_rcv+0x1c/0x20 [ 605.800576][T11869] netlink_unicast+0x589/0x650 [ 605.805360][T11869] netlink_sendmsg+0x66e/0x770 [ 605.810271][T11869] ? netlink_getsockopt+0x3e0/0x3e0 [ 605.815493][T11869] ____sys_sendmsg+0x37c/0x4d0 [ 605.820287][T11869] __sys_sendmsg+0x1e9/0x270 [ 605.824954][T11869] __x64_sys_sendmsg+0x46/0x50 [ 605.829791][T11869] do_syscall_64+0x41/0xc0 [ 605.834318][T11869] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 605.840255][T11869] RIP: 0033:0x7f7514d76ae9 [ 605.844681][T11869] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 605.864323][T11869] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 605.872757][T11869] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 605.880729][T11869] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 605.888819][T11869] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 605.896812][T11869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 605.904840][T11869] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:28 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x56, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:28 executing program 4: r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x84, r2, 0x5, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@ibss={0x6, 0x2}]}, @NL80211_ATTR_FTM_RESPONDER={0x4}, @NL80211_ATTR_BEACON_HEAD={0x55, 0xe, {@wo_ht={{}, {}, @device_b, @broadcast, @from_mac=@device_b}, 0x0, @random, 0x0, @val={0x0, 0xffffffffffffff73, @default_ibss_ssid}, @void, @void, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @void, @val={0x2d, 0x1a}, @void, @void}}]}, 0x84}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x1260, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5d}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x90, 0xfa, "894846701071efc869f57df58c5501ab00f7630a5d8106c7ec2050b32568479bd50b9fd1b9f72926f2614ad61a800b560dab7ecfce391c9e537a1110daa2ab0affa8e7e8f2c36999f96bd885643e36f4bccf54508402089c00383f0f52d5117a4898435bc5a4878ccfe1b8c5081d246c81b170e0a4cd98f1dcab4281410f0a185607ff20969f10660b0f0723"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x4}, @NL80211_ATTR_FILS_ERP_RRK={0x5b, 0xfc, "6c223e62664a8ca19cf0b339c6711bfe4669f9aad159cfc4b8a6197227ecca053e15f846b3b42d746c10c41d937c6e58b008da35bf943e2c8e1f07e12d02122523f62c276c94e2cc47d9a290b084e2fb71e86a0bb59dc1"}, @NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x3}], @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_REALM={0xe6, 0xfa, "c3975dee7fbdfdd59d59b38f68b0cdb6ac81bcc58faf1485bc5081877eb5733dd1e0caa3a75a438626334352f55b5bb96daa88da4ef9532a35c800a6bbffb15b179a1ce5e7c80d4973ce71a28dc5d9d6f3c5d8872bd73fdb7feb64e5d24e3e3dd2169459a3f576b1eba52c1c69984fd913473a06785599e87a2114d467b9cc8a775a2471c3ab37c60722ca04c18207f5baf27b98ac7b055905612cad72a94d6050423a6f1a388ecef26212b9271f12b88ef5dce3d582e9d82017608c149929d676213595535b8fddc03e545380680e554c50487abcbc702897df1f22bbb2a2827791"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "e0e95eeca429074b6002127b9b1ca213"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "a97b259d0756"}], @NL80211_ATTR_IE={0x17, 0x2a, [@cf={0x4, 0x6, {0x80, 0xd2, 0x400, 0xff}}, @mesh_id={0x72, 0x6}, @dsss={0x3, 0x1, 0x155}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@mesh_chsw={0x76, 0x6, {0x20, 0x8, 0x3, 0x810}}, @gcr_ga={0xbd, 0x6, @device_b}]}]}, 0x1260}, 0x1, 0x0, 0x0, 0x4000}, 0x400) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r0, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x84, r2, 0x5, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@ibss={0x6, 0x2}]}, @NL80211_ATTR_FTM_RESPONDER={0x4}, @NL80211_ATTR_BEACON_HEAD={0x55, 0xe, {@wo_ht={{}, {}, @device_b, @broadcast, @from_mac=@device_b}, 0x0, @random, 0x0, @val={0x0, 0xffffffffffffff73, @default_ibss_ssid}, @void, @void, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @void, @val={0x2d, 0x1a}, @void, @void}}]}, 0x84}}, 0x0) (async) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000001600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x1260, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5d}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x90, 0xfa, "894846701071efc869f57df58c5501ab00f7630a5d8106c7ec2050b32568479bd50b9fd1b9f72926f2614ad61a800b560dab7ecfce391c9e537a1110daa2ab0affa8e7e8f2c36999f96bd885643e36f4bccf54508402089c00383f0f52d5117a4898435bc5a4878ccfe1b8c5081d246c81b170e0a4cd98f1dcab4281410f0a185607ff20969f10660b0f0723"}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x4}, @NL80211_ATTR_FILS_ERP_RRK={0x5b, 0xfc, "6c223e62664a8ca19cf0b339c6711bfe4669f9aad159cfc4b8a6197227ecca053e15f846b3b42d746c10c41d937c6e58b008da35bf943e2c8e1f07e12d02122523f62c276c94e2cc47d9a290b084e2fb71e86a0bb59dc1"}, @NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "8f4760e6551ebeef0ec994d12bbaace2fb53757cfa9bd03ccd9e21dc1f61585415b128de4aa43cd951521371a1621dfef7149fb384ce52edfde549a026ea315c7c8cade3f3082191596543f797330fa833b74e38b3d98ce58eeae2831d87570580bb1ee7e24a46c8f5c8da5b69e27a09bfa9a7af8f4cfdff2680c5f0e4343b00ff0c9ace7c199b1272a02c95186fda929e215e5220dacee28e32a0889ade88b7b22469658f75ff1ed0d838d5ed976f68b96c91128e4aa57ac0288899059676d2e8e71fff4ec292bd11a17114e4cd3c833dcafd74427d12a5ed7a09905fe3380e31e650d2f82dbfed34b3e84997d6f952c883e31cbe93203f2076d4c5d6d6f8ec5234cfe668782c6f588110eaa2005423d58a9273b52c4bbc566189feefdf0eafeef3056a524a62c3e0270750052462db73e8dd9c2f336e157b2fa773dba0745fa8a58c3e09b463e477d3211bc55c14c39d4e624e036277e1f3d8e3094f3a71ac5915c37fc615cd186fd73152938e771f6f76391373384cf2c8ec2ce5b8eae941f6dff95bd4f79499d4322096aadb5e61f2605670e8fc25f2201d1efb64528c79e619336e2dc286d9e2361a897a5d4821b01efceecaceabf3da9f2d885aef9f0b69f1aca065645b20c2586ce45eaa1d03a2ca9fe4076be7fe3fc21151b9b1662d5fe80d7eb651872bfbf47a2927fef39e1a41ee747fc64ebe6135a864392abc686520ef065b21f96acbc113c4780f9c6a08507a38e0124a863e1d39b604142841eddac9a86bfce0ffeacbcd9ac20c738b1d46a30d448809f7020cb52758e75165ed990bd3c957a002f7477680156b50f842a31775a8156a00a6cc1a7d4dd885a40afd34b86cc25285ab88a90fc4fb1d6dffce91bd1b97529ab790b451b4ece28cd1975484b8b0129d44dc5ecd48d6e9e05595937e2927e5927e1dd24681db38daeea04349790a8d7f576314b52e73fabf313451e647b9a815c3c4ba3711d263c8ddcf05de391196a1bcb5fa966bd5f85fb411a03bed636382a08749501999aa1c0f3c981bfea27e599f6c582ac09444044fbe3b2d598434165e9c7d1408afb6a6c283a67ee97ee51f969a0b95fba99375d5f6327e51009bb993545b185aefe185512750c8fb72d05b28af311e844198650ceb4f0c257ea1cd7af35b2d7dfb1ba4726e199c3b04763eabeb554cfe513a1ae9d1b6ca66e996c179cb0d4d560e58a22c11897feed584c281b6b6bc7ea1fb5a2f9c71eae4b87ea8e7358799efd2aa0b600439e3087d5a32c1bfe1ba7517c75675ae3483b826c58dcdec4f3a6ebc369286e2d39c338c0c5c65a03997a2969fd52850ee47acf0ec81573b6d63f0a01f53d4f4b317fc14d218edf5174ec688f2d23e16e3781785035f8de89ab3815517ee3fae6d753281fc37b4c11ef32c77fb9d7d65ad811723959e77bd67bc7c4d0e2a1e822c69f0e05e164c7926f87150d167c4bf72704c9572c0bec32365859bb5fd66819798e2ad215e12ff39b9c278f3844ff00b5734e2710f1d3901ebcfea6ff84e196a055dacaa9dc2f41d822c719a35e661e2986389c2d873534f8f77baba9f3bd9d811eb605362838c90855cf37860f3a74a6992385bc3dfbb6dbbd1a6e3e935f944dde6c4b86973b5cf49a5625dc85203127e6c12755c3f76e73aa2c77db5f08081fddb5829bdd5446c65a6beb578359e587cb19d8db228801e8670283ba9d35d085b09fe759709014a315f0d0d1e2265b2ceae4eae8aa9a246cb3aa915c46a939a9c282923473becb6e2896b356c84d22d969d17137b558707a0cf6452ea3dc0af268ba5a2ec028b73962f770c3f5f6f69742399f522da06b138cad419ae36c99dab81e3362e75b85a8e3b7dfb6a0e07bd84fb462fc2e65c4f52536d9502c1e80c09fab23c107c7564c28014efbeb68947c38a91c2083a3f082532e2175cb98cdfcc1748a958727fe94b390b2f8f966d5729128719e6b7dea4eb753e79ca87437045db6293837311daf1fc690cefd584056a5c8792325dcee24c45c107cf376b9f4d82e250214895c3e58bdde26686a64ae8e7711aa289e291c374fe61e18abe1e465136600f69de3c9d286c836a464548ed1388a65dcc919a39040a196d225b49ba4c09806f498a5cbce302008a729e1652c2eeb7f0348b26249fbffdbc4f586e6023a973781b8e1eaa366f3a7b3a2c085b177726fa276fef63374ecae13412876589f5b1e217f25477c0bda658c51a42b4318442c4160f6bdce4526c3a197b7def05f77ee483054f7cca4f0a12686f69242d8f50b4cde332e10f8e3e0e41e3f238a4e8a80f8160387a75034adc1c2bfd2c628908671c95e56fe7ee0996112e053ad633e62ce5f098676368c2c8ba929ba4284c72b1bd74fdaadc6b615a093f8a6317062554277a510fbedff7ed30190403d744bac47597243ba0467d1d3f5eb736483ad39d2e1968edb7ed5e5489d428b07eadf93fcbd69a0e440b56b8648b222eb1cbf119129cdb409c61d26b7134dab6cdc266c0e631c4ff8460b8f00bf49cf1abecab8c34a0f1cce25438325ba7d420fdb15b9cf93a148ed372190ed94387115a8d0f30fc72a14f71446ced46e6e135b437805a845dbe8f21d68110eb60b66bde54cc7db0ccf2f54719bff10d46121b071872d36b8ba51fe11c3947d31896f5c9cf7c5240407a61581cce9e7dab5716d1990a82163399024f8eb281a5b9d77f1099b77d20762420ede258189eceb2018006f5cc883543ecd4f86b84b0c79b9556655cee2722377dbecb2a18e3500315f4da0f5f9430a083f2d53cb07a10e61b4b809d2c435ee35e47d0d5138b9688c9be62218b7bd304dd2c30b7e598f919041211316c51a5c7967750fa2b3d69f67eb643fe4fe8f4e92002a33109d611815c981de3ae55a91650dc66c63e9655dc8363c58e346ec66365ca4436c2f179ed26565dc0c47b35d73cfb56dc5f5321309b9900eadcc197aca5598ab28f4890a12e3f35a7cae5e11aa1922160f3af02b3795995450008d7f092b545d60e497ba635c47b918e628a36dc8e1c977473db73ad6defcaa3c22fa4b1af23fd02b00511e00b837c22756baa59bff5e7789be86e0804525dce8d8c530872591d72931cbeb7f8ffea78d2d8b20d3bde0bd4f31aebc825a6192ad25903460cfdd96bfbd688a7fd9ce991c0ccaa15873cb158dc773d48a454e7b9c228ceca4c5066e64191d15efda48e077b143a6846eff87177339d425084c3efe14f4fa301d9ab036bc8cd0d84db9826c93904a7fff9906223da1459a053e2584679e5b6965984059d4e8c25be3762bd4ed6b31b522898bf961a2a6cd34f9d8c9b15441c48510f41eb7650e1678b1afc799cd848072bf523c322466ef1a5f58efbaae19e014a126ce84bf45e6505217aa1f9a3d3e6ed7732b61d9ca4e720178ac87718094ea72a71b7fbecce3a7d20c715637e16f61c1144e9923ac5188cde018033fbcc304006d2d852544d5dd1d00e9b80819a22314a2ab8a637c6d06bd3560477f8932a7526dfec8910b498a1f9596b4cba5c63da9b571753ec5a41081f00c459cff9a43abd5712b3f74de15cd10730e649bbada56805b5f4925265f271173cbf000e61b173a93913c8f4a7ad73ea1118cc0e6f2bf28e546eddc1e7933b2c5669bdf67d3ba90a7309f660d93d8025b729d82c866c6d0f9c25184a87dfc2de9153b4e04b090d30b8b01e3c7e05bcef3162abbc6d437c4dabe1f4062566da03f162bddaeb3935cc35457fdf8cd4534a3712fabd05c889a9c1c5cf5724f43a9040055f6e181caf69aba444f201a7e592c0a0b413602b077d92e89686cf2559e15ec209d8a1a8ab5ad48ac179fbc056c3e39ad48ded9134b6d48bcbaee2a2d2d9e58c1236dff94094a65fdcfc4162f935e03a5487afc2e99aba60367da46344bb8910fe6a8060dd4c5c2834f8ddbd2a946b6eb38fef8cb2594080bcfba03f2a5f9383eebc14ca17fc2273ac8a51506b43f0eecc3ced6c8566c424dced9ac1d84544155fd90b4997ee65dd16db5ed124fbf9017f44322f948682b1519ab4c0f7424e86f4247ced53afa06e8415ee15e73ef3cbbbfacf447b856356f26fc141f49d3e8106ad951847e71578ef79e2bd8ca43cf50abcd37b9c59a7499e20326e2d99c41dc9911789ce26f74dea8d8e87b28866f420b196b0dc4683d61018429f3480a704bdfc65706cf3f4e2c9fe11e921d37e360a100397cc6f7d1bf9b21ff04e516dc439d6d700fd1d02c8ea31b3031c73d3895ff923572bf7b14203c31d59ecc2adf943a22eda33a095a72e71fac42a5a1e0826f48791a5c6df97ed4c84bcbeabc8663be3cff65e8aab94ce19cd704dc5e0151e11ee5ff4d0a35a397cf524a66fbbe882f7b1134b72f0d4d9748e941a4392ff72c2b4a6a1ae41523757e37ed1e854c8fb247ef086a63979fe33f785c828299841a1cae5f309a332c0e9075f2d23fdf4da1dac42edb4982c4a991c342c05b50b8f76d888a79b56f33ad60d1deae20efaeb87f87d860f629da9785db394e5c39c4950fe84996b4c0f98716d516643db1bd46cbba4e195f6a1128e1dfe8e66e353c02a40e1bd17d5e8e9ef64ecec13353b10f54a396301b5fcfa8687723b866368813f9e61a9bfe2d1200e25ed945d7932f77716d3c1d69bf634046b02ebad63620da4ce3658c5882c2efd9654a6881d27e0c89d32eb7951a011e80ddb7fa1459cf4287404ad32167742b0bb9f493352f34bfd0a2ff39a2f7f567bdfef5a87a90f6f32b99aad06d227517dd7d34fa4539069f22291f3fed6764b15140e133c570858ebb03049c727f5759f7221e55cab1854566ce2e1167c50bd123a73a31d12c930c78932a9b2d8741ae55af47a701b15e49abf70760c786cce98a83219e4e48e3e1eb68d0308c1b4375d3855f6e36bb7c1c63d513439d9d1248687548f590e9716a3b0362945ebe811d4d0129ccce7e900564287c9d390c462cbacf09029093ff8e471e6920a4a541c2df4b50cffa32cfa99c96c87a10ccd5fae95d776fa5199e48e28f21944acab0e77a39f8393b1205e72143a294ca8522a40e7b82724bf2738e45f6aa268944a5230d95b2ced667f72cc297122affb00a9f6b4d8131cbdb1ec6f553526a5dd324373d4cbb20780edb29e0cec3b43ae00994c41022e6eac7a85f084c757d295c4c3d0d1d3b9dba392eb27e20fbbf55bf50f420fc0e7c571c92942b561b28470b6cdb337e0e35f0695c1e2dbd5a49a86b1e9a97975380c708dd79841611eb85fb0c3b217791b6eade0b2bd0e3d333d82c0e72fe3017d1f7bad598bab315ad76c9aba2ce6b5788c4de9b4c2e59eebc27236822d09fc1852d7765fd9dee9221fc7ca9b6fe996d39e23f5c7f161f7f6f5a8f4cc7ae0899bcf9ced7cf81d62d8d4b0a53ecd00fb1b52162605a0320a870fe6bf3a2c75310566e6724a9e54d252ff3591418e2cd4cb5d60cf1d821dc26b57658fd0d9a314e18f56e8be112dd23004801b0ecfe348358c4fb4290242160cc19c1137ae76c07915698e9180d565b2c46fdcfe2fa0e88a4b968c4323237041a972a7add0ab5175ff7897bb602c8f42d16d9ea5cae259f439b8bcc73472a9fce104c632aca291678c6f75c77a7d89dc76c1d82fc17dc9198c9cd980fa2a355ff52faac6d8c12ab6727605cb63ee58045a33f75f5a51c95d2838cf03c66d8d47d72829acf49f8ad28b567eb03ef58f50c4378c1cdd22836d3367bb111f4955f69b8c956243a1027bb72c62137e7e6400b7aadf5205cfd66c07875db3ba49519bb1"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x3}], @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_REALM={0xe6, 0xfa, "c3975dee7fbdfdd59d59b38f68b0cdb6ac81bcc58faf1485bc5081877eb5733dd1e0caa3a75a438626334352f55b5bb96daa88da4ef9532a35c800a6bbffb15b179a1ce5e7c80d4973ce71a28dc5d9d6f3c5d8872bd73fdb7feb64e5d24e3e3dd2169459a3f576b1eba52c1c69984fd913473a06785599e87a2114d467b9cc8a775a2471c3ab37c60722ca04c18207f5baf27b98ac7b055905612cad72a94d6050423a6f1a388ecef26212b9271f12b88ef5dce3d582e9d82017608c149929d676213595535b8fddc03e545380680e554c50487abcbc702897df1f22bbb2a2827791"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x14, 0xf9, "e0e95eeca429074b6002127b9b1ca213"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "a97b259d0756"}], @NL80211_ATTR_IE={0x17, 0x2a, [@cf={0x4, 0x6, {0x80, 0xd2, 0x400, 0xff}}, @mesh_id={0x72, 0x6}, @dsss={0x3, 0x1, 0x155}]}, @NL80211_ATTR_IE={0x14, 0x2a, [@mesh_chsw={0x76, 0x6, {0x20, 0x8, 0x3, 0x810}}, @gcr_ga={0xbd, 0x6, @device_b}]}]}, 0x1260}, 0x1, 0x0, 0x0, 0x4000}, 0x400) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) (async) 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 38) [ 605.912847][T11869] [ 605.922481][T11875] macvtap7: entered allmulticast mode [ 605.928158][T11875] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 605.940845][T11875] team0: Device macvtap7 is already an upper device of the team interface 03:42:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x404, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x218, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 605.976093][T11884] macvtap65: entered allmulticast mode [ 605.984687][T11884] 8021q: adding VLAN 0 to HW filter on device macvtap65 [ 605.999752][T11879] ipvlan12: entered promiscuous mode [ 606.013219][T11879] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 606.044730][T11879] team0: Device ipvlan12 is already an upper device of the team interface [ 606.088576][T11892] FAULT_INJECTION: forcing a failure. [ 606.088576][T11892] name failslab, interval 1, probability 0, space 0, times 0 [ 606.101336][T11892] CPU: 1 PID: 11892 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 606.111798][T11892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 606.121926][T11892] Call Trace: [ 606.125223][T11892] [ 606.128220][T11892] dump_stack_lvl+0xda/0x130 [ 606.132863][T11892] dump_stack+0x15/0x20 [ 606.137082][T11892] should_fail_ex+0x21f/0x230 [ 606.141803][T11892] __should_failslab+0x92/0xa0 [ 606.146618][T11892] should_failslab+0x9/0x20 [ 606.151155][T11892] slab_pre_alloc_hook+0x38/0x180 [ 606.156252][T11892] kmem_cache_alloc+0x52/0x220 [ 606.161116][T11892] ? __kernfs_new_node+0x6a/0x380 [ 606.166180][T11892] __kernfs_new_node+0x6a/0x380 [ 606.171208][T11892] ? rb_insert_color+0x6a/0x290 [ 606.176078][T11892] ? up_write+0x30/0xe0 [ 606.180255][T11892] ? kernfs_activate+0x252/0x270 [ 606.185215][T11892] kernfs_new_node+0x5f/0xd0 [ 606.189830][T11892] __kernfs_create_file+0x49/0x180 [ 606.194973][T11892] ? dev_attr_show+0x90/0x90 [ 606.199631][T11892] sysfs_add_file_mode_ns+0x136/0x1b0 [ 606.205123][T11892] internal_create_group+0x2e4/0x800 [ 606.210430][T11892] sysfs_create_groups+0x3c/0xe0 [ 606.215386][T11892] device_add_attrs+0x69/0x400 [ 606.220274][T11892] ? kobject_put+0xd8/0x160 [ 606.224884][T11892] device_add+0x431/0x8b0 [ 606.229336][T11892] netdev_register_kobject+0xfc/0x230 [ 606.234786][T11892] register_netdevice+0x680/0xb40 [ 606.239935][T11892] ? rtnl_is_locked+0x15/0x20 [ 606.244713][T11892] ? netdev_rx_handler_register+0x11a/0x140 [ 606.250628][T11892] macvlan_common_newlink+0xa1b/0xbc0 [ 606.256048][T11892] macvtap_newlink+0xf6/0x150 [ 606.260749][T11892] ? macvtap_setup+0x30/0x30 [ 606.265358][T11892] rtnl_newlink+0xee5/0x1670 [ 606.270030][T11892] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 606.276332][T11892] ? _raw_spin_unlock+0x26/0x40 [ 606.281197][T11892] ? __mutex_lock+0x21c/0x8d0 [ 606.285914][T11892] ? rtnl_setlink+0x300/0x300 [ 606.290618][T11892] rtnetlink_rcv_msg+0x807/0x8c0 [ 606.295764][T11892] ? memcg_list_lru_alloc+0xd5/0x750 [ 606.301134][T11892] ? should_fail_ex+0x2d/0x230 [ 606.305975][T11892] ? slab_post_alloc_hook+0x8c/0x340 [ 606.311284][T11892] ? xas_load+0x3ae/0x3c0 [ 606.315751][T11892] ? skb_release_data+0x53d/0x550 [ 606.320824][T11892] ? kmem_cache_free+0x1db/0x3a0 [ 606.325779][T11892] ? __kfree_skb+0x104/0x140 [ 606.330491][T11892] ? nlmon_xmit+0x4b/0x60 [ 606.334894][T11892] ? __kfree_skb+0x104/0x140 [ 606.339538][T11892] ? consume_skb+0x57/0x180 [ 606.344059][T11892] ? nlmon_xmit+0x4b/0x60 [ 606.348433][T11892] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 606.353730][T11892] ? __dev_queue_xmit+0xad9/0x1e20 [ 606.358885][T11892] ? ref_tracker_free+0x3a1/0x400 [ 606.363949][T11892] netlink_rcv_skb+0x126/0x220 [ 606.368752][T11892] ? rtnetlink_bind+0x60/0x60 [ 606.373518][T11892] rtnetlink_rcv+0x1c/0x20 [ 606.377981][T11892] netlink_unicast+0x589/0x650 [ 606.382768][T11892] netlink_sendmsg+0x66e/0x770 [ 606.387552][T11892] ? netlink_getsockopt+0x3e0/0x3e0 [ 606.392772][T11892] ____sys_sendmsg+0x37c/0x4d0 [ 606.397626][T11892] __sys_sendmsg+0x1e9/0x270 [ 606.402348][T11892] __x64_sys_sendmsg+0x46/0x50 [ 606.407135][T11892] do_syscall_64+0x41/0xc0 [ 606.411604][T11892] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 606.417516][T11892] RIP: 0033:0x7f7514d76ae9 [ 606.422009][T11892] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 606.441625][T11892] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 606.450176][T11892] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 606.458170][T11892] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 606.466164][T11892] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 606.474155][T11892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 606.482149][T11892] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 606.490159][T11892] 03:42:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 39) [ 606.516361][T11894] ipvlan8: entered promiscuous mode 03:42:29 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="165055fd7dcb73bb31060e25f392f085082efa0ed7cf5af4ec968676e2aad2c920771a0db216100a42b022650d8d721ef1c17d4a47a806b788c2c7218a2e2ab09324e645c57b462b40259f23848cd2e55fa8f9a9679dca8d2ec896742545aa1b1ca0cc77b25ee8eb7595d6845a728d66986a9cc4ecd3b44ed91f3f74eeeefe28fefa6955a693a77bf24ed1934fb0123ebf5eedb7d6ff1db2fd145eb9c719d40e258a7a62bcfa96e27b8845d317a65e9633ee4e8245fa01a8d5172f7baa", @ANYRES16=r0, @ANYBLOB="08002bbd7000ffdbdf254300000096ff99000000000018000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000001}, 0x200008c4) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) r2 = socket$inet6(0xa, 0x4, 0x7) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000009c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4, 0x0, 0x2, 0x1, 0x7, 0x204}, 0x20) r6 = syz_open_procfs(0x0, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700), 0xffffffffffffffff) sendto$inet6(r5, &(0x7f0000000580)="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", 0xfe, 0x844, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f0000000040)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f00000017c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYBLOB="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", @ANYRESOCT=r5], 0x1c}}, 0x20008004) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="10092cbd7000fedbdf256b00000008000300", @ANYRES32=r12, @ANYBLOB="0c009900070000021100000100009451926f5ef9ad01eb908e16e6a979bddc3fb4daea664a15ea67fd806a2655cab952a933ddf8f5790054dcd749af5365d93d6501f3c151b46f7f572c970a21829fdd7a14b15ac0c0f63c649844152ee0ffa5cd4504cc7819d2d4493a162d70a0d42514670639"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x30, r3, 0x4, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r12}, @val={0xc, 0x99, {0x6, 0x60}}}}, [@NL80211_ATTR_FREQ_FIXED={0x4}, @NL80211_ATTR_FREQ_FIXED={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004811}, 0x1) recvmsg(r2, &(0x7f0000000740)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/8, 0x8}, {&(0x7f0000000580)=""/130, 0x82}, {&(0x7f0000000640)=""/73, 0x49}, {&(0x7f00000006c0)=""/54, 0x36}], 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) r14 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x8, &(0x7f00000000c0)=[{0x40, 0x20}, {0x80, 0x1, 0x1, 0x3d9}, {0x6c54, 0xfc, 0xa2, 0x2e46}, {0x2, 0x96, 0x2, 0x8}, {0xad2, 0x4, 0x81, 0x3ff}, {0x5, 0x1, 0x5, 0xfffffffa}, {0x0, 0x81, 0x1, 0x8}, {0x3ff, 0x4, 0x3, 0x4}]}) socket$inet6(0xa, 0x6, 0x3f) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)={[{0x2d, 'rdma'}, {0x2b, 'cpuacct'}, {0x2b, 'freezer'}, {0x2b, 'cpuset'}, {0x2b, 'blkio'}, {0x0, 'freezer'}, {0x2d, 'pids'}, {0x2b, 'freezer'}]}, 0x3f) splice(r1, &(0x7f0000000000)=0x6, r14, &(0x7f0000000300)=0x9c34, 0x2, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) r15 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800), 0x11d000, 0x0) splice(r13, &(0x7f00000007c0)=0x9, r15, &(0x7f0000000840)=0x5, 0xffffffffffffffff, 0x1) 03:42:29 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x55, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:29 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 606.553499][T11899] macvtap7: entered allmulticast mode [ 606.561531][T11899] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 606.571056][T11899] team0: Device macvtap7 is already an upper device of the team interface [ 606.622638][T11900] macvtap66: entered allmulticast mode [ 606.631937][T11900] 8021q: adding VLAN 0 to HW filter on device macvtap66 [ 606.647346][T11902] FAULT_INJECTION: forcing a failure. [ 606.647346][T11902] name failslab, interval 1, probability 0, space 0, times 0 [ 606.660019][T11902] CPU: 1 PID: 11902 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 03:42:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x219, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 606.670471][T11902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 606.680603][T11902] Call Trace: [ 606.683904][T11902] [ 606.686863][T11902] dump_stack_lvl+0xda/0x130 [ 606.691548][T11902] dump_stack+0x15/0x20 [ 606.695744][T11902] should_fail_ex+0x21f/0x230 [ 606.700475][T11902] __should_failslab+0x92/0xa0 [ 606.705315][T11902] should_failslab+0x9/0x20 [ 606.709858][T11902] slab_pre_alloc_hook+0x38/0x180 [ 606.714921][T11902] kmem_cache_alloc+0x52/0x220 [ 606.719742][T11902] ? __kernfs_new_node+0x6a/0x380 [ 606.724799][T11902] __kernfs_new_node+0x6a/0x380 [ 606.729715][T11902] ? rb_insert_color+0x263/0x290 [ 606.734671][T11902] ? up_write+0x30/0xe0 [ 606.738847][T11902] ? kernfs_activate+0x252/0x270 [ 606.743822][T11902] kernfs_new_node+0x5f/0xd0 [ 606.748544][T11902] __kernfs_create_file+0x49/0x180 [ 606.753764][T11902] ? dev_attr_show+0x90/0x90 [ 606.758378][T11902] sysfs_add_file_mode_ns+0x136/0x1b0 [ 606.763856][T11902] internal_create_group+0x2e4/0x800 [ 606.769165][T11902] sysfs_create_groups+0x3c/0xe0 [ 606.774139][T11902] device_add_attrs+0x69/0x400 [ 606.778943][T11902] ? kobject_put+0xd8/0x160 [ 606.783525][T11902] device_add+0x431/0x8b0 [ 606.787942][T11902] netdev_register_kobject+0xfc/0x230 [ 606.793325][T11902] register_netdevice+0x680/0xb40 [ 606.798374][T11902] ? rtnl_is_locked+0x15/0x20 [ 606.803121][T11902] ? netdev_rx_handler_register+0x11a/0x140 [ 606.809023][T11902] macvlan_common_newlink+0xa1b/0xbc0 [ 606.814555][T11902] macvtap_newlink+0xf6/0x150 [ 606.819252][T11902] ? macvtap_setup+0x30/0x30 [ 606.823866][T11902] rtnl_newlink+0xee5/0x1670 [ 606.828473][T11902] ? cgroup_rstat_updated+0x8c/0x1c0 [ 606.833783][T11902] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 606.840158][T11902] ? _raw_spin_unlock+0x26/0x40 [ 606.845101][T11902] ? __mutex_lock+0x21c/0x8d0 [ 606.849823][T11902] ? rtnl_setlink+0x300/0x300 [ 606.854617][T11902] rtnetlink_rcv_msg+0x807/0x8c0 [ 606.859595][T11902] ? memcg_list_lru_alloc+0xd5/0x750 [ 606.864994][T11902] ? should_fail_ex+0x2d/0x230 [ 606.869772][T11902] ? slab_post_alloc_hook+0x8c/0x340 [ 606.875064][T11902] ? xas_load+0x3ae/0x3c0 [ 606.879415][T11902] ? skb_release_data+0x53d/0x550 [ 606.884476][T11902] ? kmem_cache_free+0x1db/0x3a0 [ 606.889493][T11902] ? __kfree_skb+0x104/0x140 [ 606.894192][T11902] ? nlmon_xmit+0x4b/0x60 [ 606.898536][T11902] ? __kfree_skb+0x104/0x140 [ 606.903231][T11902] ? consume_skb+0x57/0x180 [ 606.907759][T11902] ? nlmon_xmit+0x4b/0x60 [ 606.912107][T11902] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 606.917422][T11902] ? __dev_queue_xmit+0xad9/0x1e20 [ 606.922587][T11902] ? ref_tracker_free+0x3a1/0x400 [ 606.927666][T11902] netlink_rcv_skb+0x126/0x220 [ 606.932486][T11902] ? rtnetlink_bind+0x60/0x60 [ 606.937181][T11902] rtnetlink_rcv+0x1c/0x20 [ 606.941685][T11902] netlink_unicast+0x589/0x650 [ 606.946487][T11902] netlink_sendmsg+0x66e/0x770 [ 606.951316][T11902] ? netlink_getsockopt+0x3e0/0x3e0 [ 606.956543][T11902] ____sys_sendmsg+0x37c/0x4d0 [ 606.961444][T11902] __sys_sendmsg+0x1e9/0x270 [ 606.966123][T11902] __x64_sys_sendmsg+0x46/0x50 [ 606.970960][T11902] do_syscall_64+0x41/0xc0 [ 606.975440][T11902] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 606.981344][T11902] RIP: 0033:0x7f7514d76ae9 [ 606.985766][T11902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 607.005458][T11902] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 607.013887][T11902] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 607.021865][T11902] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 607.029943][T11902] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 607.037924][T11902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 607.045982][T11902] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 607.053974][T11902] 03:42:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x406, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 40) 03:42:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 607.069813][T11906] ipvlan12: entered promiscuous mode [ 607.082613][T11906] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 607.092330][T11906] team0: Device ipvlan12 is already an upper device of the team interface [ 607.114835][T11910] ipvlan8: entered promiscuous mode 03:42:30 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x56, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 607.142592][T11913] macvtap67: entered allmulticast mode [ 607.154726][T11913] 8021q: adding VLAN 0 to HW filter on device macvtap67 [ 607.165043][T11921] FAULT_INJECTION: forcing a failure. [ 607.165043][T11921] name failslab, interval 1, probability 0, space 0, times 0 [ 607.177752][T11921] CPU: 0 PID: 11921 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 03:42:30 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="165055fd7dcb73bb31060e25f392f085082efa0ed7cf5af4ec968676e2aad2c920771a0db216100a42b022650d8d721ef1c17d4a47a806b788c2c7218a2e2ab09324e645c57b462b40259f23848cd2e55fa8f9a9679dca8d2ec896742545aa1b1ca0cc77b25ee8eb7595d6845a728d66986a9cc4ecd3b44ed91f3f74eeeefe28fefa6955a693a77bf24ed1934fb0123ebf5eedb7d6ff1db2fd145eb9c719d40e258a7a62bcfa96e27b8845d317a65e9633ee4e8245fa01a8d5172f7baa", @ANYRES16=r0, @ANYBLOB="08002bbd7000ffdbdf254300000096ff99000000000018000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000001}, 0x200008c4) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (async) r2 = socket$inet6(0xa, 0x4, 0x7) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) (async) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') (async) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000009c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4, 0x0, 0x2, 0x1, 0x7, 0x204}, 0x20) (async) r6 = syz_open_procfs(0x0, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700), 0xffffffffffffffff) sendto$inet6(r5, &(0x7f0000000580)="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", 0xfe, 0x844, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f0000000040)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f00000017c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYBLOB="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", @ANYRESOCT=r5], 0x1c}}, 0x20008004) r8 = socket$nl_generic(0x10, 0x3, 0x10) (async) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="10092cbd7000fedbdf256b00000008000300", @ANYRES32=r12, @ANYBLOB="0c009900070000021100000100009451926f5ef9ad01eb908e16e6a979bddc3fb4daea664a15ea67fd806a2655cab952a933ddf8f5790054dcd749af5365d93d6501f3c151b46f7f572c970a21829fdd7a14b15ac0c0f63c649844152ee0ffa5cd4504cc7819d2d4493a162d70a0d42514670639"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x30, r3, 0x4, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r12}, @val={0xc, 0x99, {0x6, 0x60}}}}, [@NL80211_ATTR_FREQ_FIXED={0x4}, @NL80211_ATTR_FREQ_FIXED={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004811}, 0x1) (async) recvmsg(r2, &(0x7f0000000740)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/8, 0x8}, {&(0x7f0000000580)=""/130, 0x82}, {&(0x7f0000000640)=""/73, 0x49}, {&(0x7f00000006c0)=""/54, 0x36}], 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async) r14 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x8, &(0x7f00000000c0)=[{0x40, 0x20}, {0x80, 0x1, 0x1, 0x3d9}, {0x6c54, 0xfc, 0xa2, 0x2e46}, {0x2, 0x96, 0x2, 0x8}, {0xad2, 0x4, 0x81, 0x3ff}, {0x5, 0x1, 0x5, 0xfffffffa}, {0x0, 0x81, 0x1, 0x8}, {0x3ff, 0x4, 0x3, 0x4}]}) socket$inet6(0xa, 0x6, 0x3f) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)={[{0x2d, 'rdma'}, {0x2b, 'cpuacct'}, {0x2b, 'freezer'}, {0x2b, 'cpuset'}, {0x2b, 'blkio'}, {0x0, 'freezer'}, {0x2d, 'pids'}, {0x2b, 'freezer'}]}, 0x3f) splice(r1, &(0x7f0000000000)=0x6, r14, &(0x7f0000000300)=0x9c34, 0x2, 0x6) (async) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) (async, rerun: 64) r15 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800), 0x11d000, 0x0) (rerun: 64) splice(r13, &(0x7f00000007c0)=0x9, r15, &(0x7f0000000840)=0x5, 0xffffffffffffffff, 0x1) 03:42:30 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 607.188275][T11921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 607.198398][T11921] Call Trace: [ 607.201697][T11921] [ 607.204645][T11921] dump_stack_lvl+0xda/0x130 [ 607.209290][T11921] dump_stack+0x15/0x20 [ 607.213502][T11921] should_fail_ex+0x21f/0x230 [ 607.218211][T11921] __should_failslab+0x92/0xa0 [ 607.223028][T11921] should_failslab+0x9/0x20 [ 607.227601][T11921] slab_pre_alloc_hook+0x38/0x180 [ 607.232769][T11921] kmem_cache_alloc+0x52/0x220 [ 607.237643][T11921] ? __kernfs_new_node+0x6a/0x380 [ 607.242717][T11921] __kernfs_new_node+0x6a/0x380 [ 607.247601][T11921] ? rb_insert_color+0x6a/0x290 [ 607.252596][T11921] ? up_write+0x30/0xe0 [ 607.256862][T11921] ? kernfs_activate+0x252/0x270 [ 607.261858][T11921] kernfs_new_node+0x5f/0xd0 [ 607.266482][T11921] __kernfs_create_file+0x49/0x180 [ 607.271688][T11921] ? dev_attr_show+0x90/0x90 [ 607.276308][T11921] sysfs_add_file_mode_ns+0x136/0x1b0 [ 607.281787][T11921] internal_create_group+0x2e4/0x800 [ 607.287097][T11921] sysfs_create_groups+0x3c/0xe0 [ 607.292127][T11921] device_add_attrs+0x69/0x400 [ 607.296950][T11921] ? kobject_put+0xd8/0x160 [ 607.301490][T11921] device_add+0x431/0x8b0 [ 607.305864][T11921] netdev_register_kobject+0xfc/0x230 [ 607.311317][T11921] register_netdevice+0x680/0xb40 [ 607.316425][T11921] ? rtnl_is_locked+0x15/0x20 [ 607.321191][T11921] ? netdev_rx_handler_register+0x11a/0x140 [ 607.327132][T11921] macvlan_common_newlink+0xa1b/0xbc0 [ 607.332530][T11921] macvtap_newlink+0xf6/0x150 [ 607.337321][T11921] ? macvtap_setup+0x30/0x30 [ 607.342036][T11921] rtnl_newlink+0xee5/0x1670 [ 607.346682][T11921] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 607.352975][T11921] ? _raw_spin_unlock+0x26/0x40 [ 607.357859][T11921] ? __mutex_lock+0x21c/0x8d0 [ 607.362635][T11921] ? rtnl_setlink+0x300/0x300 [ 607.367361][T11921] rtnetlink_rcv_msg+0x807/0x8c0 [ 607.372361][T11921] ? memcg_list_lru_alloc+0xd5/0x750 [ 607.377684][T11921] ? security_inode_alloc+0x32/0xd0 [ 607.382936][T11921] ? slab_post_alloc_hook+0x8c/0x340 [ 607.388335][T11921] ? try_charge_memcg+0xb49/0xd30 [ 607.393479][T11921] ? _raw_spin_lock_irqsave+0x3c/0xa0 [ 607.398878][T11921] ? skb_release_data+0x53d/0x550 [ 607.404050][T11921] ? kmem_cache_free+0x1db/0x3a0 [ 607.409014][T11921] ? __kfree_skb+0x104/0x140 [ 607.413698][T11921] ? nlmon_xmit+0x4b/0x60 [ 607.418055][T11921] ? __kfree_skb+0x104/0x140 [ 607.422773][T11921] ? consume_skb+0x57/0x180 [ 607.427297][T11921] ? nlmon_xmit+0x4b/0x60 [ 607.431732][T11921] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 607.437046][T11921] ? __dev_queue_xmit+0xad9/0x1e20 [ 607.442206][T11921] ? ref_tracker_free+0x3a1/0x400 [ 607.447241][T11921] netlink_rcv_skb+0x126/0x220 [ 607.452137][T11921] ? rtnetlink_bind+0x60/0x60 [ 607.456898][T11921] rtnetlink_rcv+0x1c/0x20 [ 607.461330][T11921] netlink_unicast+0x589/0x650 [ 607.466169][T11921] netlink_sendmsg+0x66e/0x770 [ 607.470992][T11921] ? netlink_getsockopt+0x3e0/0x3e0 [ 607.476278][T11921] ____sys_sendmsg+0x37c/0x4d0 [ 607.481072][T11921] __sys_sendmsg+0x1e9/0x270 [ 607.485727][T11921] __x64_sys_sendmsg+0x46/0x50 [ 607.490594][T11921] do_syscall_64+0x41/0xc0 [ 607.495133][T11921] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 607.501121][T11921] RIP: 0033:0x7f7514d76ae9 [ 607.505549][T11921] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 607.525247][T11921] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 607.533679][T11921] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 607.541649][T11921] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 607.549705][T11921] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 607.557728][T11921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 607.565800][T11921] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 607.573822][T11921] [ 607.587851][T11923] macvtap7: entered allmulticast mode 03:42:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x229, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 41) [ 607.593435][T11923] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 607.609319][T11923] team0: Device macvtap7 is already an upper device of the team interface [ 607.633295][T11925] ipvlan12: entered promiscuous mode 03:42:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x408, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x40a, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:30 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="165055fd7dcb73bb31060e25f392f085082efa0ed7cf5af4ec968676e2aad2c920771a0db216100a42b022650d8d721ef1c17d4a47a806b788c2c7218a2e2ab09324e645c57b462b40259f23848cd2e55fa8f9a9679dca8d2ec896742545aa1b1ca0cc77b25ee8eb7595d6845a728d66986a9cc4ecd3b44ed91f3f74eeeefe28fefa6955a693a77bf24ed1934fb0123ebf5eedb7d6ff1db2fd145eb9c719d40e258a7a62bcfa96e27b8845d317a65e9633ee4e8245fa01a8d5172f7baa", @ANYRES16=r0, @ANYBLOB="08002bbd7000ffdbdf254300000096ff99000000000018000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000001}, 0x200008c4) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="165055fd7dcb73bb31060e25f392f085082efa0ed7cf5af4ec968676e2aad2c920771a0db216100a42b022650d8d721ef1c17d4a47a806b788c2c7218a2e2ab09324e645c57b462b40259f23848cd2e55fa8f9a9679dca8d2ec896742545aa1b1ca0cc77b25ee8eb7595d6845a728d66986a9cc4ecd3b44ed91f3f74eeeefe28fefa6955a693a77bf24ed1934fb0123ebf5eedb7d6ff1db2fd145eb9c719d40e258a7a62bcfa96e27b8845d317a65e9633ee4e8245fa01a8d5172f7baa", @ANYRES16=r0, @ANYBLOB="08002bbd7000ffdbdf254300000096ff99000000000018000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000001}, 0x200008c4) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) r2 = socket$inet6(0xa, 0x4, 0x7) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') (async) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000009c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4, 0x0, 0x2, 0x1, 0x7, 0x204}, 0x20) r6 = syz_open_procfs(0x0, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001700), 0xffffffffffffffff) sendto$inet6(r5, &(0x7f0000000580)="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", 0xfe, 0x844, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) (async) sendto$inet6(r5, &(0x7f0000000580)="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", 0xfe, 0x844, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f0000000040)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f00000017c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYBLOB="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", @ANYRESOCT=r5], 0x1c}}, 0x20008004) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f0000000040)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001780)={&(0x7f00000017c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYBLOB="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", @ANYRESOCT=r5], 0x1c}}, 0x20008004) r8 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) (async) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x34}}, 0x0) (async) sendmsg$NL80211_CMD_SET_STATION(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="10092cbd7000fedbdf256b00000008000300", @ANYRES32=r12, @ANYBLOB="0c009900070000021100000100009451926f5ef9ad01eb908e16e6a979bddc3fb4daea664a15ea67fd806a2655cab952a933ddf8f5790054dcd749af5365d93d6501f3c151b46f7f572c970a21829fdd7a14b15ac0c0f63c649844152ee0ffa5cd4504cc7819d2d4493a162d70a0d42514670639"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)={0x30, r3, 0x4, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r12}, @val={0xc, 0x99, {0x6, 0x60}}}}, [@NL80211_ATTR_FREQ_FIXED={0x4}, @NL80211_ATTR_FREQ_FIXED={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004811}, 0x1) recvmsg(r2, &(0x7f0000000740)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/8, 0x8}, {&(0x7f0000000580)=""/130, 0x82}, {&(0x7f0000000640)=""/73, 0x49}, {&(0x7f00000006c0)=""/54, 0x36}], 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) r14 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x8, &(0x7f00000000c0)=[{0x40, 0x20}, {0x80, 0x1, 0x1, 0x3d9}, {0x6c54, 0xfc, 0xa2, 0x2e46}, {0x2, 0x96, 0x2, 0x8}, {0xad2, 0x4, 0x81, 0x3ff}, {0x5, 0x1, 0x5, 0xfffffffa}, {0x0, 0x81, 0x1, 0x8}, {0x3ff, 0x4, 0x3, 0x4}]}) socket$inet6(0xa, 0x6, 0x3f) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000780)={[{0x2d, 'rdma'}, {0x2b, 'cpuacct'}, {0x2b, 'freezer'}, {0x2b, 'cpuset'}, {0x2b, 'blkio'}, {0x0, 'freezer'}, {0x2d, 'pids'}, {0x2b, 'freezer'}]}, 0x3f) splice(r1, &(0x7f0000000000)=0x6, r14, &(0x7f0000000300)=0x9c34, 0x2, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) (async) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, 0x10) r15 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000800), 0x11d000, 0x0) splice(r13, &(0x7f00000007c0)=0x9, r15, &(0x7f0000000840)=0x5, 0xffffffffffffffff, 0x1) (async) splice(r13, &(0x7f00000007c0)=0x9, r15, &(0x7f0000000840)=0x5, 0xffffffffffffffff, 0x1) [ 607.640042][T11925] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 607.648863][T11925] team0: Device ipvlan12 is already an upper device of the team interface [ 607.679542][T11930] ipvlan8: entered promiscuous mode 03:42:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x40b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 607.725923][T11941] macvtap68: entered allmulticast mode [ 607.749217][T11941] 8021q: adding VLAN 0 to HW filter on device macvtap68 [ 607.761149][T11942] FAULT_INJECTION: forcing a failure. [ 607.761149][T11942] name failslab, interval 1, probability 0, space 0, times 0 [ 607.773960][T11942] CPU: 1 PID: 11942 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 607.784404][T11942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 607.794532][T11942] Call Trace: [ 607.797834][T11942] [ 607.800824][T11942] dump_stack_lvl+0xda/0x130 [ 607.805517][T11942] dump_stack+0x15/0x20 [ 607.809693][T11942] should_fail_ex+0x21f/0x230 [ 607.814376][T11942] __should_failslab+0x92/0xa0 [ 607.819217][T11942] should_failslab+0x9/0x20 [ 607.823789][T11942] slab_pre_alloc_hook+0x38/0x180 [ 607.828824][T11942] kmem_cache_alloc+0x52/0x220 [ 607.833660][T11942] ? __kernfs_new_node+0x6a/0x380 [ 607.838712][T11942] __kernfs_new_node+0x6a/0x380 [ 607.843606][T11942] ? rb_insert_color+0x263/0x290 [ 607.848681][T11942] ? up_write+0x30/0xe0 [ 607.852888][T11942] ? kernfs_activate+0x252/0x270 [ 607.857905][T11942] kernfs_new_node+0x5f/0xd0 [ 607.862528][T11942] __kernfs_create_file+0x49/0x180 [ 607.867719][T11942] ? dev_attr_show+0x90/0x90 [ 607.872409][T11942] sysfs_add_file_mode_ns+0x136/0x1b0 [ 607.877856][T11942] internal_create_group+0x2e4/0x800 [ 607.883245][T11942] sysfs_create_groups+0x3c/0xe0 [ 607.888291][T11942] device_add_attrs+0x69/0x400 [ 607.893067][T11942] ? kobject_put+0xd8/0x160 [ 607.897592][T11942] device_add+0x431/0x8b0 [ 607.901951][T11942] netdev_register_kobject+0xfc/0x230 [ 607.907353][T11942] register_netdevice+0x680/0xb40 [ 607.912396][T11942] ? rtnl_is_locked+0x15/0x20 [ 607.917080][T11942] ? netdev_rx_handler_register+0x11a/0x140 [ 607.923099][T11942] macvlan_common_newlink+0xa1b/0xbc0 [ 607.928492][T11942] macvtap_newlink+0xf6/0x150 [ 607.933287][T11942] ? macvtap_setup+0x30/0x30 [ 607.937903][T11942] rtnl_newlink+0xee5/0x1670 [ 607.942545][T11942] ? cgroup_rstat_updated+0x8c/0x1c0 [ 607.947869][T11942] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 607.954197][T11942] ? _raw_spin_unlock+0x26/0x40 [ 607.959147][T11942] ? __mutex_lock+0x21c/0x8d0 [ 607.963934][T11942] ? rtnl_setlink+0x300/0x300 [ 607.968652][T11942] rtnetlink_rcv_msg+0x807/0x8c0 [ 607.973684][T11942] ? memcg_list_lru_alloc+0xd5/0x750 [ 607.978989][T11942] ? security_inode_alloc+0x32/0xd0 [ 607.984262][T11942] ? slab_post_alloc_hook+0x8c/0x340 [ 607.989562][T11942] ? xas_load+0x3ae/0x3c0 [ 607.993893][T11942] ? skb_release_data+0x53d/0x550 [ 607.998980][T11942] ? kmem_cache_free+0x1db/0x3a0 [ 608.003931][T11942] ? __kfree_skb+0x104/0x140 [ 608.008684][T11942] ? nlmon_xmit+0x4b/0x60 [ 608.013021][T11942] ? __kfree_skb+0x104/0x140 [ 608.017686][T11942] ? consume_skb+0x57/0x180 [ 608.022196][T11942] ? nlmon_xmit+0x4b/0x60 [ 608.026615][T11942] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 608.032000][T11942] ? __dev_queue_xmit+0xad9/0x1e20 [ 608.037118][T11942] ? ref_tracker_free+0x3a1/0x400 [ 608.042176][T11942] netlink_rcv_skb+0x126/0x220 [ 608.046969][T11942] ? rtnetlink_bind+0x60/0x60 [ 608.051731][T11942] rtnetlink_rcv+0x1c/0x20 [ 608.056176][T11942] netlink_unicast+0x589/0x650 [ 608.060995][T11942] netlink_sendmsg+0x66e/0x770 [ 608.065804][T11942] ? netlink_getsockopt+0x3e0/0x3e0 [ 608.071048][T11942] ____sys_sendmsg+0x37c/0x4d0 [ 608.075909][T11942] __sys_sendmsg+0x1e9/0x270 [ 608.080538][T11942] __x64_sys_sendmsg+0x46/0x50 [ 608.085379][T11942] do_syscall_64+0x41/0xc0 [ 608.089830][T11942] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 608.095751][T11942] RIP: 0033:0x7f7514d76ae9 [ 608.100179][T11942] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 03:42:31 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x253, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 608.119882][T11942] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 608.128324][T11942] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 608.136306][T11942] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 608.144359][T11942] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 608.152344][T11942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 608.160317][T11942] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 608.168314][T11942] 03:42:31 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x5c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 42) 03:42:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000000000001ccad1a5d6471abb26772544054b6702b910385d77aa98dea5509dcfbc58b3521c3e4071089c21a8fa50c16bbc1e05c1a0750d7829a69a3b1d7867096024b85f4ee43f2abacd3bcddfd427af8c6ea162aab76a2253514196"]) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 608.192987][T11952] macvtap7: entered allmulticast mode [ 608.211278][T11952] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 608.223334][T11952] team0: Device macvtap7 is already an upper device of the team interface 03:42:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000000000001ccad1a5d6471abb26772544054b6702b910385d77aa98dea5509dcfbc58b3521c3e4071089c21a8fa50c16bbc1e05c1a0750d7829a69a3b1d7867096024b85f4ee43f2abacd3bcddfd427af8c6ea162aab76a2253514196"]) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 608.256527][T11961] ipvlan8: entered promiscuous mode 03:42:31 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000000000001ccad1a5d6471abb26772544054b6702b910385d77aa98dea5509dcfbc58b3521c3e4071089c21a8fa50c16bbc1e05c1a0750d7829a69a3b1d7867096024b85f4ee43f2abacd3bcddfd427af8c6ea162aab76a2253514196"]) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x40c, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0010780000000008000000054716005c00650000e82f9078ac1414aa64010101441444d0000000005be7d6d50000800000000005441c4f90000000010000daf440958200200000000700000005000000f9ffffff3f0000000076be20e04574070bbf0a010102ac1414aa000000"]}) 03:42:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 608.288093][T11965] ipvlan12: entered promiscuous mode [ 608.297114][T11965] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 608.306123][T11965] team0: Device ipvlan12 is already an upper device of the team interface [ 608.352132][T11963] macvtap69: entered allmulticast mode [ 608.362126][T11963] 8021q: adding VLAN 0 to HW filter on device macvtap69 [ 608.372567][T11967] FAULT_INJECTION: forcing a failure. [ 608.372567][T11967] name failslab, interval 1, probability 0, space 0, times 0 [ 608.385290][T11967] CPU: 0 PID: 11967 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 608.395754][T11967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 608.405817][T11967] Call Trace: [ 608.409102][T11967] [ 608.412039][T11967] dump_stack_lvl+0xda/0x130 [ 608.416742][T11967] dump_stack+0x15/0x20 [ 608.420924][T11967] should_fail_ex+0x21f/0x230 [ 608.425616][T11967] __should_failslab+0x92/0xa0 [ 608.430400][T11967] should_failslab+0x9/0x20 [ 608.434956][T11967] slab_pre_alloc_hook+0x38/0x180 [ 608.439997][T11967] kmem_cache_alloc+0x52/0x220 [ 608.444805][T11967] ? __kernfs_new_node+0x6a/0x380 [ 608.449864][T11967] __kernfs_new_node+0x6a/0x380 [ 608.454808][T11967] ? rb_insert_color+0x6a/0x290 [ 608.459674][T11967] ? up_write+0x30/0xe0 [ 608.463852][T11967] ? kernfs_activate+0x252/0x270 [ 608.468809][T11967] kernfs_new_node+0x5f/0xd0 [ 608.473493][T11967] __kernfs_create_file+0x49/0x180 [ 608.478631][T11967] ? dev_attr_show+0x90/0x90 [ 608.483241][T11967] sysfs_add_file_mode_ns+0x136/0x1b0 [ 608.488637][T11967] internal_create_group+0x2e4/0x800 [ 608.494007][T11967] sysfs_create_groups+0x3c/0xe0 [ 608.498960][T11967] device_add_attrs+0x69/0x400 [ 608.503745][T11967] ? kobject_put+0xd8/0x160 [ 608.508306][T11967] device_add+0x431/0x8b0 [ 608.512696][T11967] netdev_register_kobject+0xfc/0x230 [ 608.518090][T11967] register_netdevice+0x680/0xb40 [ 608.523134][T11967] ? rtnl_is_locked+0x15/0x20 [ 608.527830][T11967] ? netdev_rx_handler_register+0x11a/0x140 [ 608.533740][T11967] macvlan_common_newlink+0xa1b/0xbc0 [ 608.539125][T11967] macvtap_newlink+0xf6/0x150 [ 608.543866][T11967] ? macvtap_setup+0x30/0x30 [ 608.548467][T11967] rtnl_newlink+0xee5/0x1670 [ 608.553097][T11967] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 608.559364][T11967] ? _raw_spin_unlock+0x26/0x40 [ 608.564230][T11967] ? __mutex_lock+0x21c/0x8d0 [ 608.568974][T11967] ? rtnl_setlink+0x300/0x300 [ 608.573666][T11967] rtnetlink_rcv_msg+0x807/0x8c0 [ 608.578623][T11967] ? memcg_list_lru_alloc+0xd5/0x750 [ 608.583993][T11967] ? should_fail_ex+0x2d/0x230 [ 608.588775][T11967] ? page_counter_try_charge+0x260/0x290 [ 608.594482][T11967] ? __refill_stock+0x7f/0xb0 [ 608.599194][T11967] ? try_charge_memcg+0xaff/0xd30 [ 608.604237][T11967] ? skb_release_data+0x53d/0x550 [ 608.609284][T11967] ? kmem_cache_free+0x1db/0x3a0 [ 608.614237][T11967] ? __kfree_skb+0x104/0x140 [ 608.618845][T11967] ? nlmon_xmit+0x4b/0x60 [ 608.623198][T11967] ? __kfree_skb+0x104/0x140 [ 608.627809][T11967] ? consume_skb+0x57/0x180 [ 608.632406][T11967] ? nlmon_xmit+0x4b/0x60 [ 608.636802][T11967] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 608.642166][T11967] ? __dev_queue_xmit+0xad9/0x1e20 [ 608.647333][T11967] ? ref_tracker_free+0x3a1/0x400 [ 608.652395][T11967] ? __skb_clone+0x5d/0x2f0 [ 608.656950][T11967] netlink_rcv_skb+0x126/0x220 [ 608.661758][T11967] ? rtnetlink_bind+0x60/0x60 [ 608.666461][T11967] rtnetlink_rcv+0x1c/0x20 [ 608.670934][T11967] netlink_unicast+0x589/0x650 [ 608.675723][T11967] netlink_sendmsg+0x66e/0x770 [ 608.680554][T11967] ? netlink_getsockopt+0x3e0/0x3e0 [ 608.685775][T11967] ____sys_sendmsg+0x37c/0x4d0 [ 608.690567][T11967] __sys_sendmsg+0x1e9/0x270 [ 608.695206][T11967] __x64_sys_sendmsg+0x46/0x50 [ 608.700096][T11967] do_syscall_64+0x41/0xc0 [ 608.704545][T11967] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 608.710456][T11967] RIP: 0033:0x7f7514d76ae9 [ 608.714896][T11967] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 608.734514][T11967] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 608.742988][T11967] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 608.750965][T11967] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 608.758943][T11967] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 608.766919][T11967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 608.774896][T11967] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 608.782929][T11967] [ 608.797692][T11980] macvtap7: entered allmulticast mode 03:42:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0010780000000008000000054716005c00650000e82f9078ac1414aa64010101441444d0000000005be7d6d50000800000000005441c4f90000000010000daf440958200200000000700000005000000f9ffffff3f0000000076be20e04574070bbf0a010102ac1414aa000000"]}) 03:42:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x26e, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:31 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x69, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 43) 03:42:31 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 608.803285][T11980] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 608.818659][T11980] team0: Device macvtap7 is already an upper device of the team interface [ 608.875170][T11983] macvtap70: entered allmulticast mode [ 608.883596][T11983] 8021q: adding VLAN 0 to HW filter on device macvtap70 [ 608.893840][T11986] FAULT_INJECTION: forcing a failure. [ 608.893840][T11986] name failslab, interval 1, probability 0, space 0, times 0 [ 608.906594][T11986] CPU: 1 PID: 11986 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 608.917031][T11986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 608.927113][T11986] Call Trace: [ 608.930413][T11986] [ 608.933387][T11986] dump_stack_lvl+0xda/0x130 [ 608.938009][T11986] dump_stack+0x15/0x20 [ 608.942197][T11986] should_fail_ex+0x21f/0x230 [ 608.946983][T11986] __should_failslab+0x92/0xa0 [ 608.951756][T11986] should_failslab+0x9/0x20 [ 608.956301][T11986] slab_pre_alloc_hook+0x38/0x180 [ 608.961331][T11986] kmem_cache_alloc+0x52/0x220 [ 608.966193][T11986] ? __kernfs_new_node+0x6a/0x380 [ 608.971273][T11986] __kernfs_new_node+0x6a/0x380 [ 608.976213][T11986] ? rb_insert_color+0x6a/0x290 [ 608.981157][T11986] ? up_write+0x30/0xe0 [ 608.985411][T11986] ? kernfs_activate+0x252/0x270 [ 608.990394][T11986] kernfs_new_node+0x5f/0xd0 [ 608.995014][T11986] __kernfs_create_file+0x49/0x180 [ 609.000165][T11986] ? dev_attr_show+0x90/0x90 [ 609.004770][T11986] sysfs_add_file_mode_ns+0x136/0x1b0 [ 609.010212][T11986] internal_create_group+0x2e4/0x800 [ 609.015548][T11986] sysfs_create_groups+0x3c/0xe0 [ 609.020505][T11986] device_add_attrs+0x69/0x400 [ 609.025344][T11986] ? kobject_put+0xd8/0x160 [ 609.029924][T11986] device_add+0x431/0x8b0 [ 609.034274][T11986] netdev_register_kobject+0xfc/0x230 [ 609.039742][T11986] register_netdevice+0x680/0xb40 [ 609.044849][T11986] ? rtnl_is_locked+0x15/0x20 [ 609.049554][T11986] ? netdev_rx_handler_register+0x11a/0x140 [ 609.055477][T11986] macvlan_common_newlink+0xa1b/0xbc0 [ 609.060859][T11986] macvtap_newlink+0xf6/0x150 [ 609.065549][T11986] ? macvtap_setup+0x30/0x30 [ 609.070283][T11986] rtnl_newlink+0xee5/0x1670 [ 609.074961][T11986] ? cgroup_rstat_updated+0x8c/0x1c0 [ 609.080314][T11986] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 609.086668][T11986] ? _raw_spin_unlock+0x26/0x40 [ 609.091529][T11986] ? __mutex_lock+0x21c/0x8d0 [ 609.096272][T11986] ? rtnl_setlink+0x300/0x300 [ 609.101028][T11986] rtnetlink_rcv_msg+0x807/0x8c0 [ 609.105977][T11986] ? should_fail_ex+0x2d/0x230 [ 609.110831][T11986] ? slab_post_alloc_hook+0x8c/0x340 [ 609.116168][T11986] ? xas_load+0x3ae/0x3c0 [ 609.120514][T11986] ? skb_release_data+0x53d/0x550 [ 609.125585][T11986] ? kmem_cache_free+0x1db/0x3a0 [ 609.130620][T11986] ? __kfree_skb+0x104/0x140 [ 609.135222][T11986] ? nlmon_xmit+0x4b/0x60 [ 609.139574][T11986] ? __kfree_skb+0x104/0x140 [ 609.144217][T11986] ? consume_skb+0x57/0x180 [ 609.148807][T11986] ? nlmon_xmit+0x4b/0x60 [ 609.153259][T11986] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 609.158581][T11986] ? __dev_queue_xmit+0xad9/0x1e20 [ 609.163701][T11986] ? ref_tracker_free+0x3a1/0x400 [ 609.168811][T11986] netlink_rcv_skb+0x126/0x220 [ 609.173589][T11986] ? rtnetlink_bind+0x60/0x60 [ 609.178358][T11986] rtnetlink_rcv+0x1c/0x20 [ 609.182813][T11986] netlink_unicast+0x589/0x650 [ 609.187623][T11986] netlink_sendmsg+0x66e/0x770 [ 609.192405][T11986] ? netlink_getsockopt+0x3e0/0x3e0 [ 609.197623][T11986] ____sys_sendmsg+0x37c/0x4d0 [ 609.202414][T11986] __sys_sendmsg+0x1e9/0x270 [ 609.207123][T11986] __x64_sys_sendmsg+0x46/0x50 [ 609.211902][T11986] do_syscall_64+0x41/0xc0 [ 609.216342][T11986] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 609.222288][T11986] RIP: 0033:0x7f7514d76ae9 [ 609.226729][T11986] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 609.246467][T11986] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 609.254890][T11986] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 609.262875][T11986] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 03:42:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x26f, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x40f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 44) 03:42:32 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0010780000000008000000054716005c00650000e82f9078ac1414aa64010101441444d0000000005be7d6d50000800000000005441c4f90000000010000daf440958200200000000700000005000000f9ffffff3f0000000076be20e04574070bbf0a010102ac1414aa000000"]}) [ 609.270854][T11986] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 609.278828][T11986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 609.286810][T11986] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 609.294800][T11986] [ 609.308395][T11989] ipvlan8: entered promiscuous mode 03:42:32 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 609.353096][T11991] ipvlan12: entered promiscuous mode [ 609.360058][T11991] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 609.369460][T11991] team0: Device ipvlan12 is already an upper device of the team interface [ 609.402583][T11993] macvtap71: entered allmulticast mode [ 609.413190][T11993] 8021q: adding VLAN 0 to HW filter on device macvtap71 [ 609.423237][T11997] FAULT_INJECTION: forcing a failure. [ 609.423237][T11997] name failslab, interval 1, probability 0, space 0, times 0 [ 609.436006][T11997] CPU: 0 PID: 11997 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 609.446442][T11997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 609.446460][T11997] Call Trace: [ 609.446469][T11997] [ 609.446477][T11997] dump_stack_lvl+0xda/0x130 [ 609.467408][T11997] dump_stack+0x15/0x20 [ 609.471601][T11997] should_fail_ex+0x21f/0x230 [ 609.476382][T11997] __should_failslab+0x92/0xa0 [ 609.481253][T11997] should_failslab+0x9/0x20 [ 609.485829][T11997] slab_pre_alloc_hook+0x38/0x180 [ 609.490877][T11997] kmem_cache_alloc+0x52/0x220 [ 609.495647][T11997] ? __kernfs_new_node+0x6a/0x380 [ 609.500715][T11997] __kernfs_new_node+0x6a/0x380 [ 609.505610][T11997] ? rb_insert_color+0x6a/0x290 [ 609.510516][T11997] ? up_write+0x30/0xe0 [ 609.514764][T11997] ? kernfs_activate+0x252/0x270 [ 609.519802][T11997] kernfs_new_node+0x5f/0xd0 [ 609.524406][T11997] __kernfs_create_file+0x49/0x180 [ 609.529715][T11997] ? dev_attr_show+0x90/0x90 [ 609.534310][T11997] sysfs_add_file_mode_ns+0x136/0x1b0 [ 609.539763][T11997] internal_create_group+0x2e4/0x800 [ 609.545105][T11997] sysfs_create_groups+0x3c/0xe0 [ 609.550073][T11997] device_add_attrs+0x69/0x400 [ 609.554882][T11997] ? kobject_put+0xd8/0x160 [ 609.559567][T11997] device_add+0x431/0x8b0 [ 609.563964][T11997] netdev_register_kobject+0xfc/0x230 [ 609.569394][T11997] register_netdevice+0x680/0xb40 [ 609.574436][T11997] ? rtnl_is_locked+0x15/0x20 [ 609.579204][T11997] ? netdev_rx_handler_register+0x11a/0x140 [ 609.585122][T11997] macvlan_common_newlink+0xa1b/0xbc0 [ 609.590500][T11997] macvtap_newlink+0xf6/0x150 [ 609.595218][T11997] ? macvtap_setup+0x30/0x30 [ 609.599829][T11997] rtnl_newlink+0xee5/0x1670 [ 609.604485][T11997] ? cgroup_rstat_updated+0x8c/0x1c0 [ 609.609835][T11997] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 609.616103][T11997] ? _raw_spin_unlock+0x26/0x40 [ 609.620981][T11997] ? __mutex_lock+0x21c/0x8d0 [ 609.625752][T11997] ? rtnl_setlink+0x300/0x300 [ 609.630588][T11997] rtnetlink_rcv_msg+0x807/0x8c0 [ 609.635633][T11997] ? memcg_list_lru_alloc+0xd5/0x750 [ 609.641028][T11997] ? should_fail_ex+0x2d/0x230 [ 609.645837][T11997] ? slab_post_alloc_hook+0x8c/0x340 [ 609.651207][T11997] ? xas_load+0x3ae/0x3c0 [ 609.655543][T11997] ? skb_release_data+0x53d/0x550 [ 609.660602][T11997] ? kmem_cache_free+0x1db/0x3a0 [ 609.665634][T11997] ? __kfree_skb+0x104/0x140 [ 609.670282][T11997] ? nlmon_xmit+0x4b/0x60 [ 609.674625][T11997] ? __kfree_skb+0x104/0x140 [ 609.679243][T11997] ? consume_skb+0x57/0x180 [ 609.683770][T11997] ? nlmon_xmit+0x4b/0x60 [ 609.688104][T11997] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 609.693517][T11997] ? __dev_queue_xmit+0xad9/0x1e20 [ 609.698704][T11997] ? ref_tracker_free+0x3a1/0x400 [ 609.703757][T11997] netlink_rcv_skb+0x126/0x220 [ 609.708534][T11997] ? rtnetlink_bind+0x60/0x60 [ 609.713287][T11997] rtnetlink_rcv+0x1c/0x20 [ 609.717744][T11997] netlink_unicast+0x589/0x650 [ 609.722648][T11997] netlink_sendmsg+0x66e/0x770 [ 609.727458][T11997] ? netlink_getsockopt+0x3e0/0x3e0 [ 609.732726][T11997] ____sys_sendmsg+0x37c/0x4d0 [ 609.737525][T11997] __sys_sendmsg+0x1e9/0x270 [ 609.742171][T11997] __x64_sys_sendmsg+0x46/0x50 [ 609.746960][T11997] do_syscall_64+0x41/0xc0 [ 609.751492][T11997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 609.757402][T11997] RIP: 0033:0x7f7514d76ae9 [ 609.761884][T11997] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 609.781554][T11997] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 609.790038][T11997] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 03:42:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x278, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:32 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2e0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x4e24, 0x4, 0x4e23, 0x7ff, 0xa, 0x180, 0x80, 0x89, r2, 0xee00}, {0x0, 0x10000, 0x5, 0x4344, 0x6, 0x3f, 0xffffffffffffffff, 0x7f}, {0x2, 0x10001, 0x0, 0x3f}, 0x1ff, 0x6e6bbd, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4d5, 0x7f}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x2, 0x3, 0xff, 0x8001, 0x100, 0xb6}}, 0xe8) [ 609.798074][T11997] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 609.806048][T11997] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 609.814053][T11997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 609.822033][T11997] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 609.830073][T11997] 03:42:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 45) 03:42:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2e0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x4e24, 0x4, 0x4e23, 0x7ff, 0xa, 0x180, 0x80, 0x89, r2, 0xee00}, {0x0, 0x10000, 0x5, 0x4344, 0x6, 0x3f, 0xffffffffffffffff, 0x7f}, {0x2, 0x10001, 0x0, 0x3f}, 0x1ff, 0x6e6bbd, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4d5, 0x7f}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x2, 0x3, 0xff, 0x8001, 0x100, 0xb6}}, 0xe8) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2e0) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r1, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) (async) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x4e24, 0x4, 0x4e23, 0x7ff, 0xa, 0x180, 0x80, 0x89, r2, 0xee00}, {0x0, 0x10000, 0x5, 0x4344, 0x6, 0x3f, 0xffffffffffffffff, 0x7f}, {0x2, 0x10001, 0x0, 0x3f}, 0x1ff, 0x6e6bbd, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4d5, 0x7f}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x2, 0x3, 0xff, 0x8001, 0x100, 0xb6}}, 0xe8) (async) 03:42:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2e0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2e0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x4e24, 0x4, 0x4e23, 0x7ff, 0xa, 0x180, 0x80, 0x89, r2, 0xee00}, {0x0, 0x10000, 0x5, 0x4344, 0x6, 0x3f, 0xffffffffffffffff, 0x7f}, {0x2, 0x10001, 0x0, 0x3f}, 0x1ff, 0x6e6bbd, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4d5, 0x7f}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x2, 0x3, 0xff, 0x8001, 0x100, 0xb6}}, 0xe8) (async) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @in=@empty, 0x4e24, 0x4, 0x4e23, 0x7ff, 0xa, 0x180, 0x80, 0x89, r2, 0xee00}, {0x0, 0x10000, 0x5, 0x4344, 0x6, 0x3f, 0xffffffffffffffff, 0x7f}, {0x2, 0x10001, 0x0, 0x3f}, 0x1ff, 0x6e6bbd, 0x0, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x4d5, 0x7f}, 0xa, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3505, 0x2, 0x3, 0xff, 0x8001, 0x100, 0xb6}}, 0xe8) [ 609.868436][T12000] macvtap7: entered allmulticast mode [ 609.878599][T12000] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 609.900048][T12000] team0: Device macvtap7 is already an upper device of the team interface 03:42:32 executing program 4: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x30}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000010}, 0x804) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0xf202010f98a20bb1}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) 03:42:32 executing program 4: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x30}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000010}, 0x804) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r0) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0xf202010f98a20bb1}, 0x14}}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) [ 609.929189][T12002] ipvlan8: entered promiscuous mode 03:42:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x410, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:33 executing program 4: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, '\x00', 0x30}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000010}, 0x804) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0xf202010f98a20bb1}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) 03:42:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400)=0x5, 0x4) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=@ipmr_getroute={0x1c, 0x1a, 0x400, 0x70bd25, 0x25dfdbfd, {0x80, 0x10, 0x20, 0x1, 0x0, 0x3, 0x0, 0x2, 0x1000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc010}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:33 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 609.972002][T12006] macvtap72: entered allmulticast mode [ 609.988882][T12006] 8021q: adding VLAN 0 to HW filter on device macvtap72 [ 610.009330][T12008] ipvlan12: entered promiscuous mode [ 610.019500][T12008] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 610.028920][T12008] team0: Device ipvlan12 is already an upper device of the team interface 03:42:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x290, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 610.063253][T12010] FAULT_INJECTION: forcing a failure. [ 610.063253][T12010] name failslab, interval 1, probability 0, space 0, times 0 [ 610.076046][T12010] CPU: 0 PID: 12010 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 610.086518][T12010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 610.096578][T12010] Call Trace: [ 610.099864][T12010] [ 610.102829][T12010] dump_stack_lvl+0xda/0x130 [ 610.107511][T12010] dump_stack+0x15/0x20 [ 610.111748][T12010] should_fail_ex+0x21f/0x230 [ 610.116503][T12010] __should_failslab+0x92/0xa0 [ 610.121411][T12010] should_failslab+0x9/0x20 [ 610.125918][T12010] slab_pre_alloc_hook+0x38/0x180 [ 610.130957][T12010] kmem_cache_alloc+0x52/0x220 [ 610.135770][T12010] ? __kernfs_new_node+0x6a/0x380 [ 610.140904][T12010] __kernfs_new_node+0x6a/0x380 [ 610.145800][T12010] ? rb_insert_color+0x6a/0x290 [ 610.150714][T12010] ? up_write+0x30/0xe0 [ 610.154908][T12010] ? kernfs_activate+0x252/0x270 [ 610.159902][T12010] kernfs_new_node+0x5f/0xd0 [ 610.164571][T12010] __kernfs_create_file+0x49/0x180 [ 610.169715][T12010] ? dev_attr_show+0x90/0x90 [ 610.174316][T12010] sysfs_add_file_mode_ns+0x136/0x1b0 [ 610.179802][T12010] internal_create_group+0x2e4/0x800 [ 610.185099][T12010] sysfs_create_groups+0x3c/0xe0 [ 610.190081][T12010] device_add_attrs+0x69/0x400 [ 610.194890][T12010] ? kobject_put+0xd8/0x160 [ 610.199487][T12010] device_add+0x431/0x8b0 [ 610.203987][T12010] netdev_register_kobject+0xfc/0x230 [ 610.209426][T12010] register_netdevice+0x680/0xb40 [ 610.214499][T12010] ? rtnl_is_locked+0x15/0x20 [ 610.219197][T12010] ? netdev_rx_handler_register+0x11a/0x140 [ 610.225177][T12010] macvlan_common_newlink+0xa1b/0xbc0 [ 610.230563][T12010] macvtap_newlink+0xf6/0x150 [ 610.235256][T12010] ? macvtap_setup+0x30/0x30 [ 610.239976][T12010] rtnl_newlink+0xee5/0x1670 [ 610.244594][T12010] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 610.250874][T12010] ? _raw_spin_unlock+0x26/0x40 [ 610.255856][T12010] ? __mutex_lock+0x21c/0x8d0 [ 610.260633][T12010] ? rtnl_setlink+0x300/0x300 [ 610.265336][T12010] rtnetlink_rcv_msg+0x807/0x8c0 [ 610.270345][T12010] ? memcg_list_lru_alloc+0xd5/0x750 [ 610.275671][T12010] ? should_fail_ex+0x2d/0x230 [ 610.280534][T12010] ? slab_post_alloc_hook+0x8c/0x340 [ 610.285825][T12010] ? xas_load+0x3ae/0x3c0 [ 610.290163][T12010] ? skb_release_data+0x53d/0x550 [ 610.295211][T12010] ? kmem_cache_free+0x1db/0x3a0 [ 610.300178][T12010] ? __kfree_skb+0x104/0x140 [ 610.304781][T12010] ? nlmon_xmit+0x4b/0x60 [ 610.309137][T12010] ? __kfree_skb+0x104/0x140 [ 610.313885][T12010] ? consume_skb+0x57/0x180 [ 610.318412][T12010] ? nlmon_xmit+0x4b/0x60 [ 610.322768][T12010] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 610.328130][T12010] ? __dev_queue_xmit+0xad9/0x1e20 [ 610.333348][T12010] ? ref_tracker_free+0x3a1/0x400 [ 610.338460][T12010] netlink_rcv_skb+0x126/0x220 [ 610.343244][T12010] ? rtnetlink_bind+0x60/0x60 [ 610.347976][T12010] rtnetlink_rcv+0x1c/0x20 [ 610.352477][T12010] netlink_unicast+0x589/0x650 [ 610.357255][T12010] netlink_sendmsg+0x66e/0x770 [ 610.362044][T12010] ? netlink_getsockopt+0x3e0/0x3e0 [ 610.367299][T12010] ____sys_sendmsg+0x37c/0x4d0 [ 610.372081][T12010] __sys_sendmsg+0x1e9/0x270 [ 610.376832][T12010] __x64_sys_sendmsg+0x46/0x50 [ 610.381704][T12010] do_syscall_64+0x41/0xc0 [ 610.386212][T12010] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 610.392130][T12010] RIP: 0033:0x7f7514d76ae9 [ 610.396549][T12010] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 610.416191][T12010] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 610.424729][T12010] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 610.432717][T12010] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 610.440743][T12010] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 610.448732][T12010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 610.456754][T12010] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400)=0x5, 0x4) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=@ipmr_getroute={0x1c, 0x1a, 0x400, 0x70bd25, 0x25dfdbfd, {0x80, 0x10, 0x20, 0x1, 0x0, 0x3, 0x0, 0x2, 0x1000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc010}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 46) 03:42:33 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 610.464807][T12010] [ 610.479549][T12030] ipvlan8: entered promiscuous mode 03:42:33 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400)=0x5, 0x4) (async) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400)=0x5, 0x4) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f00000000c0)=@ipmr_getroute={0x1c, 0x1a, 0x400, 0x70bd25, 0x25dfdbfd, {0x80, 0x10, 0x20, 0x1, 0x0, 0x3, 0x0, 0x2, 0x1000}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc010}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:33 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x25, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="73697430ae1650da4deb3b34734d9d0000000000000000000000000927c81a46e9cfcb6a", @ANYRES32=0x0, @ANYBLOB="78008000000000070000000748e800e000660000072990780a010102ac14142907133eac141426ffffffff0a0101000a0101019407b7c17feafa070f9be00000017f000001e0000002441c7501ac1414bb0000001fac1e00015abf9e960a01010100000000442c2463e0000001000000070a01010000000007ac1414bb00000000ac14140d0000084cffffffff00000005441cf441ac1414bb000003ff0a01010200000009ac1414bb00000005940401008913e7ac1414aa7f000001ac1414bbffffffff44187820000000ff00000100000000e20000000300000000860dffffffff0207d02a8ca1a5000000"]}) write$selinux_attr(r0, 0x0, 0x0) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x401, 0x20000130, 0x200000020000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) 03:42:33 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x25, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="73697430ae1650da4deb3b34734d9d0000000000000000000000000927c81a46e9cfcb6a", @ANYRES32=0x0, @ANYBLOB="78008000000000070000000748e800e000660000072990780a010102ac14142907133eac141426ffffffff0a0101000a0101019407b7c17feafa070f9be00000017f000001e0000002441c7501ac1414bb0000001fac1e00015abf9e960a01010100000000442c2463e0000001000000070a01010000000007ac1414bb00000000ac14140d0000084cffffffff00000005441cf441ac1414bb000003ff0a01010200000009ac1414bb00000005940401008913e7ac1414aa7f000001ac1414bbffffffff44187820000000ff00000100000000e20000000300000000860dffffffff0207d02a8ca1a5000000"]}) write$selinux_attr(r0, 0x0, 0x0) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x401, 0x20000130, 0x200000020000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) [ 610.535382][T12032] macvtap73: entered allmulticast mode [ 610.544678][T12032] 8021q: adding VLAN 0 to HW filter on device macvtap73 [ 610.570879][T12037] macvtap7: entered allmulticast mode 03:42:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x294, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:33 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:33 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 64) r0 = socket(0x25, 0x1, 0x0) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="73697430ae1650da4deb3b34734d9d0000000000000000000000000927c81a46e9cfcb6a", @ANYRES32=0x0, @ANYBLOB="78008000000000070000000748e800e000660000072990780a010102ac14142907133eac141426ffffffff0a0101000a0101019407b7c17feafa070f9be00000017f000001e0000002441c7501ac1414bb0000001fac1e00015abf9e960a01010100000000442c2463e0000001000000070a01010000000007ac1414bb00000000ac14140d0000084cffffffff00000005441cf441ac1414bb000003ff0a01010200000009ac1414bb00000005940401008913e7ac1414aa7f000001ac1414bbffffffff44187820000000ff00000100000000e20000000300000000860dffffffff0207d02a8ca1a5000000"]}) (async) write$selinux_attr(r0, 0x0, 0x0) r2 = socket(0x25, 0x1, 0x0) write$selinux_attr(r2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x401, 0x20000130, 0x200000020000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) [ 610.579062][T12037] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 610.589907][T12037] team0: Device macvtap7 is already an upper device of the team interface [ 610.617201][T12040] FAULT_INJECTION: forcing a failure. [ 610.617201][T12040] name failslab, interval 1, probability 0, space 0, times 0 [ 610.629945][T12040] CPU: 1 PID: 12040 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 610.640390][T12040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 610.640409][T12040] Call Trace: [ 610.653770][T12040] [ 610.656776][T12040] dump_stack_lvl+0xda/0x130 [ 610.661442][T12040] dump_stack+0x15/0x20 [ 610.665643][T12040] should_fail_ex+0x21f/0x230 [ 610.670342][T12040] __should_failslab+0x92/0xa0 [ 610.675138][T12040] should_failslab+0x9/0x20 [ 610.679702][T12040] slab_pre_alloc_hook+0x38/0x180 [ 610.684759][T12040] kmem_cache_alloc+0x52/0x220 [ 610.689650][T12040] ? __kernfs_new_node+0x6a/0x380 [ 610.694762][T12040] __kernfs_new_node+0x6a/0x380 [ 610.699668][T12040] ? rb_insert_color+0x6a/0x290 [ 610.704681][T12040] ? up_write+0x30/0xe0 [ 610.708875][T12040] ? kernfs_activate+0x252/0x270 [ 610.713883][T12040] kernfs_new_node+0x5f/0xd0 [ 610.718489][T12040] __kernfs_create_file+0x49/0x180 [ 610.723626][T12040] ? dev_attr_show+0x90/0x90 [ 610.728259][T12040] sysfs_add_file_mode_ns+0x136/0x1b0 [ 610.733668][T12040] internal_create_group+0x2e4/0x800 [ 610.739010][T12040] sysfs_create_groups+0x3c/0xe0 [ 610.744033][T12040] device_add_attrs+0x69/0x400 [ 610.748822][T12040] ? kobject_put+0xd8/0x160 [ 610.753383][T12040] device_add+0x431/0x8b0 [ 610.757772][T12040] netdev_register_kobject+0xfc/0x230 [ 610.763218][T12040] register_netdevice+0x680/0xb40 [ 610.768344][T12040] ? rtnl_is_locked+0x15/0x20 [ 610.773040][T12040] ? netdev_rx_handler_register+0x11a/0x140 [ 610.778990][T12040] macvlan_common_newlink+0xa1b/0xbc0 [ 610.784449][T12040] macvtap_newlink+0xf6/0x150 [ 610.789210][T12040] ? macvtap_setup+0x30/0x30 [ 610.793827][T12040] rtnl_newlink+0xee5/0x1670 [ 610.798471][T12040] ? cgroup_rstat_updated+0x8c/0x1c0 [ 610.803773][T12040] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 610.810066][T12040] ? _raw_spin_unlock+0x26/0x40 [ 610.814929][T12040] ? __mutex_lock+0x21c/0x8d0 [ 610.819699][T12040] ? rtnl_setlink+0x300/0x300 [ 610.824465][T12040] rtnetlink_rcv_msg+0x807/0x8c0 [ 610.829489][T12040] ? memcg_list_lru_alloc+0xd5/0x750 [ 610.834812][T12040] ? should_fail_ex+0x2d/0x230 [ 610.839640][T12040] ? slab_post_alloc_hook+0x8c/0x340 [ 610.844941][T12040] ? try_charge_memcg+0xb49/0xd30 [ 610.849972][T12040] ? skb_release_data+0x53d/0x550 [ 610.855060][T12040] ? kmem_cache_free+0x1db/0x3a0 [ 610.860014][T12040] ? __kfree_skb+0x104/0x140 [ 610.864627][T12040] ? nlmon_xmit+0x4b/0x60 [ 610.868988][T12040] ? __kfree_skb+0x104/0x140 [ 610.873660][T12040] ? consume_skb+0x57/0x180 [ 610.878251][T12040] ? nlmon_xmit+0x4b/0x60 [ 610.882621][T12040] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 610.887929][T12040] ? __dev_queue_xmit+0xad9/0x1e20 [ 610.893131][T12040] ? ref_tracker_free+0x3a1/0x400 [ 610.898212][T12040] netlink_rcv_skb+0x126/0x220 [ 610.902992][T12040] ? rtnetlink_bind+0x60/0x60 [ 610.907694][T12040] rtnetlink_rcv+0x1c/0x20 [ 610.912174][T12040] netlink_unicast+0x589/0x650 [ 610.916951][T12040] netlink_sendmsg+0x66e/0x770 [ 610.921739][T12040] ? netlink_getsockopt+0x3e0/0x3e0 [ 610.926967][T12040] ____sys_sendmsg+0x37c/0x4d0 [ 610.931757][T12040] __sys_sendmsg+0x1e9/0x270 [ 610.936498][T12040] __x64_sys_sendmsg+0x46/0x50 [ 610.941280][T12040] do_syscall_64+0x41/0xc0 [ 610.945727][T12040] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 610.951640][T12040] RIP: 0033:0x7f7514d76ae9 [ 610.956068][T12040] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 610.975790][T12040] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 610.984226][T12040] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 610.992214][T12040] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 611.000279][T12040] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 611.008313][T12040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 611.016285][T12040] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 611.024264][T12040] 03:42:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 47) 03:42:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x412, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x413, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 611.039052][T12041] ipvlan12: entered promiscuous mode [ 611.052252][T12041] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 611.061279][T12041] team0: Device ipvlan12 is already an upper device of the team interface 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r4) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x70, r2, 0x2, 0xfffffffc, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x70}}, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x3, 0x1000000020000130, 0x1400000, 0xffffffffffffffff, 0xfffffffffffffffe], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3, @ANYRES8=r1, @ANYRESOCT=r2, @ANYRESHEX=r1]}, 0xb4) [ 611.109772][T12062] macvtap7: entered allmulticast mode [ 611.109960][T12062] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 611.123960][T12062] team0: Device macvtap7 is already an upper device of the team interface 03:42:34 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x6f, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r4) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x70, r2, 0x2, 0xfffffffc, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x70}}, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x3, 0x1000000020000130, 0x1400000, 0xffffffffffffffff, 0xfffffffffffffffe], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3, @ANYRES8=r1, @ANYRESOCT=r2, @ANYRESHEX=r1]}, 0xb4) 03:42:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2a9, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x414, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r1) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r4) (async) sendmsg$NLBL_MGMT_C_PROTOCOLS(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x70, r2, 0x2, 0xfffffffc, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x70}}, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x3, 0x1000000020000130, 0x1400000, 0xffffffffffffffff, 0xfffffffffffffffe], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3, @ANYRES8=r1, @ANYRESOCT=r2, @ANYRESHEX=r1]}, 0xb4) [ 611.152895][T12050] macvtap74: entered allmulticast mode [ 611.162202][T12050] 8021q: adding VLAN 0 to HW filter on device macvtap74 [ 611.181105][T12053] ipvlan8: entered promiscuous mode 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@newlink={0x90, 0x10, 0x100, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x10000, 0x40}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x401}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}, @IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x6}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xffffff81}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x4048001) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 611.247428][T12060] FAULT_INJECTION: forcing a failure. [ 611.247428][T12060] name failslab, interval 1, probability 0, space 0, times 0 [ 611.260284][T12060] CPU: 0 PID: 12060 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 611.270778][T12060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 611.280910][T12060] Call Trace: [ 611.284231][T12060] [ 611.287178][T12060] dump_stack_lvl+0xda/0x130 [ 611.291872][T12060] dump_stack+0x15/0x20 [ 611.296126][T12060] should_fail_ex+0x21f/0x230 [ 611.300825][T12060] __should_failslab+0x92/0xa0 [ 611.305655][T12060] should_failslab+0x9/0x20 [ 611.310194][T12060] slab_pre_alloc_hook+0x38/0x180 [ 611.315237][T12060] kmem_cache_alloc+0x52/0x220 [ 611.320077][T12060] ? __kernfs_new_node+0x6a/0x380 [ 611.325208][T12060] __kernfs_new_node+0x6a/0x380 [ 611.330072][T12060] ? rb_insert_color+0x263/0x290 [ 611.335055][T12060] ? up_write+0x30/0xe0 [ 611.339307][T12060] ? kernfs_activate+0x252/0x270 [ 611.344259][T12060] kernfs_new_node+0x5f/0xd0 [ 611.348892][T12060] __kernfs_create_file+0x49/0x180 [ 611.354042][T12060] ? dev_attr_show+0x90/0x90 [ 611.358668][T12060] sysfs_add_file_mode_ns+0x136/0x1b0 [ 611.364107][T12060] internal_create_group+0x2e4/0x800 [ 611.369488][T12060] sysfs_create_groups+0x3c/0xe0 [ 611.374487][T12060] device_add_attrs+0x69/0x400 [ 611.379311][T12060] ? kobject_put+0xd8/0x160 [ 611.383850][T12060] device_add+0x431/0x8b0 [ 611.388211][T12060] netdev_register_kobject+0xfc/0x230 [ 611.393620][T12060] register_netdevice+0x680/0xb40 [ 611.398725][T12060] ? rtnl_is_locked+0x15/0x20 [ 611.403496][T12060] ? netdev_rx_handler_register+0x11a/0x140 [ 611.409406][T12060] macvlan_common_newlink+0xa1b/0xbc0 [ 611.414797][T12060] macvtap_newlink+0xf6/0x150 [ 611.419532][T12060] ? macvtap_setup+0x30/0x30 [ 611.424171][T12060] rtnl_newlink+0xee5/0x1670 [ 611.428870][T12060] ? cgroup_rstat_updated+0x8c/0x1c0 [ 611.434233][T12060] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 611.440537][T12060] ? _raw_spin_unlock+0x26/0x40 [ 611.445401][T12060] ? __mutex_lock+0x21c/0x8d0 [ 611.450097][T12060] ? rtnl_setlink+0x300/0x300 [ 611.454797][T12060] rtnetlink_rcv_msg+0x807/0x8c0 [ 611.459816][T12060] ? memcg_list_lru_alloc+0xd5/0x750 [ 611.465209][T12060] ? should_fail_ex+0x2d/0x230 [ 611.470045][T12060] ? slab_post_alloc_hook+0x8c/0x340 [ 611.475349][T12060] ? try_charge_memcg+0xb49/0xd30 [ 611.480425][T12060] ? skb_release_data+0x53d/0x550 [ 611.485470][T12060] ? kmem_cache_free+0x1db/0x3a0 [ 611.490414][T12060] ? __kfree_skb+0x104/0x140 [ 611.495061][T12060] ? nlmon_xmit+0x4b/0x60 [ 611.499426][T12060] ? __kfree_skb+0x104/0x140 [ 611.504086][T12060] ? consume_skb+0x57/0x180 [ 611.508653][T12060] ? nlmon_xmit+0x4b/0x60 [ 611.512986][T12060] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 611.518296][T12060] ? __dev_queue_xmit+0xad9/0x1e20 [ 611.523531][T12060] ? ref_tracker_free+0x3a1/0x400 [ 611.528576][T12060] netlink_rcv_skb+0x126/0x220 [ 611.533360][T12060] ? rtnetlink_bind+0x60/0x60 [ 611.538075][T12060] rtnetlink_rcv+0x1c/0x20 [ 611.542574][T12060] netlink_unicast+0x589/0x650 [ 611.547361][T12060] netlink_sendmsg+0x66e/0x770 [ 611.552203][T12060] ? netlink_getsockopt+0x3e0/0x3e0 [ 611.557415][T12060] ____sys_sendmsg+0x37c/0x4d0 [ 611.562406][T12060] __sys_sendmsg+0x1e9/0x270 [ 611.567018][T12060] __x64_sys_sendmsg+0x46/0x50 [ 611.571795][T12060] do_syscall_64+0x41/0xc0 [ 611.576308][T12060] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 611.582263][T12060] RIP: 0033:0x7f7514d76ae9 [ 611.586681][T12060] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 611.606311][T12060] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 611.614844][T12060] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 611.622858][T12060] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 611.630902][T12060] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 611.638914][T12060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:34 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x415, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 48) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@newlink={0x90, 0x10, 0x100, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x10000, 0x40}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x401}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}, @IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x6}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xffffff81}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x4048001) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@newlink={0x90, 0x10, 0x100, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x10000, 0x40}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x401}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}, @IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x6}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}]}}}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xffffff81}]}, 0x90}, 0x1, 0x0, 0x0, 0x80}, 0x4048001) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 611.646914][T12060] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 611.654901][T12060] [ 611.664951][T12070] ipvlan12: entered promiscuous mode [ 611.671533][T12070] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 611.683667][T12070] team0: Device ipvlan12 is already an upper device of the team interface 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:34 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) [ 611.729596][T12074] macvtap75: entered allmulticast mode [ 611.741500][T12074] 8021q: adding VLAN 0 to HW filter on device macvtap75 [ 611.758558][T12082] macvtap7: entered allmulticast mode 03:42:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2c2, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000380)="f340c06f2888f21f2ffc86224c6bffd655b47a9baa3abddfc8add2b7dbf07646b3c6cf5f014e8a7955c5a996a7769ed6bb0c52807ff8cf88e45e49d13c487a2cfb5daaca055d306bfb24a93cb2613a78d91ced47d5a45133f28168790ada0f43de6b1ae572b73be96eacb12fa1f7e52b6332f75a6cf4a20841b532cd93802b2ba633baa2c40b3e1511e1dc8aa6a8a11246b60d5507444358d98c53e1bc84c35e70cc771920884f529af791dd7a2d63311e478a456c2d96ebd4730fad34c3199fdd8fdfbda584d03e1a9a3ee1002f3d4664991f7c9b8706b52b4c77ff4c3bed6a558fd3bdc74c4f", &(0x7f0000000480)=@buf="727d4e82c8837b4775f46b62348d103d4214d5a0fb74a087cbddae4be94803c9677bcd162bdc8a392a8b2052f3f5a9d2b755ba75982517e9ae046d8171df72b598351cd73ea40eb0d61689c14e62b5e482db6411d3a0bddb725718d41fd133254d19", 0x4}, 0x20) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 611.776785][T12082] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 611.786381][T12082] team0: Device macvtap7 is already an upper device of the team interface 03:42:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000380)="f340c06f2888f21f2ffc86224c6bffd655b47a9baa3abddfc8add2b7dbf07646b3c6cf5f014e8a7955c5a996a7769ed6bb0c52807ff8cf88e45e49d13c487a2cfb5daaca055d306bfb24a93cb2613a78d91ced47d5a45133f28168790ada0f43de6b1ae572b73be96eacb12fa1f7e52b6332f75a6cf4a20841b532cd93802b2ba633baa2c40b3e1511e1dc8aa6a8a11246b60d5507444358d98c53e1bc84c35e70cc771920884f529af791dd7a2d63311e478a456c2d96ebd4730fad34c3199fdd8fdfbda584d03e1a9a3ee1002f3d4664991f7c9b8706b52b4c77ff4c3bed6a558fd3bdc74c4f", &(0x7f0000000480)=@buf="727d4e82c8837b4775f46b62348d103d4214d5a0fb74a087cbddae4be94803c9677bcd162bdc8a392a8b2052f3f5a9d2b755ba75982517e9ae046d8171df72b598351cd73ea40eb0d61689c14e62b5e482db6411d3a0bddb725718d41fd133254d19", 0x4}, 0x20) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 611.820243][T12086] ipvlan8: entered promiscuous mode [ 611.855832][T12087] FAULT_INJECTION: forcing a failure. [ 611.855832][T12087] name failslab, interval 1, probability 0, space 0, times 0 [ 611.868539][T12087] CPU: 1 PID: 12087 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 611.878969][T12087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 611.889167][T12087] Call Trace: [ 611.892493][T12087] [ 611.895470][T12087] dump_stack_lvl+0xda/0x130 [ 611.900165][T12087] dump_stack+0x15/0x20 [ 611.904365][T12087] should_fail_ex+0x21f/0x230 [ 611.909068][T12087] __should_failslab+0x92/0xa0 [ 611.913938][T12087] should_failslab+0x9/0x20 [ 611.918442][T12087] slab_pre_alloc_hook+0x38/0x180 [ 611.923486][T12087] kmem_cache_alloc+0x52/0x220 [ 611.928307][T12087] ? __kernfs_new_node+0x6a/0x380 [ 611.933367][T12087] __kernfs_new_node+0x6a/0x380 [ 611.938254][T12087] ? rb_insert_color+0x6a/0x290 [ 611.943187][T12087] ? up_write+0x30/0xe0 [ 611.947369][T12087] ? kernfs_activate+0x252/0x270 [ 611.952366][T12087] kernfs_new_node+0x5f/0xd0 [ 611.956966][T12087] __kernfs_create_file+0x49/0x180 [ 611.962112][T12087] ? dev_attr_show+0x90/0x90 [ 611.966702][T12087] sysfs_add_file_mode_ns+0x136/0x1b0 [ 611.972176][T12087] internal_create_group+0x2e4/0x800 [ 611.977476][T12087] sysfs_create_groups+0x3c/0xe0 [ 611.982465][T12087] device_add_attrs+0x69/0x400 [ 611.987252][T12087] ? kobject_put+0xd8/0x160 [ 611.991857][T12087] device_add+0x431/0x8b0 [ 611.996224][T12087] netdev_register_kobject+0xfc/0x230 [ 612.001608][T12087] register_netdevice+0x680/0xb40 [ 612.006697][T12087] ? rtnl_is_locked+0x15/0x20 [ 612.011381][T12087] ? netdev_rx_handler_register+0x11a/0x140 [ 612.017333][T12087] macvlan_common_newlink+0xa1b/0xbc0 [ 612.022713][T12087] macvtap_newlink+0xf6/0x150 [ 612.027399][T12087] ? macvtap_setup+0x30/0x30 [ 612.032083][T12087] rtnl_newlink+0xee5/0x1670 [ 612.036749][T12087] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 612.043083][T12087] ? _raw_spin_unlock+0x26/0x40 [ 612.047948][T12087] ? __mutex_lock+0x21c/0x8d0 [ 612.052687][T12087] ? rtnl_setlink+0x300/0x300 [ 612.057397][T12087] rtnetlink_rcv_msg+0x807/0x8c0 [ 612.062357][T12087] ? memcg_list_lru_alloc+0xd5/0x750 [ 612.067786][T12087] ? should_fail_ex+0x2d/0x230 [ 612.072578][T12087] ? slab_post_alloc_hook+0x8c/0x340 [ 612.077928][T12087] ? xas_load+0x3ae/0x3c0 [ 612.082266][T12087] ? skb_release_data+0x53d/0x550 [ 612.087354][T12087] ? kmem_cache_free+0x1db/0x3a0 [ 612.092320][T12087] ? __kfree_skb+0x104/0x140 [ 612.096924][T12087] ? nlmon_xmit+0x4b/0x60 [ 612.101332][T12087] ? __kfree_skb+0x104/0x140 [ 612.105941][T12087] ? consume_skb+0x57/0x180 [ 612.110522][T12087] ? nlmon_xmit+0x4b/0x60 [ 612.114939][T12087] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 612.120249][T12087] ? __dev_queue_xmit+0xad9/0x1e20 [ 612.125440][T12087] ? ref_tracker_free+0x3a1/0x400 [ 612.130506][T12087] netlink_rcv_skb+0x126/0x220 [ 612.135340][T12087] ? rtnetlink_bind+0x60/0x60 [ 612.140128][T12087] rtnetlink_rcv+0x1c/0x20 [ 612.144618][T12087] netlink_unicast+0x589/0x650 [ 612.149399][T12087] netlink_sendmsg+0x66e/0x770 [ 612.154181][T12087] ? netlink_getsockopt+0x3e0/0x3e0 [ 612.159563][T12087] ____sys_sendmsg+0x37c/0x4d0 [ 612.164372][T12087] __sys_sendmsg+0x1e9/0x270 [ 612.169071][T12087] __x64_sys_sendmsg+0x46/0x50 [ 612.173925][T12087] do_syscall_64+0x41/0xc0 [ 612.178373][T12087] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 612.184298][T12087] RIP: 0033:0x7f7514d76ae9 [ 612.188731][T12087] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 612.208396][T12087] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 612.216855][T12087] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 612.224916][T12087] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 612.232913][T12087] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 612.240900][T12087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 612.248895][T12087] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:35 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000080)) (async) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000380)="f340c06f2888f21f2ffc86224c6bffd655b47a9baa3abddfc8add2b7dbf07646b3c6cf5f014e8a7955c5a996a7769ed6bb0c52807ff8cf88e45e49d13c487a2cfb5daaca055d306bfb24a93cb2613a78d91ced47d5a45133f28168790ada0f43de6b1ae572b73be96eacb12fa1f7e52b6332f75a6cf4a20841b532cd93802b2ba633baa2c40b3e1511e1dc8aa6a8a11246b60d5507444358d98c53e1bc84c35e70cc771920884f529af791dd7a2d63311e478a456c2d96ebd4730fad34c3199fdd8fdfbda584d03e1a9a3ee1002f3d4664991f7c9b8706b52b4c77ff4c3bed6a558fd3bdc74c4f", &(0x7f0000000480)=@buf="727d4e82c8837b4775f46b62348d103d4214d5a0fb74a087cbddae4be94803c9677bcd162bdc8a392a8b2052f3f5a9d2b755ba75982517e9ae046d8171df72b598351cd73ea40eb0d61689c14e62b5e482db6411d3a0bddb725718d41fd133254d19", 0x4}, 0x20) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 612.256932][T12087] [ 612.271527][T12095] ipvlan12: entered promiscuous mode [ 612.271608][ T8634] ================================================================== [ 612.284955][ T8634] BUG: KCSAN: data-race in __dev_change_flags / is_upper_ndev_bond_master_filter [ 612.292448][T12095] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 612.294094][ T8634] [ 612.294101][ T8634] read-write to 0xffff8881cb61b0c0 of 4 bytes by task 12095 on cpu 0: [ 612.294123][ T8634] __dev_change_flags+0xa3/0x400 [ 612.307687][T12095] team0: Device ipvlan12 is already an upper device of the team interface [ 612.311413][ T8634] rtnl_newlink+0x1200/0x1670 [ 612.329557][ T8634] rtnetlink_rcv_msg+0x807/0x8c0 [ 612.334525][ T8634] netlink_rcv_skb+0x126/0x220 [ 612.339308][ T8634] rtnetlink_rcv+0x1c/0x20 [ 612.343736][ T8634] netlink_unicast+0x589/0x650 [ 612.348510][ T8634] netlink_sendmsg+0x66e/0x770 [ 612.353287][ T8634] ____sys_sendmsg+0x37c/0x4d0 [ 612.358066][ T8634] __sys_sendmsg+0x1e9/0x270 [ 612.362669][ T8634] __x64_sys_sendmsg+0x46/0x50 [ 612.367447][ T8634] do_syscall_64+0x41/0xc0 [ 612.371873][ T8634] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 612.377774][ T8634] [ 612.380096][ T8634] read to 0xffff8881cb61b0c0 of 4 bytes by task 8634 on cpu 1: [ 612.387640][ T8634] is_upper_ndev_bond_master_filter+0x2b/0xb0 [ 612.393713][ T8634] ib_enum_roce_netdev+0x120/0x1c0 [ 612.398858][ T8634] ib_enum_all_roce_netdevs+0x8a/0xf0 [ 612.404245][ T8634] netdevice_event_work_handler+0x15b/0x3c0 [ 612.410152][ T8634] process_scheduled_works+0x5b8/0xa30 [ 612.415619][ T8634] worker_thread+0x525/0x730 [ 612.420214][ T8634] kthread+0x1d7/0x210 [ 612.424304][ T8634] ret_from_fork+0x48/0x60 [ 612.428740][ T8634] ret_from_fork_asm+0x11/0x20 [ 612.433514][ T8634] [ 612.435835][ T8634] value changed: 0x00001002 -> 0x0000f0a6 [ 612.441567][ T8634] [ 612.443891][ T8634] Reported by Kernel Concurrency Sanitizer on: 03:42:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x416, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x400) r1 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000400)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010101}, 0x10) 03:42:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 49) [ 612.450066][ T8634] CPU: 1 PID: 8634 Comm: kworker/u4:44 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 612.460305][ T8634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 612.470386][ T8634] Workqueue: gid-cache-wq netdevice_event_work_handler [ 612.477267][ T8634] ================================================================== 03:42:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x417, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 612.520708][T12101] macvtap76: entered allmulticast mode [ 612.530328][ T27] audit: type=1400 audit(1698205355.555:717): avc: denied { ioctl } for pid=12109 comm="syz-executor.4" path="/dev/sg0" dev="devtmpfs" ino=111 ioctlcmd=0x2282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 612.537489][T12101] 8021q: adding VLAN 0 to HW filter on device macvtap76 03:42:35 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x400) r1 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000400)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010101}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) (async) unshare(0x400) (async) syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) (async) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000400)) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010101}, 0x10) (async) 03:42:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2e5, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 612.576379][T12107] ipvlan8: entered promiscuous mode 03:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) unshare(0x400) (async) r1 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000400)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010101}, 0x10) 03:42:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000380)=0xc) [ 612.622173][T12114] FAULT_INJECTION: forcing a failure. [ 612.622173][T12114] name failslab, interval 1, probability 0, space 0, times 0 [ 612.634942][T12114] CPU: 0 PID: 12114 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 612.645432][T12114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 612.655492][T12114] Call Trace: [ 612.655502][T12114] [ 612.655510][T12114] dump_stack_lvl+0xda/0x130 [ 612.655557][T12114] dump_stack+0x15/0x20 [ 612.670597][T12114] should_fail_ex+0x21f/0x230 [ 612.675288][T12114] __should_failslab+0x92/0xa0 [ 612.680165][T12114] should_failslab+0x9/0x20 [ 612.684716][T12114] slab_pre_alloc_hook+0x38/0x180 [ 612.689772][T12114] kmem_cache_alloc+0x52/0x220 [ 612.694570][T12114] ? __kernfs_new_node+0x6a/0x380 [ 612.699632][T12114] __kernfs_new_node+0x6a/0x380 [ 612.704655][T12114] ? rb_insert_color+0x6a/0x290 [ 612.709516][T12114] ? up_write+0x30/0xe0 [ 612.713766][T12114] ? kernfs_activate+0x252/0x270 [ 612.718717][T12114] kernfs_new_node+0x5f/0xd0 [ 612.723356][T12114] __kernfs_create_file+0x49/0x180 [ 612.728502][T12114] ? dev_attr_show+0x90/0x90 [ 612.733104][T12114] sysfs_add_file_mode_ns+0x136/0x1b0 [ 612.738593][T12114] internal_create_group+0x2e4/0x800 [ 612.743888][T12114] sysfs_create_groups+0x3c/0xe0 [ 612.748893][T12114] device_add_attrs+0x69/0x400 [ 612.753674][T12114] ? kobject_put+0xd8/0x160 [ 612.758257][T12114] device_add+0x431/0x8b0 [ 612.762686][T12114] netdev_register_kobject+0xfc/0x230 [ 612.768073][T12114] register_netdevice+0x680/0xb40 [ 612.773139][T12114] ? rtnl_is_locked+0x15/0x20 [ 612.777937][T12114] ? netdev_rx_handler_register+0x11a/0x140 [ 612.783931][T12114] macvlan_common_newlink+0xa1b/0xbc0 [ 612.789314][T12114] macvtap_newlink+0xf6/0x150 [ 612.794054][T12114] ? macvtap_setup+0x30/0x30 [ 612.798722][T12114] rtnl_newlink+0xee5/0x1670 [ 612.803427][T12114] ? cgroup_rstat_updated+0x8c/0x1c0 [ 612.808796][T12114] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 612.815070][T12114] ? _raw_spin_unlock+0x26/0x40 [ 612.819946][T12114] ? __mutex_lock+0x21c/0x8d0 [ 612.824663][T12114] ? rtnl_setlink+0x300/0x300 [ 612.829373][T12114] rtnetlink_rcv_msg+0x807/0x8c0 [ 612.834424][T12114] ? memcg_list_lru_alloc+0xd5/0x750 [ 612.839741][T12114] ? should_fail_ex+0x2d/0x230 [ 612.844511][T12114] ? slab_post_alloc_hook+0x8c/0x340 [ 612.849849][T12114] ? xas_load+0x3ae/0x3c0 [ 612.854250][T12114] ? skb_release_data+0x53d/0x550 [ 612.859308][T12114] ? kmem_cache_free+0x1db/0x3a0 [ 612.864307][T12114] ? __kfree_skb+0x104/0x140 [ 612.868908][T12114] ? nlmon_xmit+0x4b/0x60 [ 612.873303][T12114] ? __kfree_skb+0x104/0x140 [ 612.877910][T12114] ? consume_skb+0x57/0x180 [ 612.882495][T12114] ? nlmon_xmit+0x4b/0x60 [ 612.886828][T12114] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 612.892124][T12114] ? __dev_queue_xmit+0xad9/0x1e20 [ 612.897328][T12114] ? ref_tracker_free+0x3a1/0x400 [ 612.902364][T12114] netlink_rcv_skb+0x126/0x220 [ 612.907198][T12114] ? rtnetlink_bind+0x60/0x60 [ 612.911954][T12114] rtnetlink_rcv+0x1c/0x20 [ 612.916399][T12114] netlink_unicast+0x589/0x650 [ 612.921319][T12114] netlink_sendmsg+0x66e/0x770 [ 612.926183][T12114] ? netlink_getsockopt+0x3e0/0x3e0 [ 612.931472][T12114] ____sys_sendmsg+0x37c/0x4d0 [ 612.936328][T12114] __sys_sendmsg+0x1e9/0x270 [ 612.940971][T12114] __x64_sys_sendmsg+0x46/0x50 [ 612.945827][T12114] do_syscall_64+0x41/0xc0 [ 612.950260][T12114] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 612.956215][T12114] RIP: 0033:0x7f7514d76ae9 [ 612.960642][T12114] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 612.980261][T12114] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 612.988742][T12114] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 612.996720][T12114] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 613.004697][T12114] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 613.012690][T12114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), 0x4) (async) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000380)=0xc) 03:42:36 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 50) 03:42:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), 0x4) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async, rerun: 32) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @private, @dev}, &(0x7f0000000380)=0xc) (rerun: 32) [ 613.020678][T12114] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 613.028811][T12114] [ 613.040550][T12116] macvtap7: entered allmulticast mode [ 613.048184][T12116] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 613.063015][T12116] team0: Device macvtap7 is already an upper device of the team interface 03:42:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x1) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x4, 0x8000, 0x20000130, 0x20000282, 0x10000], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) 03:42:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x419, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x1) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x4, 0x8000, 0x20000130, 0x20000282, 0x10000], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x1) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r0, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x4, 0x8000, 0x20000130, 0x20000282, 0x10000], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) (async) [ 613.098628][T12123] ipvlan12: entered promiscuous mode [ 613.106534][T12123] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 613.117254][T12123] team0: Device ipvlan12 is already an upper device of the team interface [ 613.167392][T12130] macvtap77: entered allmulticast mode [ 613.178529][T12130] 8021q: adding VLAN 0 to HW filter on device macvtap77 [ 613.190574][T12132] FAULT_INJECTION: forcing a failure. [ 613.190574][T12132] name failslab, interval 1, probability 0, space 0, times 0 [ 613.203274][T12132] CPU: 0 PID: 12132 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 613.213769][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 613.223846][T12132] Call Trace: [ 613.227183][T12132] [ 613.230128][T12132] dump_stack_lvl+0xda/0x130 [ 613.234841][T12132] dump_stack+0x15/0x20 [ 613.239083][T12132] should_fail_ex+0x21f/0x230 [ 613.243782][T12132] __should_failslab+0x92/0xa0 [ 613.248646][T12132] should_failslab+0x9/0x20 [ 613.253237][T12132] slab_pre_alloc_hook+0x38/0x180 [ 613.258280][T12132] kmem_cache_alloc+0x52/0x220 [ 613.263059][T12132] ? __kernfs_new_node+0x6a/0x380 [ 613.268115][T12132] __kernfs_new_node+0x6a/0x380 [ 613.273048][T12132] ? rb_insert_color+0x263/0x290 [ 613.278010][T12132] ? up_write+0x30/0xe0 [ 613.282251][T12132] ? kernfs_activate+0x252/0x270 [ 613.287318][T12132] kernfs_new_node+0x5f/0xd0 [ 613.292008][T12132] __kernfs_create_file+0x49/0x180 [ 613.297187][T12132] ? dev_attr_show+0x90/0x90 [ 613.301821][T12132] sysfs_add_file_mode_ns+0x136/0x1b0 [ 613.307220][T12132] internal_create_group+0x2e4/0x800 [ 613.312616][T12132] sysfs_create_groups+0x3c/0xe0 [ 613.317576][T12132] device_add_attrs+0x69/0x400 [ 613.322410][T12132] ? kobject_put+0xd8/0x160 [ 613.327034][T12132] device_add+0x431/0x8b0 [ 613.331397][T12132] netdev_register_kobject+0xfc/0x230 [ 613.336795][T12132] register_netdevice+0x680/0xb40 [ 613.341853][T12132] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 613.348117][T12132] ? rtnl_is_locked+0x15/0x20 [ 613.352861][T12132] ? netdev_rx_handler_register+0x11a/0x140 [ 613.358775][T12132] macvlan_common_newlink+0xa1b/0xbc0 [ 613.364239][T12132] macvtap_newlink+0xf6/0x150 [ 613.369011][T12132] ? macvtap_setup+0x30/0x30 [ 613.373613][T12132] rtnl_newlink+0xee5/0x1670 [ 613.378221][T12132] ? cgroup_rstat_updated+0x8c/0x1c0 [ 613.383555][T12132] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 613.389872][T12132] ? _raw_spin_unlock+0x26/0x40 [ 613.394746][T12132] ? __mutex_lock+0x21c/0x8d0 [ 613.399443][T12132] ? rtnl_setlink+0x300/0x300 [ 613.404208][T12132] rtnetlink_rcv_msg+0x807/0x8c0 [ 613.409215][T12132] ? memcg_list_lru_alloc+0xd5/0x750 [ 613.414517][T12132] ? should_fail_ex+0x2d/0x230 [ 613.419365][T12132] ? slab_post_alloc_hook+0x8c/0x340 [ 613.424668][T12132] ? xas_load+0x3ae/0x3c0 [ 613.429107][T12132] ? skb_release_data+0x53d/0x550 [ 613.434179][T12132] ? kmem_cache_free+0x1db/0x3a0 [ 613.439162][T12132] ? __kfree_skb+0x104/0x140 [ 613.443798][T12132] ? nlmon_xmit+0x4b/0x60 [ 613.448140][T12132] ? __kfree_skb+0x104/0x140 [ 613.452752][T12132] ? consume_skb+0x57/0x180 [ 613.457339][T12132] ? nlmon_xmit+0x4b/0x60 [ 613.461705][T12132] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 613.467006][T12132] ? __dev_queue_xmit+0xad9/0x1e20 [ 613.472128][T12132] ? ref_tracker_free+0x3a1/0x400 [ 613.477302][T12132] netlink_rcv_skb+0x126/0x220 [ 613.482087][T12132] ? rtnetlink_bind+0x60/0x60 [ 613.486795][T12132] rtnetlink_rcv+0x1c/0x20 [ 613.491341][T12132] netlink_unicast+0x589/0x650 [ 613.496193][T12132] netlink_sendmsg+0x66e/0x770 [ 613.501058][T12132] ? netlink_getsockopt+0x3e0/0x3e0 [ 613.506336][T12132] ____sys_sendmsg+0x37c/0x4d0 [ 613.511129][T12132] __sys_sendmsg+0x1e9/0x270 [ 613.515750][T12132] __x64_sys_sendmsg+0x46/0x50 [ 613.520534][T12132] do_syscall_64+0x41/0xc0 [ 613.525031][T12132] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 613.530945][T12132] RIP: 0033:0x7f7514d76ae9 [ 613.535368][T12132] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 613.555035][T12132] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 613.563457][T12132] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 613.571437][T12132] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 613.579480][T12132] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 613.587480][T12132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.595457][T12132] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 613.603522][T12132] [ 613.615542][T12137] ipvlan8: entered promiscuous mode 03:42:36 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xa3, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x1) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) r0 = socket(0x25, 0x1, 0x0) write$selinux_attr(r0, 0x0, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x4, 0x8000, 0x20000130, 0x20000282, 0x10000], 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x78) 03:42:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 51) 03:42:36 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 613.647734][T12144] macvtap7: entered allmulticast mode [ 613.653273][T12144] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 613.662630][T12144] team0: Device macvtap7 is already an upper device of the team interface 03:42:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r2 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001380)=@nat={'nat\x00', 0x19, 0x5, 0xffe, [0x20000380, 0x0, 0x0, 0x200006a4, 0x200008f8], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x5, 0x17, 'pimreg1\x00', 'vlan0\x00', 'veth1_to_bridge\x00', 'lo\x00', @multicast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@random="d4d2b489f4fc", 0xffffffffffffffff}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffe}}}}, {0x11, 0x12, 0x88ca, 'pim6reg1\x00', 'veth1_macvtap\x00', 'batadv0\x00', 'bridge_slave_0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0x7f], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xae, 0xe6, 0x216, [@owner={{'owner\x00', 0x0, 0x18}, {{0xffffffffffffffff, r1, 0x0, r2, 0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:faillog_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x9, 0x28, 0x6003, 'pimreg1\x00', 'veth1_macvtap\x00', 'geneve0\x00', 'netdevsim0\x00', @random="95c9c0ebddca", [0x2fe568696a139dd9, 0xff, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0xae, 0xe6, [@connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x8000000000000001}], 0x0, 0x1}}}], [], @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}, {0x3, 0x54, 0x7, 'macvlan0\x00', 'pimreg1\x00', 'bridge_slave_0\x00', 'veth1_vlan\x00', @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x3d268a82ae6d3adf, 0xff], 0xbe, 0xf6, 0x13e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0x6, {0x400}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x11, 0x26, 0x88e7, 'veth1_to_bond\x00', 'macsec0\x00', 'veth0_to_hsr\x00', 'veth0_to_bond\x00', @multicast, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x9be, 0x9f6, 0xa26, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0x788431c851a2a1d5, 0xff000000], [0xffffff00, 0x0, 0xff, 0xffffff00], 0x81, 0x66, 0x2, 0x38, 0x4e24, 0x4e21, 0x4e22, 0x4e21}}}, @among={{'among\x00', 0x0, 0x8b0}, {{@zero, @zero, 0x0, {[0x14, 0x1f, 0x8, 0x6, 0x2201, 0x8001, 0x0, 0x1ff, 0x9, 0x1, 0xff, 0x9, 0x2, 0x7, 0xab4, 0xd60a, 0x9, 0x3, 0x200, 0x2, 0x1, 0x400, 0x1, 0x7f, 0x0, 0x6, 0x8, 0x7, 0x1, 0xfff, 0x8, 0xc27c, 0x7f, 0x8, 0x2, 0xffffff01, 0x0, 0xfffffc01, 0x0, 0x6, 0xb9, 0x5, 0x6, 0x71e3, 0x785, 0x1d5a, 0x7f, 0x0, 0x3, 0xd11, 0x7f, 0x3, 0xe98, 0x2, 0x8000, 0x3, 0x384f, 0x97b, 0x21, 0x7f, 0x3f0, 0x6, 0x5, 0x100, 0x6, 0x1, 0x1, 0x4, 0x1eed, 0x10001, 0x2, 0x4, 0x1, 0x2, 0xde, 0x7fff, 0xfd3f, 0x3ff, 0x8, 0x7, 0xa89, 0x1, 0x64, 0x7fffffff, 0x1, 0xc94, 0x6, 0x8001, 0x2, 0x7, 0x3ff, 0xbf7a, 0xfff, 0x1, 0x4d21, 0x7, 0x1, 0x7ff, 0x3ff, 0x40000000, 0xfffffd09, 0x8, 0x7e25, 0x8, 0x81, 0x5, 0x1, 0x3, 0x10000, 0x3, 0x0, 0x7, 0x5, 0x100, 0x8, 0x68c10e65, 0x81, 0x80000001, 0x27e1, 0x1, 0x20, 0x8000, 0xddb, 0x10001, 0x9, 0x1ff, 0x81, 0x1, 0x2, 0x1, 0x7fff, 0x1000, 0xffffff80, 0x8001, 0x7, 0x0, 0x5, 0x0, 0x6739, 0xff, 0x6, 0x100, 0x1, 0x80000001, 0x800, 0xa9d7, 0xff, 0x3, 0xfffffe00, 0x7, 0x200000, 0x7, 0x3ff, 0xe3a, 0x8000, 0x8, 0x7, 0x3, 0x70000000, 0x159, 0x1, 0x7fffffff, 0xffff, 0x6, 0x3, 0xfffffffb, 0x9, 0x8000, 0x7, 0x800, 0x97, 0x2df, 0x6, 0xffffffff, 0x800, 0x3a3, 0x1, 0xa478, 0x6, 0x66, 0x0, 0xffff, 0x40, 0x9005, 0x1, 0x400, 0x6, 0x0, 0x200, 0xffffffff, 0x82, 0x0, 0x6, 0x5, 0xbd, 0x2, 0x200, 0x800, 0x17d, 0x3, 0x6, 0xfffffffb, 0x7, 0x7fffffff, 0x8, 0x4, 0x2, 0x400, 0x4, 0x3, 0x101, 0x2, 0x1, 0x3, 0x1000, 0x209, 0x8, 0x1, 0x7, 0x5, 0xfffffffe, 0x9, 0x9, 0xe2, 0x1, 0x1, 0x5, 0x200, 0x0, 0x9, 0x1ff, 0x4, 0x8, 0x8000, 0x5, 0x5, 0x5, 0xfff, 0x3, 0x97ef, 0x81, 0x1f, 0xc0000000, 0x2, 0x5, 0x3, 0x6, 0x38, 0x0, 0xa4, 0x7ff, 0x1, 0x4, 0x80000001, 0x1ff8, 0x8, 0x4], 0x6, [{[0x4, 0x19], @private=0xa010102}, {[0x9, 0xfffffffe], @private=0xa010101}, {[0x10001, 0x8], @remote}, {[0x3, 0x200], @multicast2}, {[0xfffffffa], @multicast2}, {[0x41f5, 0x3ff], @private=0xa010101}]}, {[0x6, 0x15fa, 0x2, 0x1, 0x7fff, 0x7f, 0x4711, 0xd645, 0x4, 0x5, 0x9, 0x2, 0x4, 0x6, 0xfaf, 0x0, 0x8, 0x74, 0x3, 0x5, 0x3c5, 0x8000, 0x81, 0x100, 0x1ff, 0x7fffffff, 0xfffffffa, 0x7, 0x5, 0x7, 0x4, 0x6d, 0x3, 0x7, 0x5eb, 0x8001, 0x8, 0x3187, 0x2, 0xac80, 0x0, 0x9, 0x2, 0x9, 0xfff, 0x4, 0xafac, 0x6, 0xfffffffc, 0x7000000, 0x5, 0x1, 0xfff, 0x9, 0xa8ae, 0xfffffff8, 0xdaeb, 0x77, 0x10, 0x80, 0x1, 0x200, 0x5, 0x7, 0x80, 0x772, 0x7, 0x1000, 0x7ff, 0x5, 0x401, 0x4, 0x1b6, 0x8, 0xb5f5, 0x9, 0x5, 0xab2, 0x6, 0x80, 0x45, 0x7fffffff, 0x6, 0x9, 0x3ff, 0x80000001, 0x2, 0x5, 0x9, 0x2, 0x8, 0xff, 0x1, 0x0, 0x3, 0x5, 0x7, 0x8, 0x5, 0x3f, 0x3, 0x8, 0x3, 0x7, 0x7ed7d2d5, 0x9, 0xb3, 0xffff, 0x1, 0x3, 0x4, 0xff, 0x5, 0x401, 0x80000001, 0x3, 0x9, 0x0, 0x4, 0x5, 0x3, 0x100, 0x1, 0xcc1, 0x12b, 0x0, 0x8, 0x9, 0x9, 0x2, 0x0, 0x800, 0x3fe0000, 0x4, 0x3, 0x0, 0x7, 0x400, 0x3, 0x80000000, 0x10001, 0xffff, 0x6, 0x4, 0x8, 0x3f, 0x2, 0xff, 0x8, 0x0, 0x2, 0x2, 0x0, 0x66c74ccc, 0x7f, 0x7ff, 0x1, 0xffff, 0x2, 0x9, 0x100, 0x27a, 0x6b, 0x0, 0xbb2, 0x3, 0x4, 0x7, 0x8, 0x1, 0x8000, 0x6abd, 0x100, 0xfffffffd, 0xb3, 0xfffffffa, 0x3, 0x6, 0x200, 0x2, 0x400, 0xfffffffd, 0xa0c, 0x7, 0xffff, 0x9, 0x9, 0x401, 0xfffffe00, 0x2, 0x1, 0xabc1, 0x2, 0x4, 0xfff, 0xfffffffe, 0x3, 0x1, 0x0, 0x0, 0x80000000, 0x7fff, 0x80, 0x401, 0x3, 0x1, 0xe3fe, 0x1, 0x7, 0x4, 0x9, 0x5, 0x7, 0x5d2, 0x6, 0x0, 0x1, 0x1000, 0x7, 0xfff, 0x3ff, 0x8af6, 0x9, 0x2, 0x1, 0x0, 0x8, 0x0, 0x5, 0x80000000, 0x7, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x8, 0x5, 0x3, 0x7, 0x6, 0x3, 0x7, 0x3, 0xffffffff, 0x9, 0x1f8, 0x6, 0x1f, 0x5, 0x8000, 0xfbb, 0x2, 0x7, 0x6a6, 0x30f6], 0x6, [{[0x2, 0x3f], @private=0xa010101}, {[0x3, 0x467], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x3746], @multicast1}, {[0x2, 0x101], @multicast2}, {[0x3, 0x4], @multicast1}, {[0xc593, 0x3], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}]}]}, 0x1076) [ 613.711984][T12154] FAULT_INJECTION: forcing a failure. [ 613.711984][T12154] name failslab, interval 1, probability 0, space 0, times 0 [ 613.724702][T12154] CPU: 1 PID: 12154 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 613.735159][T12154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 613.745234][T12154] Call Trace: [ 613.748514][T12154] [ 613.751480][T12154] dump_stack_lvl+0xda/0x130 [ 613.756266][T12154] dump_stack+0x15/0x20 [ 613.760450][T12154] should_fail_ex+0x21f/0x230 [ 613.765131][T12154] __should_failslab+0x92/0xa0 [ 613.770055][T12154] should_failslab+0x9/0x20 [ 613.774619][T12154] slab_pre_alloc_hook+0x38/0x180 [ 613.779668][T12154] kmem_cache_alloc+0x52/0x220 [ 613.784460][T12154] ? __kernfs_new_node+0x6a/0x380 [ 613.789609][T12154] __kernfs_new_node+0x6a/0x380 [ 613.794471][T12154] ? rb_insert_color+0x6a/0x290 [ 613.799378][T12154] ? up_write+0x30/0xe0 [ 613.803604][T12154] ? kernfs_activate+0x252/0x270 [ 613.808598][T12154] kernfs_new_node+0x5f/0xd0 [ 613.813269][T12154] __kernfs_create_file+0x49/0x180 [ 613.818399][T12154] ? dev_attr_show+0x90/0x90 [ 613.823003][T12154] sysfs_add_file_mode_ns+0x136/0x1b0 [ 613.828397][T12154] internal_create_group+0x2e4/0x800 [ 613.833700][T12154] sysfs_create_groups+0x3c/0xe0 [ 613.838697][T12154] device_add_attrs+0x69/0x400 [ 613.843484][T12154] ? kobject_put+0xd8/0x160 [ 613.848001][T12154] device_add+0x431/0x8b0 [ 613.852420][T12154] netdev_register_kobject+0xfc/0x230 [ 613.857806][T12154] register_netdevice+0x680/0xb40 [ 613.862877][T12154] ? rtnl_is_locked+0x15/0x20 [ 613.867561][T12154] ? netdev_rx_handler_register+0x11a/0x140 [ 613.873466][T12154] macvlan_common_newlink+0xa1b/0xbc0 [ 613.878955][T12154] macvtap_newlink+0xf6/0x150 [ 613.883647][T12154] ? macvtap_setup+0x30/0x30 [ 613.888256][T12154] rtnl_newlink+0xee5/0x1670 [ 613.892958][T12154] ? cgroup_rstat_updated+0x8c/0x1c0 [ 613.898289][T12154] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 613.904553][T12154] ? _raw_spin_unlock+0x26/0x40 [ 613.909420][T12154] ? __mutex_lock+0x21c/0x8d0 [ 613.914190][T12154] ? rtnl_setlink+0x300/0x300 [ 613.918907][T12154] rtnetlink_rcv_msg+0x807/0x8c0 [ 613.923914][T12154] ? memcg_list_lru_alloc+0xd5/0x750 [ 613.929245][T12154] ? should_fail_ex+0x2d/0x230 [ 613.934111][T12154] ? slab_post_alloc_hook+0x8c/0x340 [ 613.939460][T12154] ? xas_load+0x3ae/0x3c0 [ 613.943792][T12154] ? skb_release_data+0x53d/0x550 [ 613.948848][T12154] ? kmem_cache_free+0x1db/0x3a0 [ 613.953878][T12154] ? __kfree_skb+0x104/0x140 [ 613.958563][T12154] ? nlmon_xmit+0x4b/0x60 [ 613.962972][T12154] ? __kfree_skb+0x104/0x140 [ 613.967611][T12154] ? consume_skb+0x57/0x180 [ 613.972233][T12154] ? nlmon_xmit+0x4b/0x60 [ 613.976583][T12154] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 613.981888][T12154] ? __dev_queue_xmit+0xad9/0x1e20 [ 613.987112][T12154] ? ref_tracker_free+0x3a1/0x400 [ 613.992161][T12154] netlink_rcv_skb+0x126/0x220 [ 613.996939][T12154] ? rtnetlink_bind+0x60/0x60 [ 614.001637][T12154] rtnetlink_rcv+0x1c/0x20 [ 614.006096][T12154] netlink_unicast+0x589/0x650 [ 614.010921][T12154] netlink_sendmsg+0x66e/0x770 [ 614.015744][T12154] ? netlink_getsockopt+0x3e0/0x3e0 [ 614.020952][T12154] ____sys_sendmsg+0x37c/0x4d0 [ 614.025733][T12154] __sys_sendmsg+0x1e9/0x270 [ 614.030353][T12154] __x64_sys_sendmsg+0x46/0x50 [ 614.035161][T12154] do_syscall_64+0x41/0xc0 [ 614.039634][T12154] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 614.045608][T12154] RIP: 0033:0x7f7514d76ae9 [ 614.050021][T12154] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 614.069640][T12154] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 614.078055][T12154] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 614.086106][T12154] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 614.094111][T12154] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 614.102094][T12154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r2 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001380)=@nat={'nat\x00', 0x19, 0x5, 0xffe, [0x20000380, 0x0, 0x0, 0x200006a4, 0x200008f8], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x5, 0x17, 'pimreg1\x00', 'vlan0\x00', 'veth1_to_bridge\x00', 'lo\x00', @multicast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@random="d4d2b489f4fc", 0xffffffffffffffff}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffe}}}}, {0x11, 0x12, 0x88ca, 'pim6reg1\x00', 'veth1_macvtap\x00', 'batadv0\x00', 'bridge_slave_0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0x7f], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xae, 0xe6, 0x216, [@owner={{'owner\x00', 0x0, 0x18}, {{0xffffffffffffffff, r1, 0x0, r2, 0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:faillog_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x9, 0x28, 0x6003, 'pimreg1\x00', 'veth1_macvtap\x00', 'geneve0\x00', 'netdevsim0\x00', @random="95c9c0ebddca", [0x2fe568696a139dd9, 0xff, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0xae, 0xe6, [@connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x8000000000000001}], 0x0, 0x1}}}], [], @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}, {0x3, 0x54, 0x7, 'macvlan0\x00', 'pimreg1\x00', 'bridge_slave_0\x00', 'veth1_vlan\x00', @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x3d268a82ae6d3adf, 0xff], 0xbe, 0xf6, 0x13e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0x6, {0x400}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x11, 0x26, 0x88e7, 'veth1_to_bond\x00', 'macsec0\x00', 'veth0_to_hsr\x00', 'veth0_to_bond\x00', @multicast, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x9be, 0x9f6, 0xa26, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0x788431c851a2a1d5, 0xff000000], [0xffffff00, 0x0, 0xff, 0xffffff00], 0x81, 0x66, 0x2, 0x38, 0x4e24, 0x4e21, 0x4e22, 0x4e21}}}, @among={{'among\x00', 0x0, 0x8b0}, {{@zero, @zero, 0x0, {[0x14, 0x1f, 0x8, 0x6, 0x2201, 0x8001, 0x0, 0x1ff, 0x9, 0x1, 0xff, 0x9, 0x2, 0x7, 0xab4, 0xd60a, 0x9, 0x3, 0x200, 0x2, 0x1, 0x400, 0x1, 0x7f, 0x0, 0x6, 0x8, 0x7, 0x1, 0xfff, 0x8, 0xc27c, 0x7f, 0x8, 0x2, 0xffffff01, 0x0, 0xfffffc01, 0x0, 0x6, 0xb9, 0x5, 0x6, 0x71e3, 0x785, 0x1d5a, 0x7f, 0x0, 0x3, 0xd11, 0x7f, 0x3, 0xe98, 0x2, 0x8000, 0x3, 0x384f, 0x97b, 0x21, 0x7f, 0x3f0, 0x6, 0x5, 0x100, 0x6, 0x1, 0x1, 0x4, 0x1eed, 0x10001, 0x2, 0x4, 0x1, 0x2, 0xde, 0x7fff, 0xfd3f, 0x3ff, 0x8, 0x7, 0xa89, 0x1, 0x64, 0x7fffffff, 0x1, 0xc94, 0x6, 0x8001, 0x2, 0x7, 0x3ff, 0xbf7a, 0xfff, 0x1, 0x4d21, 0x7, 0x1, 0x7ff, 0x3ff, 0x40000000, 0xfffffd09, 0x8, 0x7e25, 0x8, 0x81, 0x5, 0x1, 0x3, 0x10000, 0x3, 0x0, 0x7, 0x5, 0x100, 0x8, 0x68c10e65, 0x81, 0x80000001, 0x27e1, 0x1, 0x20, 0x8000, 0xddb, 0x10001, 0x9, 0x1ff, 0x81, 0x1, 0x2, 0x1, 0x7fff, 0x1000, 0xffffff80, 0x8001, 0x7, 0x0, 0x5, 0x0, 0x6739, 0xff, 0x6, 0x100, 0x1, 0x80000001, 0x800, 0xa9d7, 0xff, 0x3, 0xfffffe00, 0x7, 0x200000, 0x7, 0x3ff, 0xe3a, 0x8000, 0x8, 0x7, 0x3, 0x70000000, 0x159, 0x1, 0x7fffffff, 0xffff, 0x6, 0x3, 0xfffffffb, 0x9, 0x8000, 0x7, 0x800, 0x97, 0x2df, 0x6, 0xffffffff, 0x800, 0x3a3, 0x1, 0xa478, 0x6, 0x66, 0x0, 0xffff, 0x40, 0x9005, 0x1, 0x400, 0x6, 0x0, 0x200, 0xffffffff, 0x82, 0x0, 0x6, 0x5, 0xbd, 0x2, 0x200, 0x800, 0x17d, 0x3, 0x6, 0xfffffffb, 0x7, 0x7fffffff, 0x8, 0x4, 0x2, 0x400, 0x4, 0x3, 0x101, 0x2, 0x1, 0x3, 0x1000, 0x209, 0x8, 0x1, 0x7, 0x5, 0xfffffffe, 0x9, 0x9, 0xe2, 0x1, 0x1, 0x5, 0x200, 0x0, 0x9, 0x1ff, 0x4, 0x8, 0x8000, 0x5, 0x5, 0x5, 0xfff, 0x3, 0x97ef, 0x81, 0x1f, 0xc0000000, 0x2, 0x5, 0x3, 0x6, 0x38, 0x0, 0xa4, 0x7ff, 0x1, 0x4, 0x80000001, 0x1ff8, 0x8, 0x4], 0x6, [{[0x4, 0x19], @private=0xa010102}, {[0x9, 0xfffffffe], @private=0xa010101}, {[0x10001, 0x8], @remote}, {[0x3, 0x200], @multicast2}, {[0xfffffffa], @multicast2}, {[0x41f5, 0x3ff], @private=0xa010101}]}, {[0x6, 0x15fa, 0x2, 0x1, 0x7fff, 0x7f, 0x4711, 0xd645, 0x4, 0x5, 0x9, 0x2, 0x4, 0x6, 0xfaf, 0x0, 0x8, 0x74, 0x3, 0x5, 0x3c5, 0x8000, 0x81, 0x100, 0x1ff, 0x7fffffff, 0xfffffffa, 0x7, 0x5, 0x7, 0x4, 0x6d, 0x3, 0x7, 0x5eb, 0x8001, 0x8, 0x3187, 0x2, 0xac80, 0x0, 0x9, 0x2, 0x9, 0xfff, 0x4, 0xafac, 0x6, 0xfffffffc, 0x7000000, 0x5, 0x1, 0xfff, 0x9, 0xa8ae, 0xfffffff8, 0xdaeb, 0x77, 0x10, 0x80, 0x1, 0x200, 0x5, 0x7, 0x80, 0x772, 0x7, 0x1000, 0x7ff, 0x5, 0x401, 0x4, 0x1b6, 0x8, 0xb5f5, 0x9, 0x5, 0xab2, 0x6, 0x80, 0x45, 0x7fffffff, 0x6, 0x9, 0x3ff, 0x80000001, 0x2, 0x5, 0x9, 0x2, 0x8, 0xff, 0x1, 0x0, 0x3, 0x5, 0x7, 0x8, 0x5, 0x3f, 0x3, 0x8, 0x3, 0x7, 0x7ed7d2d5, 0x9, 0xb3, 0xffff, 0x1, 0x3, 0x4, 0xff, 0x5, 0x401, 0x80000001, 0x3, 0x9, 0x0, 0x4, 0x5, 0x3, 0x100, 0x1, 0xcc1, 0x12b, 0x0, 0x8, 0x9, 0x9, 0x2, 0x0, 0x800, 0x3fe0000, 0x4, 0x3, 0x0, 0x7, 0x400, 0x3, 0x80000000, 0x10001, 0xffff, 0x6, 0x4, 0x8, 0x3f, 0x2, 0xff, 0x8, 0x0, 0x2, 0x2, 0x0, 0x66c74ccc, 0x7f, 0x7ff, 0x1, 0xffff, 0x2, 0x9, 0x100, 0x27a, 0x6b, 0x0, 0xbb2, 0x3, 0x4, 0x7, 0x8, 0x1, 0x8000, 0x6abd, 0x100, 0xfffffffd, 0xb3, 0xfffffffa, 0x3, 0x6, 0x200, 0x2, 0x400, 0xfffffffd, 0xa0c, 0x7, 0xffff, 0x9, 0x9, 0x401, 0xfffffe00, 0x2, 0x1, 0xabc1, 0x2, 0x4, 0xfff, 0xfffffffe, 0x3, 0x1, 0x0, 0x0, 0x80000000, 0x7fff, 0x80, 0x401, 0x3, 0x1, 0xe3fe, 0x1, 0x7, 0x4, 0x9, 0x5, 0x7, 0x5d2, 0x6, 0x0, 0x1, 0x1000, 0x7, 0xfff, 0x3ff, 0x8af6, 0x9, 0x2, 0x1, 0x0, 0x8, 0x0, 0x5, 0x80000000, 0x7, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x8, 0x5, 0x3, 0x7, 0x6, 0x3, 0x7, 0x3, 0xffffffff, 0x9, 0x1f8, 0x6, 0x1f, 0x5, 0x8000, 0xfbb, 0x2, 0x7, 0x6a6, 0x30f6], 0x6, [{[0x2, 0x3f], @private=0xa010101}, {[0x3, 0x467], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x3746], @multicast1}, {[0x2, 0x101], @multicast2}, {[0x3, 0x4], @multicast1}, {[0xc593, 0x3], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}]}]}, 0x1076) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) (async) getegid() (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001380)=@nat={'nat\x00', 0x19, 0x5, 0xffe, [0x20000380, 0x0, 0x0, 0x200006a4, 0x200008f8], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x5, 0x17, 'pimreg1\x00', 'vlan0\x00', 'veth1_to_bridge\x00', 'lo\x00', @multicast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@random="d4d2b489f4fc", 0xffffffffffffffff}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffe}}}}, {0x11, 0x12, 0x88ca, 'pim6reg1\x00', 'veth1_macvtap\x00', 'batadv0\x00', 'bridge_slave_0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0x7f], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xae, 0xe6, 0x216, [@owner={{'owner\x00', 0x0, 0x18}, {{0xffffffffffffffff, r1, 0x0, r2, 0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:faillog_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x9, 0x28, 0x6003, 'pimreg1\x00', 'veth1_macvtap\x00', 'geneve0\x00', 'netdevsim0\x00', @random="95c9c0ebddca", [0x2fe568696a139dd9, 0xff, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0xae, 0xe6, [@connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x8000000000000001}], 0x0, 0x1}}}], [], @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}, {0x3, 0x54, 0x7, 'macvlan0\x00', 'pimreg1\x00', 'bridge_slave_0\x00', 'veth1_vlan\x00', @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x3d268a82ae6d3adf, 0xff], 0xbe, 0xf6, 0x13e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0x6, {0x400}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x11, 0x26, 0x88e7, 'veth1_to_bond\x00', 'macsec0\x00', 'veth0_to_hsr\x00', 'veth0_to_bond\x00', @multicast, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x9be, 0x9f6, 0xa26, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0x788431c851a2a1d5, 0xff000000], [0xffffff00, 0x0, 0xff, 0xffffff00], 0x81, 0x66, 0x2, 0x38, 0x4e24, 0x4e21, 0x4e22, 0x4e21}}}, @among={{'among\x00', 0x0, 0x8b0}, {{@zero, @zero, 0x0, {[0x14, 0x1f, 0x8, 0x6, 0x2201, 0x8001, 0x0, 0x1ff, 0x9, 0x1, 0xff, 0x9, 0x2, 0x7, 0xab4, 0xd60a, 0x9, 0x3, 0x200, 0x2, 0x1, 0x400, 0x1, 0x7f, 0x0, 0x6, 0x8, 0x7, 0x1, 0xfff, 0x8, 0xc27c, 0x7f, 0x8, 0x2, 0xffffff01, 0x0, 0xfffffc01, 0x0, 0x6, 0xb9, 0x5, 0x6, 0x71e3, 0x785, 0x1d5a, 0x7f, 0x0, 0x3, 0xd11, 0x7f, 0x3, 0xe98, 0x2, 0x8000, 0x3, 0x384f, 0x97b, 0x21, 0x7f, 0x3f0, 0x6, 0x5, 0x100, 0x6, 0x1, 0x1, 0x4, 0x1eed, 0x10001, 0x2, 0x4, 0x1, 0x2, 0xde, 0x7fff, 0xfd3f, 0x3ff, 0x8, 0x7, 0xa89, 0x1, 0x64, 0x7fffffff, 0x1, 0xc94, 0x6, 0x8001, 0x2, 0x7, 0x3ff, 0xbf7a, 0xfff, 0x1, 0x4d21, 0x7, 0x1, 0x7ff, 0x3ff, 0x40000000, 0xfffffd09, 0x8, 0x7e25, 0x8, 0x81, 0x5, 0x1, 0x3, 0x10000, 0x3, 0x0, 0x7, 0x5, 0x100, 0x8, 0x68c10e65, 0x81, 0x80000001, 0x27e1, 0x1, 0x20, 0x8000, 0xddb, 0x10001, 0x9, 0x1ff, 0x81, 0x1, 0x2, 0x1, 0x7fff, 0x1000, 0xffffff80, 0x8001, 0x7, 0x0, 0x5, 0x0, 0x6739, 0xff, 0x6, 0x100, 0x1, 0x80000001, 0x800, 0xa9d7, 0xff, 0x3, 0xfffffe00, 0x7, 0x200000, 0x7, 0x3ff, 0xe3a, 0x8000, 0x8, 0x7, 0x3, 0x70000000, 0x159, 0x1, 0x7fffffff, 0xffff, 0x6, 0x3, 0xfffffffb, 0x9, 0x8000, 0x7, 0x800, 0x97, 0x2df, 0x6, 0xffffffff, 0x800, 0x3a3, 0x1, 0xa478, 0x6, 0x66, 0x0, 0xffff, 0x40, 0x9005, 0x1, 0x400, 0x6, 0x0, 0x200, 0xffffffff, 0x82, 0x0, 0x6, 0x5, 0xbd, 0x2, 0x200, 0x800, 0x17d, 0x3, 0x6, 0xfffffffb, 0x7, 0x7fffffff, 0x8, 0x4, 0x2, 0x400, 0x4, 0x3, 0x101, 0x2, 0x1, 0x3, 0x1000, 0x209, 0x8, 0x1, 0x7, 0x5, 0xfffffffe, 0x9, 0x9, 0xe2, 0x1, 0x1, 0x5, 0x200, 0x0, 0x9, 0x1ff, 0x4, 0x8, 0x8000, 0x5, 0x5, 0x5, 0xfff, 0x3, 0x97ef, 0x81, 0x1f, 0xc0000000, 0x2, 0x5, 0x3, 0x6, 0x38, 0x0, 0xa4, 0x7ff, 0x1, 0x4, 0x80000001, 0x1ff8, 0x8, 0x4], 0x6, [{[0x4, 0x19], @private=0xa010102}, {[0x9, 0xfffffffe], @private=0xa010101}, {[0x10001, 0x8], @remote}, {[0x3, 0x200], @multicast2}, {[0xfffffffa], @multicast2}, {[0x41f5, 0x3ff], @private=0xa010101}]}, {[0x6, 0x15fa, 0x2, 0x1, 0x7fff, 0x7f, 0x4711, 0xd645, 0x4, 0x5, 0x9, 0x2, 0x4, 0x6, 0xfaf, 0x0, 0x8, 0x74, 0x3, 0x5, 0x3c5, 0x8000, 0x81, 0x100, 0x1ff, 0x7fffffff, 0xfffffffa, 0x7, 0x5, 0x7, 0x4, 0x6d, 0x3, 0x7, 0x5eb, 0x8001, 0x8, 0x3187, 0x2, 0xac80, 0x0, 0x9, 0x2, 0x9, 0xfff, 0x4, 0xafac, 0x6, 0xfffffffc, 0x7000000, 0x5, 0x1, 0xfff, 0x9, 0xa8ae, 0xfffffff8, 0xdaeb, 0x77, 0x10, 0x80, 0x1, 0x200, 0x5, 0x7, 0x80, 0x772, 0x7, 0x1000, 0x7ff, 0x5, 0x401, 0x4, 0x1b6, 0x8, 0xb5f5, 0x9, 0x5, 0xab2, 0x6, 0x80, 0x45, 0x7fffffff, 0x6, 0x9, 0x3ff, 0x80000001, 0x2, 0x5, 0x9, 0x2, 0x8, 0xff, 0x1, 0x0, 0x3, 0x5, 0x7, 0x8, 0x5, 0x3f, 0x3, 0x8, 0x3, 0x7, 0x7ed7d2d5, 0x9, 0xb3, 0xffff, 0x1, 0x3, 0x4, 0xff, 0x5, 0x401, 0x80000001, 0x3, 0x9, 0x0, 0x4, 0x5, 0x3, 0x100, 0x1, 0xcc1, 0x12b, 0x0, 0x8, 0x9, 0x9, 0x2, 0x0, 0x800, 0x3fe0000, 0x4, 0x3, 0x0, 0x7, 0x400, 0x3, 0x80000000, 0x10001, 0xffff, 0x6, 0x4, 0x8, 0x3f, 0x2, 0xff, 0x8, 0x0, 0x2, 0x2, 0x0, 0x66c74ccc, 0x7f, 0x7ff, 0x1, 0xffff, 0x2, 0x9, 0x100, 0x27a, 0x6b, 0x0, 0xbb2, 0x3, 0x4, 0x7, 0x8, 0x1, 0x8000, 0x6abd, 0x100, 0xfffffffd, 0xb3, 0xfffffffa, 0x3, 0x6, 0x200, 0x2, 0x400, 0xfffffffd, 0xa0c, 0x7, 0xffff, 0x9, 0x9, 0x401, 0xfffffe00, 0x2, 0x1, 0xabc1, 0x2, 0x4, 0xfff, 0xfffffffe, 0x3, 0x1, 0x0, 0x0, 0x80000000, 0x7fff, 0x80, 0x401, 0x3, 0x1, 0xe3fe, 0x1, 0x7, 0x4, 0x9, 0x5, 0x7, 0x5d2, 0x6, 0x0, 0x1, 0x1000, 0x7, 0xfff, 0x3ff, 0x8af6, 0x9, 0x2, 0x1, 0x0, 0x8, 0x0, 0x5, 0x80000000, 0x7, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x8, 0x5, 0x3, 0x7, 0x6, 0x3, 0x7, 0x3, 0xffffffff, 0x9, 0x1f8, 0x6, 0x1f, 0x5, 0x8000, 0xfbb, 0x2, 0x7, 0x6a6, 0x30f6], 0x6, [{[0x2, 0x3f], @private=0xa010101}, {[0x3, 0x467], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x3746], @multicast1}, {[0x2, 0x101], @multicast2}, {[0x3, 0x4], @multicast1}, {[0xc593, 0x3], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}]}]}, 0x1076) (async) 03:42:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x41b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 52) [ 614.110102][T12154] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 614.118083][T12154] [ 614.130581][T12153] macvtap78: entered allmulticast mode [ 614.140045][T12153] 8021q: adding VLAN 0 to HW filter on device macvtap78 03:42:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x340, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) getegid() (async) r2 = getegid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001380)=@nat={'nat\x00', 0x19, 0x5, 0xffe, [0x20000380, 0x0, 0x0, 0x200006a4, 0x200008f8], 0x0, &(0x7f0000000080), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x5, 0x17, 'pimreg1\x00', 'vlan0\x00', 'veth1_to_bridge\x00', 'lo\x00', @multicast, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff], 0x6e, 0xa6, 0xde, [], [@arpreply={'arpreply\x00', 0x10, {{@random="d4d2b489f4fc", 0xffffffffffffffff}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffe}}}}, {0x11, 0x12, 0x88ca, 'pim6reg1\x00', 'veth1_macvtap\x00', 'batadv0\x00', 'bridge_slave_0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0x7f], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xae, 0xe6, 0x216, [@owner={{'owner\x00', 0x0, 0x18}, {{0xffffffffffffffff, r1, 0x0, r2, 0x8, 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:faillog_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{0x9, 0x28, 0x6003, 'pimreg1\x00', 'veth1_macvtap\x00', 'geneve0\x00', 'netdevsim0\x00', @random="95c9c0ebddca", [0x2fe568696a139dd9, 0xff, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0xae, 0xae, 0xe6, [@connbytes={{'connbytes\x00', 0x0, 0x18}, {{[{0x8000000000000001}], 0x0, 0x1}}}], [], @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}, {0x3, 0x54, 0x7, 'macvlan0\x00', 'pimreg1\x00', 'bridge_slave_0\x00', 'veth1_vlan\x00', @multicast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x3d268a82ae6d3adf, 0xff], 0xbe, 0xf6, 0x13e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x4}}}], [@snat={'snat\x00', 0x10, {{@empty, 0x10}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0x6, {0x400}}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{0x11, 0x26, 0x88e7, 'veth1_to_bond\x00', 'macsec0\x00', 'veth0_to_hsr\x00', 'veth0_to_bond\x00', @multicast, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x9be, 0x9f6, 0xa26, [@ip6={{'ip6\x00', 0x0, 0x50}, {{@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0x788431c851a2a1d5, 0xff000000], [0xffffff00, 0x0, 0xff, 0xffffff00], 0x81, 0x66, 0x2, 0x38, 0x4e24, 0x4e21, 0x4e22, 0x4e21}}}, @among={{'among\x00', 0x0, 0x8b0}, {{@zero, @zero, 0x0, {[0x14, 0x1f, 0x8, 0x6, 0x2201, 0x8001, 0x0, 0x1ff, 0x9, 0x1, 0xff, 0x9, 0x2, 0x7, 0xab4, 0xd60a, 0x9, 0x3, 0x200, 0x2, 0x1, 0x400, 0x1, 0x7f, 0x0, 0x6, 0x8, 0x7, 0x1, 0xfff, 0x8, 0xc27c, 0x7f, 0x8, 0x2, 0xffffff01, 0x0, 0xfffffc01, 0x0, 0x6, 0xb9, 0x5, 0x6, 0x71e3, 0x785, 0x1d5a, 0x7f, 0x0, 0x3, 0xd11, 0x7f, 0x3, 0xe98, 0x2, 0x8000, 0x3, 0x384f, 0x97b, 0x21, 0x7f, 0x3f0, 0x6, 0x5, 0x100, 0x6, 0x1, 0x1, 0x4, 0x1eed, 0x10001, 0x2, 0x4, 0x1, 0x2, 0xde, 0x7fff, 0xfd3f, 0x3ff, 0x8, 0x7, 0xa89, 0x1, 0x64, 0x7fffffff, 0x1, 0xc94, 0x6, 0x8001, 0x2, 0x7, 0x3ff, 0xbf7a, 0xfff, 0x1, 0x4d21, 0x7, 0x1, 0x7ff, 0x3ff, 0x40000000, 0xfffffd09, 0x8, 0x7e25, 0x8, 0x81, 0x5, 0x1, 0x3, 0x10000, 0x3, 0x0, 0x7, 0x5, 0x100, 0x8, 0x68c10e65, 0x81, 0x80000001, 0x27e1, 0x1, 0x20, 0x8000, 0xddb, 0x10001, 0x9, 0x1ff, 0x81, 0x1, 0x2, 0x1, 0x7fff, 0x1000, 0xffffff80, 0x8001, 0x7, 0x0, 0x5, 0x0, 0x6739, 0xff, 0x6, 0x100, 0x1, 0x80000001, 0x800, 0xa9d7, 0xff, 0x3, 0xfffffe00, 0x7, 0x200000, 0x7, 0x3ff, 0xe3a, 0x8000, 0x8, 0x7, 0x3, 0x70000000, 0x159, 0x1, 0x7fffffff, 0xffff, 0x6, 0x3, 0xfffffffb, 0x9, 0x8000, 0x7, 0x800, 0x97, 0x2df, 0x6, 0xffffffff, 0x800, 0x3a3, 0x1, 0xa478, 0x6, 0x66, 0x0, 0xffff, 0x40, 0x9005, 0x1, 0x400, 0x6, 0x0, 0x200, 0xffffffff, 0x82, 0x0, 0x6, 0x5, 0xbd, 0x2, 0x200, 0x800, 0x17d, 0x3, 0x6, 0xfffffffb, 0x7, 0x7fffffff, 0x8, 0x4, 0x2, 0x400, 0x4, 0x3, 0x101, 0x2, 0x1, 0x3, 0x1000, 0x209, 0x8, 0x1, 0x7, 0x5, 0xfffffffe, 0x9, 0x9, 0xe2, 0x1, 0x1, 0x5, 0x200, 0x0, 0x9, 0x1ff, 0x4, 0x8, 0x8000, 0x5, 0x5, 0x5, 0xfff, 0x3, 0x97ef, 0x81, 0x1f, 0xc0000000, 0x2, 0x5, 0x3, 0x6, 0x38, 0x0, 0xa4, 0x7ff, 0x1, 0x4, 0x80000001, 0x1ff8, 0x8, 0x4], 0x6, [{[0x4, 0x19], @private=0xa010102}, {[0x9, 0xfffffffe], @private=0xa010101}, {[0x10001, 0x8], @remote}, {[0x3, 0x200], @multicast2}, {[0xfffffffa], @multicast2}, {[0x41f5, 0x3ff], @private=0xa010101}]}, {[0x6, 0x15fa, 0x2, 0x1, 0x7fff, 0x7f, 0x4711, 0xd645, 0x4, 0x5, 0x9, 0x2, 0x4, 0x6, 0xfaf, 0x0, 0x8, 0x74, 0x3, 0x5, 0x3c5, 0x8000, 0x81, 0x100, 0x1ff, 0x7fffffff, 0xfffffffa, 0x7, 0x5, 0x7, 0x4, 0x6d, 0x3, 0x7, 0x5eb, 0x8001, 0x8, 0x3187, 0x2, 0xac80, 0x0, 0x9, 0x2, 0x9, 0xfff, 0x4, 0xafac, 0x6, 0xfffffffc, 0x7000000, 0x5, 0x1, 0xfff, 0x9, 0xa8ae, 0xfffffff8, 0xdaeb, 0x77, 0x10, 0x80, 0x1, 0x200, 0x5, 0x7, 0x80, 0x772, 0x7, 0x1000, 0x7ff, 0x5, 0x401, 0x4, 0x1b6, 0x8, 0xb5f5, 0x9, 0x5, 0xab2, 0x6, 0x80, 0x45, 0x7fffffff, 0x6, 0x9, 0x3ff, 0x80000001, 0x2, 0x5, 0x9, 0x2, 0x8, 0xff, 0x1, 0x0, 0x3, 0x5, 0x7, 0x8, 0x5, 0x3f, 0x3, 0x8, 0x3, 0x7, 0x7ed7d2d5, 0x9, 0xb3, 0xffff, 0x1, 0x3, 0x4, 0xff, 0x5, 0x401, 0x80000001, 0x3, 0x9, 0x0, 0x4, 0x5, 0x3, 0x100, 0x1, 0xcc1, 0x12b, 0x0, 0x8, 0x9, 0x9, 0x2, 0x0, 0x800, 0x3fe0000, 0x4, 0x3, 0x0, 0x7, 0x400, 0x3, 0x80000000, 0x10001, 0xffff, 0x6, 0x4, 0x8, 0x3f, 0x2, 0xff, 0x8, 0x0, 0x2, 0x2, 0x0, 0x66c74ccc, 0x7f, 0x7ff, 0x1, 0xffff, 0x2, 0x9, 0x100, 0x27a, 0x6b, 0x0, 0xbb2, 0x3, 0x4, 0x7, 0x8, 0x1, 0x8000, 0x6abd, 0x100, 0xfffffffd, 0xb3, 0xfffffffa, 0x3, 0x6, 0x200, 0x2, 0x400, 0xfffffffd, 0xa0c, 0x7, 0xffff, 0x9, 0x9, 0x401, 0xfffffe00, 0x2, 0x1, 0xabc1, 0x2, 0x4, 0xfff, 0xfffffffe, 0x3, 0x1, 0x0, 0x0, 0x80000000, 0x7fff, 0x80, 0x401, 0x3, 0x1, 0xe3fe, 0x1, 0x7, 0x4, 0x9, 0x5, 0x7, 0x5d2, 0x6, 0x0, 0x1, 0x1000, 0x7, 0xfff, 0x3ff, 0x8af6, 0x9, 0x2, 0x1, 0x0, 0x8, 0x0, 0x5, 0x80000000, 0x7, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x8, 0x5, 0x3, 0x7, 0x6, 0x3, 0x7, 0x3, 0xffffffff, 0x9, 0x1f8, 0x6, 0x1f, 0x5, 0x8000, 0xfbb, 0x2, 0x7, 0x6a6, 0x30f6], 0x6, [{[0x2, 0x3f], @private=0xa010101}, {[0x3, 0x467], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x3746], @multicast1}, {[0x2, 0x101], @multicast2}, {[0x3, 0x4], @multicast1}, {[0xc593, 0x3], @initdev={0xac, 0x1e, 0x1, 0x0}}]}}}}], [@arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}]}]}, 0x1076) 03:42:37 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc4, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 614.168137][T12159] ipvlan12: entered promiscuous mode [ 614.177235][T12159] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 614.185797][T12159] team0: Device ipvlan12 is already an upper device of the team interface [ 614.204898][T12160] ipvlan8: entered promiscuous mode 03:42:37 executing program 4: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000380)={0x0, 0xfb, 0xec, 0x3, 0xa0, "389a3425109cfdc324d6e454a757aa6a", "d5a31306e96f832615c7c4336a858c8d849afe475f59aa3221b2020693aad68db17e2ed52add1449d8088a7b596aa36e9fc8ad77edb698e85d1d522f16133635b60c955721efc762d790b006b60a155ec3757de51bae6b1917df43d37c1767d551e474b22b3f22aa1f8a72a6e6b98f1b385e3c645f98262290dbfc62ac540c2e97d5dcfa4427a050ba4dd49832ffcd8f9d6c1b1c88b68dbb77370f1549d6a26f88d26291243bbfc64449d12708dd5c03b09e7cca466c280ab867511d148b10728516fb26e45d505ba09efb4867f1cfee851f35f27f7957"}, 0xec, 0x3) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x20, 0x10001, 0x53, 0x9b, 0x83}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={r1, 0x4, 0x8000, 0xc0, 0xfffffebc}, 0x14) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x549100, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x2, 0x29f, [0x3, 0x800020000100, 0x62, 0x106, 0x0, 0xffffffffffffffff], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES8=r0]}, 0x79) 03:42:37 executing program 4: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000380)={0x0, 0xfb, 0xec, 0x3, 0xa0, "389a3425109cfdc324d6e454a757aa6a", "d5a31306e96f832615c7c4336a858c8d849afe475f59aa3221b2020693aad68db17e2ed52add1449d8088a7b596aa36e9fc8ad77edb698e85d1d522f16133635b60c955721efc762d790b006b60a155ec3757de51bae6b1917df43d37c1767d551e474b22b3f22aa1f8a72a6e6b98f1b385e3c645f98262290dbfc62ac540c2e97d5dcfa4427a050ba4dd49832ffcd8f9d6c1b1c88b68dbb77370f1549d6a26f88d26291243bbfc64449d12708dd5c03b09e7cca466c280ab867511d148b10728516fb26e45d505ba09efb4867f1cfee851f35f27f7957"}, 0xec, 0x3) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x20, 0x10001, 0x53, 0x9b, 0x83}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={r1, 0x4, 0x8000, 0xc0, 0xfffffebc}, 0x14) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x549100, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x2, 0x29f, [0x3, 0x800020000100, 0x62, 0x106, 0x0, 0xffffffffffffffff], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES8=r0]}, 0x79) 03:42:37 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd1, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) [ 614.260392][T12164] macvtap7: entered allmulticast mode [ 614.266254][T12164] 8021q: adding VLAN 0 to HW filter on device macvtap7 [ 614.275686][T12164] team0: Device macvtap7 is already an upper device of the team interface 03:42:37 executing program 4: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000380)={0x0, 0xfb, 0xec, 0x3, 0xa0, "389a3425109cfdc324d6e454a757aa6a", "d5a31306e96f832615c7c4336a858c8d849afe475f59aa3221b2020693aad68db17e2ed52add1449d8088a7b596aa36e9fc8ad77edb698e85d1d522f16133635b60c955721efc762d790b006b60a155ec3757de51bae6b1917df43d37c1767d551e474b22b3f22aa1f8a72a6e6b98f1b385e3c645f98262290dbfc62ac540c2e97d5dcfa4427a050ba4dd49832ffcd8f9d6c1b1c88b68dbb77370f1549d6a26f88d26291243bbfc64449d12708dd5c03b09e7cca466c280ab867511d148b10728516fb26e45d505ba09efb4867f1cfee851f35f27f7957"}, 0xec, 0x3) r0 = socket$inet_udp(0x2, 0x2, 0x0) (async) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x20, 0x10001, 0x53, 0x9b, 0x83}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={r1, 0x4, 0x8000, 0xc0, 0xfffffebc}, 0x14) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000b00), r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x549100, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x2, 0x29f, [0x3, 0x800020000100, 0x62, 0x106, 0x0, 0xffffffffffffffff], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES8=r0]}, 0x79) 03:42:37 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x10, 0x2, 0x3, 0x4, 0x8, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400f2ff76657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000d24ffffffffff0000000000000000f0000000f0000000200100006c696d69740000000000000000000000000000000000000000000000000000006000000000000000f6ffffff01000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000a6cfb8f53b78aeb082000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000005e6ec8dc7365d733004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e30000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800000000000000000000000000000004af20c6896fb1c2e97b04108b24664d506a212df443cb43aba84d805521ff60cef846910131f5d679d95facdfdf82099d4d3c6db987222a30d905f3b7782b23f3e9ba0574c04c64063c60ca08407bb101d9e214001546e23a00000000cfdb071d3f23b907eec059b33bbc7440ad8f63f83bad715947e9237db116086e621f236ef6f5ce1319032b3c7310c583b2588572ccafb397f07fdc7dad8e6c788808cb67550cde01fa5e9a3dce2ce497bc6839aa29ed20baf490f3db48d0dbdd76a9378b32aa9325f2de7ef7254bd5d754bc3624e042c8acde178090519822801effaf967c89d675565d6d5c34ef116bbcb4a65ca827bf268132226750e297da101b992ce189b7cb9e8f15acb3e788142a08c1f6b1c773490b685f56160100afb72c"]}, 0x3ec) 03:42:37 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x10, 0x2, 0x3, 0x4, 0x8, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x3ec) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x10, 0x2, 0x3, 0x4, 0x8, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x6) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x3ec) (async) [ 614.308550][T12166] FAULT_INJECTION: forcing a failure. [ 614.308550][T12166] name failslab, interval 1, probability 0, space 0, times 0 [ 614.321358][T12166] CPU: 1 PID: 12166 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 614.331810][T12166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 614.341907][T12166] Call Trace: [ 614.345207][T12166] [ 614.348154][T12166] dump_stack_lvl+0xda/0x130 [ 614.352800][T12166] dump_stack+0x15/0x20 03:42:37 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x10, 0x2, 0x3, 0x4, 0x8, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async, rerun: 32) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x6) (async, rerun: 32) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400f2ff76657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000d24ffffffffff0000000000000000f0000000f0000000200100006c696d69740000000000000000000000000000000000000000000000000000006000000000000000f6ffffff01000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000a6cfb8f53b78aeb082000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000005e6ec8dc7365d733004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e30000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000008000800000000000000000000000000000004af20c6896fb1c2e97b04108b24664d506a212df443cb43aba84d805521ff60cef846910131f5d679d95facdfdf82099d4d3c6db987222a30d905f3b7782b23f3e9ba0574c04c64063c60ca08407bb101d9e214001546e23a00000000cfdb071d3f23b907eec059b33bbc7440ad8f63f83bad715947e9237db116086e621f236ef6f5ce1319032b3c7310c583b2588572ccafb397f07fdc7dad8e6c788808cb67550cde01fa5e9a3dce2ce497bc6839aa29ed20baf490f3db48d0dbdd76a9378b32aa9325f2de7ef7254bd5d754bc3624e042c8acde178090519822801effaf967c89d675565d6d5c34ef116bbcb4a65ca827bf268132226750e297da101b992ce189b7cb9e8f15acb3e788142a08c1f6b1c773490b685f56160100afb72c"]}, 0x3ec) [ 614.357004][T12166] should_fail_ex+0x21f/0x230 [ 614.361729][T12166] __should_failslab+0x92/0xa0 [ 614.366590][T12166] should_failslab+0x9/0x20 [ 614.371219][T12166] slab_pre_alloc_hook+0x38/0x180 [ 614.376283][T12166] kmem_cache_alloc+0x52/0x220 [ 614.381106][T12166] ? __kernfs_new_node+0x6a/0x380 [ 614.386171][T12166] __kernfs_new_node+0x6a/0x380 [ 614.391047][T12166] ? rb_insert_color+0x263/0x290 [ 614.396089][T12166] ? up_write+0x30/0xe0 [ 614.400282][T12166] ? kernfs_activate+0x252/0x270 [ 614.405263][T12166] kernfs_new_node+0x5f/0xd0 [ 614.409948][T12166] __kernfs_create_file+0x49/0x180 [ 614.415166][T12166] ? dev_attr_show+0x90/0x90 [ 614.419824][T12166] sysfs_add_file_mode_ns+0x136/0x1b0 [ 614.425257][T12166] internal_create_group+0x2e4/0x800 [ 614.430554][T12166] sysfs_create_groups+0x3c/0xe0 [ 614.435493][T12166] device_add_attrs+0x69/0x400 [ 614.440351][T12166] ? kobject_put+0xd8/0x160 [ 614.444916][T12166] device_add+0x431/0x8b0 [ 614.449270][T12166] netdev_register_kobject+0xfc/0x230 [ 614.454668][T12166] register_netdevice+0x680/0xb40 [ 614.459731][T12166] ? rtnl_is_locked+0x15/0x20 [ 614.464490][T12166] ? netdev_rx_handler_register+0x11a/0x140 [ 614.470445][T12166] macvlan_common_newlink+0xa1b/0xbc0 [ 614.475850][T12166] macvtap_newlink+0xf6/0x150 [ 614.480538][T12166] ? macvtap_setup+0x30/0x30 [ 614.485150][T12166] rtnl_newlink+0xee5/0x1670 [ 614.489882][T12166] ? cgroup_rstat_updated+0x8c/0x1c0 [ 614.495205][T12166] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 614.501469][T12166] ? _raw_spin_unlock+0x26/0x40 [ 614.506343][T12166] ? __mutex_lock+0x21c/0x8d0 [ 614.511033][T12166] ? rtnl_setlink+0x300/0x300 [ 614.515739][T12166] rtnetlink_rcv_msg+0x807/0x8c0 [ 614.520726][T12166] ? memcg_list_lru_alloc+0xd5/0x750 [ 614.526186][T12166] ? should_fail_ex+0x2d/0x230 [ 614.530982][T12166] ? slab_post_alloc_hook+0x8c/0x340 [ 614.536272][T12166] ? xas_load+0x3ae/0x3c0 [ 614.540639][T12166] ? skb_release_data+0x53d/0x550 [ 614.545684][T12166] ? kmem_cache_free+0x1db/0x3a0 [ 614.550639][T12166] ? __kfree_skb+0x104/0x140 [ 614.555240][T12166] ? nlmon_xmit+0x4b/0x60 [ 614.559671][T12166] ? __kfree_skb+0x104/0x140 [ 614.564280][T12166] ? consume_skb+0x57/0x180 [ 614.568838][T12166] ? nlmon_xmit+0x4b/0x60 [ 614.573239][T12166] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 614.578531][T12166] ? __dev_queue_xmit+0xad9/0x1e20 [ 614.583668][T12166] ? ref_tracker_free+0x3a1/0x400 [ 614.588730][T12166] netlink_rcv_skb+0x126/0x220 [ 614.593533][T12166] ? rtnetlink_bind+0x60/0x60 [ 614.598254][T12166] rtnetlink_rcv+0x1c/0x20 [ 614.602775][T12166] netlink_unicast+0x589/0x650 [ 614.607555][T12166] netlink_sendmsg+0x66e/0x770 [ 614.612370][T12166] ? netlink_getsockopt+0x3e0/0x3e0 [ 614.617597][T12166] ____sys_sendmsg+0x37c/0x4d0 [ 614.622399][T12166] __sys_sendmsg+0x1e9/0x270 [ 614.627112][T12166] __x64_sys_sendmsg+0x46/0x50 [ 614.631996][T12166] do_syscall_64+0x41/0xc0 [ 614.636455][T12166] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 614.642387][T12166] RIP: 0033:0x7f7514d76ae9 [ 614.646811][T12166] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 614.666438][T12166] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 614.674999][T12166] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 614.682991][T12166] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 614.690994][T12166] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 614.699037][T12166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:42:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x41c, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40100, 0x88) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x9, 0x401, 0x1f, 0x1, 0x7085, {0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0x800}}, 0x3f, 0xdd, 0x1, 0x8a0, 0x3}}, &(0x7f00000000c0)=0xb0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000480)={0x1, 'erspan0\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) signalfd(r3, &(0x7f00000004c0)={[0x8000000000000000]}, 0x8) [ 614.707024][T12166] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 [ 614.715013][T12166] [ 614.736373][T12168] macvtap79: entered allmulticast mode [ 614.749382][T12168] 8021q: adding VLAN 0 to HW filter on device macvtap79 03:42:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x351, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:42:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 53) [ 614.763688][T12177] ipvlan12: entered promiscuous mode [ 614.770572][T12177] 8021q: adding VLAN 0 to HW filter on device ipvlan12 [ 614.779378][T12177] team0: Device ipvlan12 is already an upper device of the team interface [ 614.800873][T12185] ipvlan8: entered promiscuous mode [ 614.821921][T12206] team_slave_0: entered promiscuous mode [ 614.827621][T12206] team_slave_1: entered promiscuous mode [ 614.834407][T12206] macvtap1: entered allmulticast mode [ 614.839859][T12206] team0: entered allmulticast mode [ 614.845074][T12206] team_slave_0: entered allmulticast mode [ 614.850804][T12206] team_slave_1: entered allmulticast mode [ 614.857835][T12206] 8021q: adding VLAN 0 to HW filter on device macvtap1 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40100, 0x88) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x9, 0x401, 0x1f, 0x1, 0x7085, {0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0x800}}, 0x3f, 0xdd, 0x1, 0x8a0, 0x3}}, &(0x7f00000000c0)=0xb0) (async) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000480)={0x1, 'erspan0\x00'}) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async) signalfd(r3, &(0x7f00000004c0)={[0x8000000000000000]}, 0x8) 03:42:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x41d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 03:42:37 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xc6, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:37 executing program 5: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xf5, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40100, 0x88) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x9, 0x401, 0x1f, 0x1, 0x7085, {0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0x800}}, 0x3f, 0xdd, 0x1, 0x8a0, 0x3}}, &(0x7f00000000c0)=0xb0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000480)={0x1, 'erspan0\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) signalfd(r3, &(0x7f00000004c0)={[0x8000000000000000]}, 0x8) socket$inet_udp(0x2, 0x2, 0x0) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) (async) open(&(0x7f0000000080)='./file0\x00', 0x40100, 0x88) (async) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x5, 0x3, 0x9, 0x401, 0x1f, 0x1, 0x7085, {0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0x800}}, 0x3f, 0xdd, 0x1, 0x8a0, 0x3}}, &(0x7f00000000c0)=0xb0) (async) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000480)={0x1, 'erspan0\x00'}) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x9, 0x8, 0x2}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x20000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0xd0, &(0x7f00000003c0)=""/208}, 0x80) (async) signalfd(r3, &(0x7f00000004c0)={[0x8000000000000000]}, 0x8) (async) 03:42:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000000)="ae8768a3b9387a47468098924035f773e047be7408434a2953c076a73548d8c8e230c292881cd33bdea756fed3cfb2c28f8896f6ab87c18afaf43dfd3ba5399c624262ec", 0x44, 0x4044, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x0, 0x8], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)="df5d086b282c44152e6dc656ba241c2eb86a5a6e01d87cb640419285865330bc8c220cf1c137e0dffaff40132dd3700cd67112058554ccf96107543f3aff9786970154a1acd76707aef3d25bdef61697bdd50dab6be20278", 0x58, 0x10, 0x0, 0x0) [ 614.873565][T12206] team0: Device macvtap1 is already an upper device of the team interface [ 614.896802][T12206] team0: left allmulticast mode [ 614.901726][T12206] team_slave_0: left allmulticast mode [ 614.907249][T12206] team_slave_1: left allmulticast mode [ 614.912744][T12206] team_slave_0: left promiscuous mode [ 614.918170][T12206] team_slave_1: left promiscuous mode 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000000)="ae8768a3b9387a47468098924035f773e047be7408434a2953c076a73548d8c8e230c292881cd33bdea756fed3cfb2c28f8896f6ab87c18afaf43dfd3ba5399c624262ec", 0x44, 0x4044, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x0, 0x8], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)="df5d086b282c44152e6dc656ba241c2eb86a5a6e01d87cb640419285865330bc8c220cf1c137e0dffaff40132dd3700cd67112058554ccf96107543f3aff9786970154a1acd76707aef3d25bdef61697bdd50dab6be20278", 0x58, 0x10, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) (async) sendto$inet(r0, &(0x7f0000000000)="ae8768a3b9387a47468098924035f773e047be7408434a2953c076a73548d8c8e230c292881cd33bdea756fed3cfb2c28f8896f6ab87c18afaf43dfd3ba5399c624262ec", 0x44, 0x4044, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) (async) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x0, 0x8], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) (async) socket(0x25, 0x1, 0x0) (async) write$selinux_attr(r1, 0x0, 0x0) (async) sendto$inet(r1, &(0x7f00000001c0)="df5d086b282c44152e6dc656ba241c2eb86a5a6e01d87cb640419285865330bc8c220cf1c137e0dffaff40132dd3700cd67112058554ccf96107543f3aff9786970154a1acd76707aef3d25bdef61697bdd50dab6be20278", 0x58, 0x10, 0x0, 0x0) (async) 03:42:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2400, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) (fail_nth: 54) 03:42:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x39c, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 614.949095][T12208] macvtap80: entered allmulticast mode [ 614.960213][T12208] 8021q: adding VLAN 0 to HW filter on device macvtap80 [ 614.982703][T12217] macvtap7: entered allmulticast mode [ 614.990678][T12217] 8021q: adding VLAN 0 to HW filter on device macvtap7 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000000)="ae8768a3b9387a47468098924035f773e047be7408434a2953c076a73548d8c8e230c292881cd33bdea756fed3cfb2c28f8896f6ab87c18afaf43dfd3ba5399c624262ec", 0x44, 0x4044, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10) (async) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280, 0x0, 0x8], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0]}, 0x8a) (async) r1 = socket(0x25, 0x1, 0x0) write$selinux_attr(r1, 0x0, 0x0) (async) sendto$inet(r1, &(0x7f00000001c0)="df5d086b282c44152e6dc656ba241c2eb86a5a6e01d87cb640419285865330bc8c220cf1c137e0dffaff40132dd3700cd67112058554ccf96107543f3aff9786970154a1acd76707aef3d25bdef61697bdd50dab6be20278", 0x58, 0x10, 0x0, 0x0) 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) [ 615.001897][T12217] team0: Device macvtap7 is already an upper device of the team interface [ 615.033532][T12214] ipvlan12: entered promiscuous mode [ 615.040818][T12214] 8021q: adding VLAN 0 to HW filter on device ipvlan12 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000004493000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000721267eabf000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000200041554449540000000000000000000000000000000000000000000000000008000800"/592]}, 0x2c8) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) (async) 03:42:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r2, &(0x7f00000022c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x44, 0x10, 0x41e, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa01}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 615.050635][T12214] team0: Device ipvlan12 is already an upper device of the team interface [ 615.091464][T12218] ipvlan8: entered promiscuous mode [ 615.126812][T12231] FAULT_INJECTION: forcing a failure. [ 615.126812][T12231] name failslab, interval 1, probability 0, space 0, times 0 [ 615.139562][T12231] CPU: 0 PID: 12231 Comm: syz-executor.0 Not tainted 6.6.0-rc7-syzkaller-00018-gd88520ad73b7 #0 [ 615.149989][T12231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 [ 615.160115][T12231] Call Trace: [ 615.163427][T12231] [ 615.166403][T12231] dump_stack_lvl+0xda/0x130 [ 615.171021][T12231] dump_stack+0x15/0x20 [ 615.175201][T12231] should_fail_ex+0x21f/0x230 [ 615.179893][T12231] __should_failslab+0x92/0xa0 [ 615.184739][T12231] should_failslab+0x9/0x20 [ 615.189255][T12231] slab_pre_alloc_hook+0x38/0x180 [ 615.194377][T12231] kmem_cache_alloc+0x52/0x220 [ 615.199214][T12231] ? __kernfs_new_node+0x6a/0x380 [ 615.204260][T12231] __kernfs_new_node+0x6a/0x380 [ 615.209135][T12231] ? rb_insert_color+0x263/0x290 [ 615.214086][T12231] ? up_write+0x30/0xe0 [ 615.218324][T12231] ? kernfs_activate+0x252/0x270 [ 615.223292][T12231] kernfs_new_node+0x5f/0xd0 [ 615.227952][T12231] __kernfs_create_file+0x49/0x180 [ 615.233110][T12231] ? dev_attr_show+0x90/0x90 [ 615.237717][T12231] sysfs_add_file_mode_ns+0x136/0x1b0 [ 615.243211][T12231] internal_create_group+0x2e4/0x800 [ 615.248607][T12231] sysfs_create_groups+0x3c/0xe0 [ 615.253559][T12231] device_add_attrs+0x69/0x400 [ 615.258347][T12231] ? kobject_put+0xd8/0x160 [ 615.262922][T12231] device_add+0x431/0x8b0 [ 615.267293][T12231] netdev_register_kobject+0xfc/0x230 [ 615.272686][T12231] register_netdevice+0x680/0xb40 [ 615.277796][T12231] ? rtnl_is_locked+0x15/0x20 [ 615.282543][T12231] ? netdev_rx_handler_register+0x11a/0x140 [ 615.288509][T12231] macvlan_common_newlink+0xa1b/0xbc0 [ 615.293915][T12231] macvtap_newlink+0xf6/0x150 [ 615.298618][T12231] ? macvtap_setup+0x30/0x30 [ 615.303217][T12231] rtnl_newlink+0xee5/0x1670 [ 615.307828][T12231] ? cgroup_rstat_updated+0x8c/0x1c0 [ 615.313140][T12231] ? __list_del_entry_valid_or_report+0x5f/0xe0 [ 615.319431][T12231] ? _raw_spin_unlock+0x26/0x40 [ 615.324305][T12231] ? __mutex_lock+0x21c/0x8d0 [ 615.329028][T12231] ? rtnl_setlink+0x300/0x300 [ 615.333722][T12231] rtnetlink_rcv_msg+0x807/0x8c0 [ 615.338708][T12231] ? should_fail_ex+0x2d/0x230 [ 615.343489][T12231] ? slab_post_alloc_hook+0x8c/0x340 [ 615.348790][T12231] ? xas_load+0x3ae/0x3c0 [ 615.353130][T12231] ? skb_release_data+0x53d/0x550 [ 615.358189][T12231] ? kmem_cache_free+0x1db/0x3a0 [ 615.363201][T12231] ? __kfree_skb+0x104/0x140 [ 615.367846][T12231] ? nlmon_xmit+0x4b/0x60 [ 615.372221][T12231] ? __kfree_skb+0x104/0x140 [ 615.376878][T12231] ? consume_skb+0x57/0x180 [ 615.381458][T12231] ? nlmon_xmit+0x4b/0x60 [ 615.385821][T12231] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 615.391281][T12231] ? __dev_queue_xmit+0xad9/0x1e20 [ 615.396404][T12231] ? ref_tracker_free+0x3a1/0x400 [ 615.401483][T12231] netlink_rcv_skb+0x126/0x220 [ 615.406364][T12231] ? rtnetlink_bind+0x60/0x60 [ 615.411069][T12231] rtnetlink_rcv+0x1c/0x20 [ 615.415549][T12231] netlink_unicast+0x589/0x650 [ 615.420333][T12231] netlink_sendmsg+0x66e/0x770 [ 615.425216][T12231] ? netlink_getsockopt+0x3e0/0x3e0 [ 615.430439][T12231] ____sys_sendmsg+0x37c/0x4d0 [ 615.435323][T12231] __sys_sendmsg+0x1e9/0x270 [ 615.439949][T12231] __x64_sys_sendmsg+0x46/0x50 [ 615.444785][T12231] do_syscall_64+0x41/0xc0 [ 615.449283][T12231] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 615.455196][T12231] RIP: 0033:0x7f7514d76ae9 [ 615.459677][T12231] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 615.479438][T12231] RSP: 002b:00007f75140f90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 615.487864][T12231] RAX: ffffffffffffffda RBX: 00007f7514e95f80 RCX: 00007f7514d76ae9 [ 615.495843][T12231] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 615.503823][T12231] RBP: 00007f75140f9120 R08: 0000000000000000 R09: 0000000000000000 [ 615.511827][T12231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 615.519821][T12231] R13: 000000000000000b R14: 00007f7514e95f80 R15: 00007ffd80218c78 03:42:38 executing program 2: socket(0xa, 0x40000000002, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') socket(0x10, 0x803, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') socket(0x25, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xd1, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x44}}, 0x0) 03:42:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000100000000000000000000000000000002000000000ffffffff0200000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000060000000000000000000000002000000000000000000000000000000000000000000000000000000636c757374657200000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000415544495400000000000000000000000000000000000000000000000000000008000000000000000044930000000000000000000000000000000000000000000000